Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
setup.exe

Overview

General Information

Sample name:setup.exe
Analysis ID:1465699
MD5:e671a39ffdad8e262a45ef77d97a14f4
SHA1:d451ad059bf52c22ff5de8ed7968991bbc169828
SHA256:d01fe3dbc995e4b5b209631e5ae30b792d88a78676f695127f8a5db9bf59b48c
Tags:exe
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AntiVM3
Yara detected RedLine Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • setup.exe (PID: 1668 cmdline: "C:\Users\user\Desktop\setup.exe" MD5: E671A39FFDAD8E262A45EF77D97A14F4)
    • RegAsm.exe (PID: 5876 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": "185.172.128.33:8970", "Bot Id": "YT&TEAM CLOUD", "Authorization Header": "090b1c9b0516faab03d5a79ff2ee3484"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.2131936682.00000000047A2000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000000.00000002.2131936682.00000000046BE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000002.00000002.2255836042.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              00000000.00000002.2131936682.000000000470A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                Click to see the 7 entries
                SourceRuleDescriptionAuthorStrings
                0.2.setup.exe.475f0d0.7.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  0.2.setup.exe.475f0d0.7.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    0.2.setup.exe.47ab100.5.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                      0.2.setup.exe.46c7080.6.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                        0.2.setup.exe.467b050.2.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                          Click to see the 8 entries
                          No Sigma rule has matched
                          Timestamp:07/02/24-00:21:01.164468
                          SID:2043234
                          Source Port:8970
                          Destination Port:49711
                          Protocol:TCP
                          Classtype:A Network Trojan was detected
                          Timestamp:07/02/24-00:21:11.236244
                          SID:2043231
                          Source Port:49711
                          Destination Port:8970
                          Protocol:TCP
                          Classtype:A Network Trojan was detected
                          Timestamp:07/02/24-00:21:00.973788
                          SID:2046045
                          Source Port:49711
                          Destination Port:8970
                          Protocol:TCP
                          Classtype:A Network Trojan was detected
                          Timestamp:07/02/24-00:21:06.414223
                          SID:2046056
                          Source Port:8970
                          Destination Port:49711
                          Protocol:TCP
                          Classtype:A Network Trojan was detected

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: 00000000.00000002.2131936682.00000000046BE000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": "185.172.128.33:8970", "Bot Id": "YT&TEAM CLOUD", "Authorization Header": "090b1c9b0516faab03d5a79ff2ee3484"}
                          Source: setup.exeReversingLabs: Detection: 52%
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                          Source: setup.exeJoe Sandbox ML: detected
                          Source: setup.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\setup.exe.logJump to behavior
                          Source: setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Source: Binary string: Template_v123_config.pdbx%2 source: setup.exe
                          Source: Binary string: C:\Users\teres\AppData\Local\Temp\Report.A66214F7-6635-4084-8609-050NK772Dll\obj\Debug\APqfKCWP.pdb source: setup.exe, 00000000.00000002.2131936682.0000000004253000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: PE.pdbH] source: setup.exe, 00000000.00000002.2129820477.0000000003141000.00000004.00000800.00020000.00000000.sdmp, setup.exe, 00000000.00000002.2141453610.0000000005710000.00000004.08000000.00040000.00000000.sdmp
                          Source: Binary string: PE.pdb source: setup.exe, 00000000.00000002.2129820477.0000000003141000.00000004.00000800.00020000.00000000.sdmp, setup.exe, 00000000.00000002.2141453610.0000000005710000.00000004.08000000.00040000.00000000.sdmp
                          Source: Binary string: Template_v123_config.pdb source: setup.exe
                          Source: C:\Users\user\Desktop\setup.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_05BCEFF0
                          Source: C:\Users\user\Desktop\setup.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_05BCEFE6

                          Networking

                          barindex
                          Source: TrafficSnort IDS: 2046045 ET TROJAN [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) 192.168.2.6:49711 -> 185.172.128.33:8970
                          Source: TrafficSnort IDS: 2043231 ET TROJAN Redline Stealer TCP CnC Activity 192.168.2.6:49711 -> 185.172.128.33:8970
                          Source: TrafficSnort IDS: 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response 185.172.128.33:8970 -> 192.168.2.6:49711
                          Source: TrafficSnort IDS: 2046056 ET TROJAN Redline Stealer/MetaStealer Family Activity (Response) 185.172.128.33:8970 -> 192.168.2.6:49711
                          Source: Malware configuration extractorURLs: 185.172.128.33:8970
                          Source: Yara matchFile source: 0.2.setup.exe.4518830.3.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.43b6000.4.raw.unpack, type: UNPACKEDPE
                          Source: global trafficTCP traffic: 192.168.2.6:49711 -> 185.172.128.33:8970
                          Source: Joe Sandbox ViewIP Address: 185.172.128.33 185.172.128.33
                          Source: Joe Sandbox ViewASN Name: NADYMSS-ASRU NADYMSS-ASRU
                          Source: unknownDNS traffic detected: query: 15.164.165.52.in-addr.arpa replaycode: Name error (3)
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.33
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
                          Source: setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                          Source: setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalG3CodeSigningECCSHA3842021CA1.crt0
                          Source: setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
                          Source: setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                          Source: setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                          Source: setup.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                          Source: setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                          Source: setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalG3CodeSigningECCSHA3842021CA1.crl0N
                          Source: setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
                          Source: setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                          Source: setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                          Source: setup.exeString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalG3CodeSigningECCSHA3842021CA1.crl0=
                          Source: setup.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                          Source: setup.exeString found in binary or memory: http://ocsp.digicert.com0
                          Source: setup.exeString found in binary or memory: http://ocsp.digicert.com0A
                          Source: setup.exeString found in binary or memory: http://ocsp.digicert.com0C
                          Source: setup.exeString found in binary or memory: http://ocsp.digicert.com0W
                          Source: setup.exeString found in binary or memory: http://ocsp.digicert.com0X
                          Source: setup.exeString found in binary or memory: http://ocsp.sectigo.com0
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                          Source: setup.exeString found in binary or memory: http://sharpvectors.codeplex.com/runtime/
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.00000000031DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.0000000002F8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000003233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8ResponseD
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9ResponseD
                          Source: setup.exeString found in binary or memory: http://www.digicert.com/CPS0
                          Source: setup.exe, 00000000.00000002.2131936682.00000000046BE000.00000004.00000800.00020000.00000000.sdmp, setup.exe, 00000000.00000002.2131936682.00000000047A2000.00000004.00000800.00020000.00000000.sdmp, setup.exe, 00000000.00000002.2131936682.0000000004253000.00000004.00000800.00020000.00000000.sdmp, setup.exe, 00000000.00000002.2131936682.000000000470A000.00000004.00000800.00020000.00000000.sdmp, setup.exe, 00000000.00000002.2131936682.0000000004145000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2255836042.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                          Source: setup.exe, 00000000.00000002.2131936682.0000000004145000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://az700632.vo.msecnd.net/pub
                          Source: setup.exeString found in binary or memory: https://github.com/AzureAD/microsoft-authentication-extensions-for-dotnet
                          Source: setup.exeString found in binary or memory: https://login.microsoftonline.com/common
                          Source: setup.exeString found in binary or memory: https://sectigo.com/CPS0
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp6A20.tmpJump to dropped file
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp6A0F.tmpJump to dropped file
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_0302B1780_2_0302B178
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_0302B1880_2_0302B188
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_0302E6380_2_0302E638
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05B91E880_2_05B91E88
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05B91E780_2_05B91E78
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BA13500_2_05BA1350
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BA5DBE0_2_05BA5DBE
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BA48980_2_05BA4898
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BA00060_2_05BA0006
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BA00400_2_05BA0040
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BA2B700_2_05BA2B70
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BA2B600_2_05BA2B60
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BA13400_2_05BA1340
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BC44E00_2_05BC44E0
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BCA0A00_2_05BCA0A0
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BC60980_2_05BC6098
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BCDE600_2_05BCDE60
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BCCB520_2_05BCCB52
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BC44D00_2_05BC44D0
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BCA08F0_2_05BCA08F
                          Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_05BCDE4F0_2_05BCDE4F
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0136DC742_2_0136DC74
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_069667D82_2_069667D8
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0696A3E82_2_0696A3E8
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_06963F502_2_06963F50
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0696A3D82_2_0696A3D8
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_06966FF82_2_06966FF8
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_06966FE82_2_06966FE8
                          Source: setup.exeStatic PE information: invalid certificate
                          Source: setup.exe, 00000000.00000002.2129820477.0000000003141000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePE.dll& vs setup.exe
                          Source: setup.exe, 00000000.00000002.2131936682.00000000046BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameThere.exe8 vs setup.exe
                          Source: setup.exe, 00000000.00000002.2141453610.0000000005710000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamePE.dll& vs setup.exe
                          Source: setup.exe, 00000000.00000002.2141526814.0000000005A32000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAPqfKCWP.dll0 vs setup.exe
                          Source: setup.exe, 00000000.00000002.2131936682.00000000047A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameThere.exe8 vs setup.exe
                          Source: setup.exe, 00000000.00000002.2129408323.0000000001559000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs setup.exe
                          Source: setup.exe, 00000000.00000002.2131936682.0000000004253000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAPqfKCWP.dll0 vs setup.exe
                          Source: setup.exe, 00000000.00000002.2131936682.000000000470A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameThere.exe8 vs setup.exe
                          Source: setup.exe, 00000000.00000002.2131936682.00000000047EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameThere.exe8 vs setup.exe
                          Source: setup.exe, 00000000.00000002.2129820477.0000000003279000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclrjit.dllT vs setup.exe
                          Source: setup.exe, 00000000.00000002.2129820477.0000000003279000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs setup.exe
                          Source: setup.exe, 00000000.00000002.2129820477.0000000003279000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\040904B0\\OriginalFilename vs setup.exe
                          Source: setup.exe, 00000000.00000002.2131936682.000000000480B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameThere.exe8 vs setup.exe
                          Source: setup.exe, 00000000.00000000.2123213472.0000000000E16000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTemplate_v123_config.exe0 vs setup.exe
                          Source: setup.exeBinary or memory string: OriginalFilenameTemplate_v123_config.exe0 vs setup.exe
                          Source: setup.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          Source: setup.exe, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                          Source: setup.exe, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                          Source: setup.exe, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                          Source: setup.exe, wmEmS.csCryptographic APIs: 'CreateDecryptor'
                          Source: setup.exe, wmEmS.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 0.2.setup.exe.4518830.3.raw.unpack, zGLiBpty.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                          Source: 0.2.setup.exe.31b4220.1.raw.unpack, fDX9tehJ5EFemhKZwc.csCryptographic APIs: 'CreateDecryptor'
                          Source: 0.2.setup.exe.31b4220.1.raw.unpack, fDX9tehJ5EFemhKZwc.csCryptographic APIs: 'CreateDecryptor'
                          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/6@1/1
                          Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\setup.exe.logJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp6A0F.tmpJump to behavior
                          Source: setup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: setup.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Program Files (x86)\desktop.iniJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: RegAsm.exe, 00000002.00000002.2257653819.000000000344C000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.0000000003436000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                          Source: setup.exeReversingLabs: Detection: 52%
                          Source: unknownProcess created: C:\Users\user\Desktop\setup.exe "C:\Users\user\Desktop\setup.exe"
                          Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: acgenral.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: winmm.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: samcli.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: msacm32.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: dwmapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeSection loaded: mscorjit.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwrite.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msisip.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wshext.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: appxsip.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: opcservices.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: esdsip.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sxs.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: scrrun.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: linkinfo.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                          Source: C:\Users\user\Desktop\setup.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                          Source: setup.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                          Source: setup.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                          Source: setup.exeStatic file information: File size 3360856 > 1048576
                          Source: setup.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x320600
                          Source: setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Source: setup.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                          Source: Binary string: Template_v123_config.pdbx%2 source: setup.exe
                          Source: Binary string: C:\Users\teres\AppData\Local\Temp\Report.A66214F7-6635-4084-8609-050NK772Dll\obj\Debug\APqfKCWP.pdb source: setup.exe, 00000000.00000002.2131936682.0000000004253000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: PE.pdbH] source: setup.exe, 00000000.00000002.2129820477.0000000003141000.00000004.00000800.00020000.00000000.sdmp, setup.exe, 00000000.00000002.2141453610.0000000005710000.00000004.08000000.00040000.00000000.sdmp
                          Source: Binary string: PE.pdb source: setup.exe, 00000000.00000002.2129820477.0000000003141000.00000004.00000800.00020000.00000000.sdmp, setup.exe, 00000000.00000002.2141453610.0000000005710000.00000004.08000000.00040000.00000000.sdmp
                          Source: Binary string: Template_v123_config.pdb source: setup.exe

                          Data Obfuscation

                          barindex
                          Source: setup.exe, DyyVDbaRvM1YfIq9il.cs.Net Code: Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.Ts6ald5q0nxNL(16777454)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.Ts6ald5q0nxNL(16777391)),Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.Ts6ald5q0nxNL(16777290))})
                          Source: 0.2.setup.exe.31b4220.1.raw.unpack, fDX9tehJ5EFemhKZwc.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                          Source: setup.exeStatic PE information: real checksum: 0x33b128 should be: 0x33eef1
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0696E060 push es; ret 2_2_0696E070
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0696ECF2 push eax; ret 2_2_0696ED01
                          Source: setup.exe, LinuxKeyringAccessor.csHigh entropy of concatenated method names: 'CreateForPersistenceValidation', 'Clear', 'Read', 'Write', 'lRnmIsXi4K', 'N0DnYLv6vODbC33irUI', 'KHl8WgvqFw4OnI9iEOn', 'SY4aULvSJYBYm885D5r', 'IugrItvNZiQUT12FQPu', 'C0HKelVzd0CCWkCs2hP'
                          Source: setup.exe, DpApiEncryptedFileAccessor.csHigh entropy of concatenated method names: 'Clear', 'CreateForPersistenceValidation', 'Read', 'Write', 'L7Rh4AVChsrBTZjHnlJ', 'aHN9oeVr7pGPuRbUbuE', 'BjQSJEV2mAZ42wcbAFZ', 'HRNTZcVIG4WaUL6ykfb', 'Adlb36VEY0jG4e2llaK', 'UkMQ1XVjy1mCymWaXBY'
                          Source: setup.exe, MsalCacheStorage.csHigh entropy of concatenated method names: '_003C_002Ecctor_003Eb__17_0', 'AxFArmg82Ns4gOsviJN', 'x5xi58gBwo2jRLAFm09', 'U0R8CCgTmYurrcBmFLa', 'lUrCh4g71GY1npfCd3r', 'Ms2vBmgzmqS641Gu6jG', 'Create', 'ReadData', 'WriteData', 'Clear'
                          Source: setup.exe, MacKeychainAccessor.csHigh entropy of concatenated method names: 'Clear', 'Read', 'Write', 'CreateForPersistenceValidation', 'ToString', 'uG1GpDvRqNtuhtm9UUX', 'CCHiMXvlclJl22B5Gqo', 'I9hB86v1A7UC5kDihD7', 'grXPdwvseR2okgVQ6tk', 'bbPd76vUW3t8YoLPkiM'
                          Source: setup.exe, SharedUtilities.csHigh entropy of concatenated method names: '_003C_002Ecctor_003Eb__12_0', 'GD4ZR7dNlASOdUwYldZ', 'rNjBkmdKlrKGsNWBOrQ', 'C4bPPHdhcQqpy2eTIjH', 'JJcKE5dafbc1SXUaCMS', 'JvFHj1dL9DSH3LnDArq', 'IsWindowsPlatform', 'IsMacPlatform', 'IsLinuxPlatform', 'IsMonoPlatform'
                          Source: setup.exe, CrossPlatLock.csHigh entropy of concatenated method names: 'Dispose', 'y8d5dqkCmOMMYo5fJiq', 'JSdlpkkr5Dijbsx8qMa', 'mALXYSk2aoJtwMFeGCR', 'NHnpB5kI4dB53FA38g5', 'Fh4B3JkMZJBoPYpMb1V', 'qMrOrBkVKODVn47sl8V', 'mKkBtLkv2lVx62DSR93', 'P3SJfVkkUa7wgiLCPG5', 'PcJBIckyTa6VtCoWMvB'
                          Source: setup.exe, FileAccessor.csHigh entropy of concatenated method names: '_003CRead_003Eb__0', 'Lqp8pZyxWTu032WRdnp', 'Aa1oOEyAhKwPOCwiVCZ', 'C1HIOCypuxDmfqw0Nhw', 'CCeH5WyW7xIQqvh6SKn', 'AyCZPCyus5CE3FCwXe8', 'S2aAl7yYGMrvIt6foKJ', 'yPYX6XyDZ5TJqLdJJDU', 'Clear', 'CreateForPersistenceValidation'
                          Source: setup.exe, MsalCachePersistenceException.csHigh entropy of concatenated method names: 'bS7Vp2khe0bkWkKsVhE', 'zwZlZOkaft6VbqJcCFj', 'wauE1LkNmpj0ADHP32H', 'skerukkKFqYcTi7g1Y7', 'wx8OWYkLsiC45WBVdX9', 'rUR8Kgkbw0t9HqSn34J'
                          Source: setup.exe, MsalCacheHelper.csHigh entropy of concatenated method names: '_003CGetAccountIdentifiersNoLockAsync_003Eb__0', 'HFHHhmgnfs5buvhbgEm', 'dcePVZgUuIynH1KyaTg', 'HyIjQ4g3NNR5Mnp7BMl', 'DdRTuHg0PXWRIYeFPMY', 'v7s7GVg5RJIYlTADOe0', 'h0KY0OgRLPSuls7yDg9', 'oTMxwfglLJsFpBbBNcT', 'IlRsdVg15Qw5CfoL0vl', 'Slkw2bgsJbTZa8jNRtG'
                          Source: setup.exe, TraceSourceLogger.csHigh entropy of concatenated method names: 'LogInformation', 'LogError', 'LogWarning', 'LdTC3CjecK', 'FbVlVwyvMpEeqTKIZBe', 'JwdDMIyM1njdGSJme1Y', 'agHTKmyV88cTOR8iv4c', 'YsQNWjyk6RXaKdft0by', 'hw4agHyygc8eCHemFqZ', 'HmMLbQygPOkuuOLYyJ4'
                          Source: setup.exe, MacOSKeychain.csHigh entropy of concatenated method names: 'Get', 'AddOrUpdate', 'Remove', 'xPVmMNl2b1', 'oLKmZv22Wq', 'QcDmoYqwO2', 'WpXmABhvgc', 'rpmmfbGxR8', 'Ssp08qyqNL0L0QdA5c8', 'KWqP4dy9scuJYbFej23'
                          Source: setup.exe, FileIOWithRetries.csHigh entropy of concatenated method names: '_003CDeleteCacheFile_003Eb__0', 'it1gwVyT2GAd4s8Sc0W', 'X0oKjyy8estWGRNjuIF', 'ks96x4yQyYyHkV2c6co', 'eNFwSGyBafF5Q5Ta8XB', 'Q5BnYWy7p64V7Jfy8M4', 'lNuv0fyzvU4Fu5gGSbx', 'M6sOdcg9bkMljr8htXr', 'n4hMaOg6wo7kjyCvewR', '_003CWriteDataToFile_003Eb__0'
                          Source: setup.exe, DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: 'f0FXDHQW7qZ3oDEiQG3', 'eYveyWQxE5Fm0PVauvD', 'vh65wuQpbjnEZ1k3UbD', 'ce4DmfsmSrOT856tDgfrkMb', 'D4r4O0AxSI', 'cEUYZ3QYdK70RedPZW6', 'xMGsIIQD9NXTfgZ7N9R', 'ko0nodQQNbjDJgKlGOO', 'OLTl6mQBgcx8labgqsx', 'x6lU58QTBC3iCqAHlqq'
                          Source: setup.exe, CDCWSn7SaPjUwoq2Cc.csHigh entropy of concatenated method names: 'I0aald448W5kE', 'KfG3iIQIWL40Td6WdLQ', 'AlZSFLQM5r4GIZM7OC6', 'OTU1CvQVOTHrFbY5FXJ', 'KwjltxQryTIIpaSG85s', 'Jf4ipPQ27LCF3vty06y', 'kOP6MjQvj40nk1lcxZd', 'gKyNL7Qk59hDbsoQXCp', 'c6j9qPQydywyQhSuhAo', 'BJ9AkrQgdPy79OAfSZm'
                          Source: setup.exe, SvgObject.csHigh entropy of concatenated method names: 'SetName', 'GetName', 'SetId', 'GetId', 'SetClass', 'GetClass', 'SetType', 'GetType', 'SetTitle', 'GetTitle'
                          Source: setup.exe, SvgAnimationLayer.csHigh entropy of concatenated method names: 'LoadDiagrams', 'UnloadDiagrams', 'HandleMouseMove', 'HandleMouseDown', 'HandleMouseLeave', 'kF7CP0ef54', 'cxRCBL8hd5', 'k80C2HINZa', 'OULCq2g5lh', 'njhCL0rrsS'
                          Source: setup.exe, EmbeddedBitmapDataConverter.csHigh entropy of concatenated method names: 'CanConvertFrom', 'CanConvertTo', 'ConvertFrom', 'ConvertTo', 'bWynLodXwNfV4vEDv32', 'YjRV1Od3dXiAlPdHkGg', 'Nm3Qw4dG8pcNGyVmnjb', 'GhwdXAdwmRQbpN9Uwub', 'cu4inQd0mut87EgqkBI', 'IE5MotdnX8iZxAoKd7b'
                          Source: setup.exe, EmbeddedBitmapSource.csHigh entropy of concatenated method names: 'CopyPixels', 'CloneCore', 'CloneCurrentValueCore', 'GetAsFrozenCore', 'GetCurrentValueAsFrozenCore', 'CreateInstanceCore', 'xKpCGybDDp', 'nCpCmnXmva', 'fIhCCKDrTK', 'zROCuM7BeL'
                          Source: setup.exe, ZoomPanAnimationHelper.csHigh entropy of concatenated method names: '_003CStartAnimation_003Eb__0', 'EwTbM9AaVTeeBTqQxaF', 'YLUnlAALcO6ei3xQHro', 'ySxZ8LAKBQ767BedUof', 'gWBmYAAh8hkc7ttqJbS', 'eVYWMxAbxmLOb5ESqev', 'WKXdoOAflCQAEebKHxt', 'NoaD0FAZkQZ3w5hk8L3', 'eDFZRWAHTBYSDCJXEW7', 'StartAnimation'
                          Source: setup.exe, SvgAnimator.csHigh entropy of concatenated method names: 'Start', 'Stop', 'qmTs0hor89Ft9vMAdRX', 'Wpoo9Ho2rv0GmAq9kXH', 'ysLyIyoImadMWbtWfyG', 'FSv21loMiA0FGNEsTq0', 'UNjYkUoVODqkHbs6BFM', 'QBMAkjov7GjhMYg92xg', 'VrnReOokN1tX9xeIKQ1', 'EVTBE6oyOUhfsiwgcG0'
                          Source: setup.exe, ZoomPanControl.csHigh entropy of concatenated method names: '_003CAnimatedZoomTo_003Eb__0', 'PGKrtPAwbZpdq5hMOnM', 'JND1cSAiQnKET9kCWeh', 'w8dF2nAGvOpoWUGvJS0', '_003CAnimatedZoomPointToViewportCenter_003Eb__0', 'NtrwmmA0Tsdq19Jg1HC', 'VugnxUAnn1uVW17VgoN', 'taGZK6AXP1UilQOWH9g', 'vry719A34sYWExchErQ', 'p8jXW1AUTl9brtxKwWj'
                          Source: setup.exe, SvgDrawingCanvas.csHigh entropy of concatenated method names: 'LoadDiagrams', 'LoadDiagrams', 'UnloadDiagrams', 'RenderDiagrams', 'RenderDiagrams', 'GetVisualChild', 'MeasureOverride', 'OnMouseDown', 'OnMouseMove', 'OnMouseUp'
                          Source: setup.exe, Forms.csHigh entropy of concatenated method names: 'Dispose', 'vRF6h5r0eA', 'JwQqnFEQd3xXxF6H7vU', 'lx1gMaEBjZxMZLoyykj', 'KsHl2cEYBw7h1Z357CH', 'PjRMaPEDIHaJgN5aQKh', 'Tl1Pq3ETcxZ4iPiI4BK', 'VtQ4VmE8LDt5wRCsTre', 'XBihvjE7npDj5xjg6mr', 'KWyQJ1EzxnRm74NoL5B'
                          Source: setup.exe, Telemetry.csHigh entropy of concatenated method names: 'QueueOperationEvent', 'QueueOperationEvent', 'QueueOperationEvent', 'TQWGKWAOAq', 'rmsGRujo2W', 'POHGF0v8ny', 'v88sSTIvvVmw5sgB3bQ', 'uJdtCyIkIrdlkBiPyJv', 'F20tGYIyC85qodp1waq', 'YVBcjRIggZ3wbbOb90P'
                          Source: setup.exe, ExtensionDownloadManager.csHigh entropy of concatenated method names: '_003CDownloadExtensionsAsync_003Eb__0', 'NxDWeKMorMXUgitwkSE', 'U7HcRmMgg7Q6RvNCL9c', 'B7v1eOMdFGghHUnkvPh', 'kZGVhRMpNFcSfqWVkP1', 'vy7g25MW4OwystWDoYT', 'guKWSTMxWh4wr4aSi2J', 'DULpgJMACCZmQJRhktL', 'wvqG8NMurnbI8NlWcuR', 'DownloadExtensionsAsync'
                          Source: setup.exe, AutoUpdate.csHigh entropy of concatenated method names: '_003CMain_003Eb__0', 'ynnVX6MS1EDw3FYImS2', 'v9ZpFrMN2i7RgEdxURm', 'gcrcdKM6GKCyweaxdi5', 'ofr1aSMqcxsTj9W2fjH', '_003CUpdateExtensions_003Eb__2', 'zje60xMa6vRmJXbWjvN', 'zx5Im3MLFe1KVWmtJEc', 'FtqgvwMKBRpsqT9FnLG', 'bjIkOuMhcpoeUVOXiXX'
                          Source: setup.exe, Resources.csHigh entropy of concatenated method names: 'vdMk7A2LSyvvNVlKGLR', 'PWEKQ32b6Mg301ygfeN', 'jS2Gmp2fEL5pK8VDFbt', 'Giq3E22hhFCn2wyeovw', 'k4S1um2a6UMeCqGyYoX', 'udSqse2ZIPmti8IJJNJ', 'qORU0U2HKn8tcNyMORf', 'Vauk8y2ihh26Cb54w9r'
                          Source: setup.exe, Resources.csHigh entropy of concatenated method names: 'fqXa33x7UpTutEKoMWJ', 'KmUVIoxzxSbCARONVRa', 'hj7E2RxTSp4EFE2ICcg', 'ew7QG3x86obEgqB267j', 'w06Qv0A9NCHhDY8Wp3W', 'yqukxxA6yrUOSBuP5dd'
                          Source: setup.exe, EventListenerMap.csHigh entropy of concatenated method names: 'SUqp9KnKa0', 'AddEventListener', 'RemoveEventListener', 'FireEvent', 'HasEventListenerNs', 'Lock', 'Unlock', 'cvwYWlDOqse9W6xjopZ', 'gEX0pYDtnuTLhYAel3b', 'oPfuQFDsTSsS42U3tma'
                          Source: setup.exe, EventTarget.csHigh entropy of concatenated method names: 'AddEventListener', 'RemoveEventListener', 'DispatchEvent', 'AddEventListenerNs', 'RemoveEventListenerNs', 'WillTriggerNs', 'HasEventListenerNs', 'FireEvent', 'JbrP3wDgECrc7d08RwU', 'SIDy4BDklQ7DtlGPVMZ'
                          Source: setup.exe, CDataSection.csHigh entropy of concatenated method names: 'AddEventListener', 'RemoveEventListener', 'DispatchEvent', 'AddEventListenerNs', 'RemoveEventListenerNs', 'WillTriggerNs', 'HasEventListenerNs', 'FireEvent', 'tdZYOIAjvj7XXke1eYD', 'bKmOvDAC9MYgrDP54Q2'
                          Source: setup.exe, Attribute.csHigh entropy of concatenated method names: 'AddEventListener', 'RemoveEventListener', 'DispatchEvent', 'AddEventListenerNs', 'RemoveEventListenerNs', 'WillTriggerNs', 'HasEventListenerNs', 'FireEvent', 'DZ0IJGAsXUwtF6wUoh5', 'SJ1VAZAlVR8o5k0OYeC'
                          Source: setup.exe, SignificantWhitespace.csHigh entropy of concatenated method names: 'AddEventListener', 'RemoveEventListener', 'DispatchEvent', 'AddEventListenerNs', 'RemoveEventListenerNs', 'WillTriggerNs', 'HasEventListenerNs', 'FireEvent', 'HVgdliYyVM3lHP2GIif', 'QaDD9WYgA0cXFj9Rv4o'
                          Source: setup.exe, DocumentType.csHigh entropy of concatenated method names: 'AddEventListener', 'RemoveEventListener', 'DispatchEvent', 'AddEventListenerNs', 'RemoveEventListenerNs', 'WillTriggerNs', 'HasEventListenerNs', 'FireEvent', 'fAkZkiuQjS8mdZsZ0eS', 'effPDAuBjlPxS5TGG8H'
                          Source: setup.exe, Text.csHigh entropy of concatenated method names: 'AddEventListener', 'RemoveEventListener', 'DispatchEvent', 'AddEventListenerNs', 'RemoveEventListenerNs', 'WillTriggerNs', 'HasEventListenerNs', 'FireEvent', 'wVUdRxYDEO3yUyLrMrJ', 'bBpUgSYQi54CY1dx9JF'
                          Source: setup.exe, Declaration.csHigh entropy of concatenated method names: 'AddEventListener', 'RemoveEventListener', 'DispatchEvent', 'AddEventListenerNs', 'RemoveEventListenerNs', 'WillTriggerNs', 'HasEventListenerNs', 'FireEvent', 'u5eqHFAzHaTXcwqk7Qk', 'SLRHSDu93hDBx6bVWW2'
                          Source: setup.exe, Element.csHigh entropy of concatenated method names: 'AddEventListener', 'RemoveEventListener', 'DispatchEvent', 'AddEventListenerNs', 'RemoveEventListenerNs', 'WillTriggerNs', 'HasEventListenerNs', 'FireEvent', 'OVe71vYfDyabg9AmEHN', 'EB6Y4YYZp25iFwLXekV'
                          Source: setup.exe, Whitespace.csHigh entropy of concatenated method names: 'AddEventListener', 'RemoveEventListener', 'DispatchEvent', 'AddEventListenerNs', 'RemoveEventListenerNs', 'WillTriggerNs', 'HasEventListenerNs', 'FireEvent', 'sET0ECDNkOwQceDNG9J', 'SHrcDmDKPBPdZZ2fnRQ'
                          Source: setup.exe, MyProject.csHigh entropy of concatenated method names: 'WYixLETnd', 's1wGXwdhM', 'Equals', 'GetHashCode', 'GetType', 'ToString', 'K4BlYTwf1pBH0elSNl', 'KuEhY7Xb85743psetV', 't3QIXR3fUaJR3Ipkh2', 'P48u8g0RMyish8oRfo'
                          Source: setup.exe, LibSystem.csHigh entropy of concatenated method names: 'dlopen', 'dlsym', 'GetGlobal', 'WAtINgVfM4mFs4eR0gw', 'QQ3EJLVZ8BWL5c1T1wh', 'N97JXcVL6eksuK6QZDj', 'YckiaLVbUOIPKExViax'
                          Source: setup.exe, KKr6hZkjvwWjdm9A4Z.csHigh entropy of concatenated method names: 'Ts6ald5q0nxNL', 'JiVald5jQMCpQ', 'AeMk7ZBXafmRMrjVHYv', 'LMbRw0B38CpgAiCfnDg', 'LvuirWB0XkomUWR2c1Z', 'MnCbmQBnTvJk2KHnRKJ', 'iuyfSrBURkhmpBiPXYM'
                          Source: 0.2.setup.exe.31b4220.1.raw.unpack, fDX9tehJ5EFemhKZwc.csHigh entropy of concatenated method names: 'ce4DmfsmSrOT856tDgfrkMb', 'NvQOxwsIFR', 'QsUuklFoHUiQD', 'MCRoDX9te', 'l5EbFemhK', 'uwcnnhQXJ', 'J3PigtLyh', 'PwdNpFGeB', 'XCj67ZIOy', 'w09DYCs5D'
                          Source: 0.2.setup.exe.31b4220.1.raw.unpack, zcrmeG4DKc05Qj8A7l.csHigh entropy of concatenated method names: 'Ys7O1WDVbX', 'EIxO3RK2jf', 'ov3OzJmFFU', 'KJS0ILfinW', 'Gtt0O5H9rf', 'Gvj00KAYqN', 'hUG0r1tocH', 'PBb0lrpBsM', 'pGy05VOh0y', 'j3M0RfBB5l'

                          Persistence and Installation Behavior

                          barindex
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 BlobJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\setup.exe.logJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                          Malware Analysis System Evasion

                          barindex
                          Source: Yara matchFile source: Process Memory Space: setup.exe PID: 1668, type: MEMORYSTR
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                          Source: C:\Users\user\Desktop\setup.exeMemory allocated: 2F50000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeMemory allocated: 3140000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeMemory allocated: 2F50000 memory reserve | memory write watchJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 1360000 memory reserve | memory write watchJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2E70000 memory reserve | memory write watchJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4F70000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 808Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 3860Jump to behavior
                          Source: C:\Users\user\Desktop\setup.exe TID: 2144Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2820Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 4232Thread sleep count: 808 > 30Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 4232Thread sleep count: 3860 > 30Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2544Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                          Source: C:\Users\user\Desktop\setup.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
                          Source: RegAsm.exe, 00000002.00000002.2266427907.0000000006358000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllYY
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000003477000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.0000000003411000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.00000000030C8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.0000000002FEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 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
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                          Source: setup.exe, 00000000.00000002.2131936682.0000000004253000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: HEPEJHGFSOFGLEZHSDPMBOIMSQUUBWBWZKJTRKIEROAEJSPLAA
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                          Source: RegAsm.exe, 00000002.00000002.2262082665.000000000401E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                          Source: RegAsm.exe, 00000002.00000002.2262082665.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeMemory allocated: page read and write | page guardJump to behavior

                          HIPS / PFW / Operating System Protection Evasion

                          barindex
                          Source: C:\Users\user\Desktop\setup.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                          Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                          Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 432000Jump to behavior
                          Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 450000Jump to behavior
                          Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: EEB008Jump to behavior
                          Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                          Source: C:\Users\user\Desktop\setup.exeQueries volume information: C:\Users\user\Desktop\setup.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: dump.pcap, type: PCAP
                          Source: Yara matchFile source: 0.2.setup.exe.475f0d0.7.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.475f0d0.7.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.47ab100.5.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.46c7080.6.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.467b050.2.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.47ab100.5.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.467b050.2.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.46c7080.6.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.4518830.3.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.43b6000.4.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000002.2131936682.00000000047A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2131936682.00000000046BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000002.00000002.2255836042.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2131936682.000000000470A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2131936682.0000000004145000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2131936682.0000000004253000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: setup.exe PID: 1668, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5876, type: MEMORYSTR
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000003233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum\walletsLR
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000003233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q4C:\Users\user\AppData\Roaming\Electrum\wallets\*
                          Source: setup.exe, 00000000.00000000.2122849516.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: VXMRSATZQXXMMNWAEJAXXRBKCAMZDJOTGRLXQJBREOKQEKGTGZQKSY
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000003233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.walletLR
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000003233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum\walletsLR
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000003233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.walletLR
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000003233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: qdC:\Users\user\AppData\Roaming\Binance
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000003233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum\walletsLR
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000003233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q&%localappdata%\Coinomi\Coinomi\walletsLR
                          Source: RegAsm.exe, 00000002.00000002.2257653819.0000000003233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q8C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*`
                          Source: setup.exe, 00000000.00000002.2129820477.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: set_UseMachineKeyStore
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                          Source: Yara matchFile source: 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000002.00000002.2257653819.0000000003233000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5876, type: MEMORYSTR

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: dump.pcap, type: PCAP
                          Source: Yara matchFile source: 0.2.setup.exe.475f0d0.7.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.475f0d0.7.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.47ab100.5.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.46c7080.6.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.467b050.2.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.47ab100.5.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.467b050.2.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.46c7080.6.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.4518830.3.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.setup.exe.43b6000.4.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000002.2131936682.00000000047A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2131936682.00000000046BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000002.00000002.2255836042.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2131936682.000000000470A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2131936682.0000000004145000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2131936682.0000000004253000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: setup.exe PID: 1668, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5876, type: MEMORYSTR
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                          Windows Management Instrumentation
                          1
                          DLL Side-Loading
                          311
                          Process Injection
                          1
                          Masquerading
                          1
                          OS Credential Dumping
                          221
                          Security Software Discovery
                          Remote Services11
                          Archive Collected Data
                          1
                          Encrypted Channel
                          Exfiltration Over Other Network MediumAbuse Accessibility Features
                          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                          DLL Side-Loading
                          1
                          Disable or Modify Tools
                          LSASS Memory1
                          Process Discovery
                          Remote Desktop Protocol3
                          Data from Local System
                          1
                          Non-Standard Port
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)241
                          Virtualization/Sandbox Evasion
                          Security Account Manager241
                          Virtualization/Sandbox Evasion
                          SMB/Windows Admin SharesData from Network Shared Drive1
                          Non-Application Layer Protocol
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                          Process Injection
                          NTDS1
                          Application Window Discovery
                          Distributed Component Object ModelInput Capture11
                          Application Layer Protocol
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                          Deobfuscate/Decode Files or Information
                          LSA Secrets1
                          File and Directory Discovery
                          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                          Obfuscated Files or Information
                          Cached Domain Credentials113
                          System Information Discovery
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                          Install Root Certificate
                          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                          Software Packing
                          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                          DLL Side-Loading
                          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          setup.exe53%ReversingLabsByteCode-MSIL.Trojan.RedlineStealer
                          setup.exe100%Joe Sandbox ML
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          http://tempuri.org/0%URL Reputationsafe
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                          https://api.ip.sb/ip0%URL Reputationsafe
                          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id23ResponseD0%Avira URL Cloudsafe
                          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%Avira URL Cloudsafe
                          https://github.com/AzureAD/microsoft-authentication-extensions-for-dotnet0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id2Response0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id12Response0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id14ResponseD0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                          http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue0%URL Reputationsafe
                          http://ocsp.sectigo.com00%URL Reputationsafe
                          http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                          http://tempuri.org/Entity/Id21Response0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id6ResponseD0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id80%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id90%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id40%Avira URL Cloudsafe
                          http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id50%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id70%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id19Response0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id60%Avira URL Cloudsafe
                          http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id13ResponseD0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/10/wsat0%Avira URL Cloudsafe
                          http://sharpvectors.codeplex.com/runtime/0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id15Response0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp90%Avira URL Cloudsafe
                          http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/04/sc0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id6Response0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id1ResponseD0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id9Response0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id220%Avira URL Cloudsafe
                          http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA10%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id200%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id210%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id230%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id240%Avira URL Cloudsafe
                          185.172.128.33:89700%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id24Response0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id1Response0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly0%Avira URL Cloudsafe
                          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/04/trust0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id21ResponseD0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id110%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id10ResponseD0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id100%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id120%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id16Response0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id130%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id140%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id150%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id160%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id170%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id5Response0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id180%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id15ResponseD0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id190%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id10Response0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/02/trust/Renew0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id11ResponseD0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id8Response0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey0%Avira URL Cloudsafe
                          http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.00%Avira URL Cloudsafe
                          http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2006/02/addressingidentity0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id17ResponseD0%Avira URL Cloudsafe
                          http://tempuri.org/Entity/Id8ResponseD0%Avira URL Cloudsafe
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          15.164.165.52.in-addr.arpa
                          unknown
                          unknownfalse
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            185.172.128.33:8970true
                            • Avira URL Cloud: safe
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#TextRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/sc/sctRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id14ResponseDRegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/AzureAD/microsoft-authentication-extensions-for-dotnetsetup.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id23ResponseDRegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id12ResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Entity/Id2ResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id21ResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_WrapRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id9RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id8RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id6ResponseDRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id5RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/PrepareRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id4RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id7RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id6RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id19ResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licenseRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/IssueRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/AbortedRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id13ResponseDRegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/faultRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/10/wsatRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://sharpvectors.codeplex.com/runtime/setup.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id15ResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000002.00000002.2257653819.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/RenewRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id6ResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.ip.sb/ipsetup.exe, 00000000.00000002.2131936682.00000000046BE000.00000004.00000800.00020000.00000000.sdmp, setup.exe, 00000000.00000002.2131936682.00000000047A2000.00000004.00000800.00020000.00000000.sdmp, setup.exe, 00000000.00000002.2131936682.0000000004253000.00000004.00000800.00020000.00000000.sdmp, setup.exe, 00000000.00000002.2131936682.000000000470A000.00000004.00000800.00020000.00000000.sdmp, setup.exe, 00000000.00000002.2131936682.0000000004145000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2255836042.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/04/scRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id1ResponseDRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/CancelRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id9ResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id20RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id21RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id22RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id23RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id24RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/IssueRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id24ResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id1ResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/ReplayRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegoRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64BinaryRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id21ResponseDRegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/08/addressingRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/trust/RST/IssueRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/10/wsat/CompletionRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/04/trustRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id10RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id11RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id10ResponseDRegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id12RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id16ResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/CancelRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id13RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2257653819.0000000002F8B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id14RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id15RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id16RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/trust/NonceRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id17RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id18RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id5ResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id19RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id15ResponseDRegAsm.exe, 00000002.00000002.2257653819.0000000003233000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id10ResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/trust/RenewRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id11ResponseDRegAsm.exe, 00000002.00000002.2257653819.00000000031DD000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id8ResponseRegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://ocsp.sectigo.com0setup.exefalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0RegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2006/02/addressingidentityRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id17ResponseDRegAsm.exe, 00000002.00000002.2257653819.00000000033BD000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/soap/envelope/RegAsm.exe, 00000002.00000002.2257653819.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Entity/Id8ResponseDRegAsm.exe, 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            185.172.128.33
                            unknownRussian Federation
                            50916NADYMSS-ASRUtrue
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1465699
                            Start date and time:2024-07-02 00:20:07 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 39s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:7
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:setup.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/6@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 94%
                            • Number of executed functions: 113
                            • Number of non-executed functions: 25
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • VT rate limit hit for: setup.exe
                            TimeTypeDescription
                            18:21:07API Interceptor24x Sleep call for process: RegAsm.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            185.172.128.331Vkf7silOj.exeGet hashmaliciousLummaC, Amadey, Mars Stealer, PureLog Stealer, RedLine, SmokeLoader, StealcBrowse
                              X8ljh02lU9.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                file.exeGet hashmaliciousRedLineBrowse
                                  setup.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                                    setup.exeGet hashmaliciousPython Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                      4TzzRzv0Hs.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                                        KmhrN2q5ZO.exeGet hashmaliciousPython Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, zgRATBrowse
                                          DPqKF5vqpe.exeGet hashmaliciousLummaC, Python Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, SystemBCBrowse
                                            HO3wesohQb.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                              SecuriteInfo.com.Win32.Evo-gen.26431.15713.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, StealcBrowse
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                NADYMSS-ASRU1Vkf7silOj.exeGet hashmaliciousLummaC, Amadey, Mars Stealer, PureLog Stealer, RedLine, SmokeLoader, StealcBrowse
                                                • 185.172.128.33
                                                X8ljh02lU9.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                                • 185.172.128.33
                                                file.exeGet hashmaliciousRedLineBrowse
                                                • 185.172.128.33
                                                35WqOa1tGb.exeGet hashmaliciousGCleaner, NymaimBrowse
                                                • 185.172.128.90
                                                DXe9Ayi7uC.exeGet hashmaliciousGCleaner, NymaimBrowse
                                                • 185.172.128.69
                                                hsRju5CPK2.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, zgRATBrowse
                                                • 185.172.128.116
                                                mCTacyNuyM.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                                                • 185.172.128.116
                                                file.exeGet hashmaliciousLummaC, Python Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, SmokeLoaderBrowse
                                                • 185.172.128.116
                                                setup.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                                                • 185.172.128.33
                                                j3KmxDxlLT.exeGet hashmaliciousAmadey, SmokeLoaderBrowse
                                                • 185.172.128.116
                                                No context
                                                No context
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 05:47:20 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
                                                Category:dropped
                                                Size (bytes):2104
                                                Entropy (8bit):3.469522369746748
                                                Encrypted:false
                                                SSDEEP:48:8Std5TvGK0lRYrnvPdAKRkdAGdAKRFdAKR6P:8SZbF7
                                                MD5:EA3FBD383F8B0203568B69944F93457E
                                                SHA1:4462E364303FDBF50BD028D2BB7241697EAAC81F
                                                SHA-256:F873A72D0B10B8AB0CB86ECD9E9BCBFDA11B1B50804910F666024B20ADC464B0
                                                SHA-512:C3F04116686CE771FC02961ABE50B1534D48D524AB30744B47C6B175D533F53E0AEC936748D20BC253C49CDC233700624482B2D56C9B88D69FD4E95CF836B81C
                                                Malicious:false
                                                Reputation:low
                                                Preview:L..................F.@.. ......,.......W....X.&&... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....EW.3..PROGRA~1..t......O.IEW.5....B...............J.......j.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VEW@2....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.2..Chrome..>......CW.VEW.2....M.....................7...C.h.r.o.m.e.....`.1.....EW.2..APPLIC~1..H......CW.VEW.2..........................7...A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.L .chrome.exe..F......CW.VEW.5.........................l...c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.;.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.!.-.-.p.r.o.x.y.-.s.e.r.v.e.r
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):3274
                                                Entropy (8bit):5.3318368586986695
                                                Encrypted:false
                                                SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymRLKTqdqlq7qqjqc85VD:Pq5qHwCYqh3qtI6eqzxP0at9KTqdqlq0
                                                MD5:0C1110E9B7BBBCB651A0B7568D796468
                                                SHA1:7AEE00407EE27655FFF0ADFBC96CF7FAD9610AAA
                                                SHA-256:112E21404A85963FB5DF8388F97429D6A46E9D4663435CC86267C563C0951FA2
                                                SHA-512:46E37552764B4E61006AB99F8C542D55B2418668B097D3C6647D306604C3D7CA3FAF34F8B4121D94B0E7168295B2ABEB7C21C3B96F37208943537B887BC81590
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                Process:C:\Users\user\Desktop\setup.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1362
                                                Entropy (8bit):5.342650164635672
                                                Encrypted:false
                                                SSDEEP:24:MLU84qpE4KlKDE4KhKiKhuE4UofoJE4r4CeylEE4aP6AE4KIRU:Mgv2HKlYHKh3ouHgJHreylEHMHKoU
                                                MD5:88842857A642F0B316D14FEE1CD1C820
                                                SHA1:9164100C7DA76EE281ECB4F02E38A98883BED4BA
                                                SHA-256:7C93C110A021ACE31ECE4BEBD9A8AEF546D6C4D1AFDE64694C5C0E1CCA36DA04
                                                SHA-512:97C296976ABA8CBFDCA5772861113C938CB075F947E801143437FE4CDE639FAABA829DFF07A1D1832BF26D691E5C9F3E21279A9BBCAEDBCB85CE6637B6F6E66C
                                                Malicious:true
                                                Reputation:low
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\WindowsBase\4d760e3e4675c4a4c66b64205fb0d001\WindowsBase.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\17470ef0c7a174f38bdcadacc3e310ad\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, Publi
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2662
                                                Entropy (8bit):7.8230547059446645
                                                Encrypted:false
                                                SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                                MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                                SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                                SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                                SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2662
                                                Entropy (8bit):7.8230547059446645
                                                Encrypted:false
                                                SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                                MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                                SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                                SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                                SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2251
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3::
                                                MD5:0158FE9CEAD91D1B027B795984737614
                                                SHA1:B41A11F909A7BDF1115088790A5680AC4E23031B
                                                SHA-256:513257326E783A862909A2A0F0941D6FF899C403E104FBD1DBC10443C41D9F9A
                                                SHA-512:C48A55CC7A92CEFCEFE5FB2382CCD8EF651FC8E0885E88A256CD2F5D83B824B7D910F755180B29ECCB54D9361D6AF82F9CC741BD7E6752122949B657DA973676
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.619881024854986
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                                • Win32 Executable (generic) a (10002005/4) 49.93%
                                                • Windows Screen Saver (13104/52) 0.07%
                                                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                File name:setup.exe
                                                File size:3'360'856 bytes
                                                MD5:e671a39ffdad8e262a45ef77d97a14f4
                                                SHA1:d451ad059bf52c22ff5de8ed7968991bbc169828
                                                SHA256:d01fe3dbc995e4b5b209631e5ae30b792d88a78676f695127f8a5db9bf59b48c
                                                SHA512:1352b04ffd300060e9abcc2880e53c4957a2b128b006603a20a08793a57b766b6579f5c53325b3fccc57db660fb7f14b93b7259e9fd0e1f2a78c53be026f3a20
                                                SSDEEP:49152:27vtm1geO0RDX0/BxBL6V2nM5PsKGPGatU8H+f7z0VBeNPswBr:27VmdOMeBvLa2nVKG+aZ20BSP3
                                                TLSH:DEF5BF0738808E91F5A85737D1DA810847BACF5167C3E73BB478765E66263AB3A0D4CE
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....~f..................2..........%2.. ...@2...@.. ........................3.....(.3...@................................
                                                Icon Hash:0080987d75787801
                                                Entrypoint:0x72259e
                                                Entrypoint Section:.text
                                                Digitally signed:true
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x667E9108 [Fri Jun 28 10:31:36 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Signature Valid:false
                                                Signature Issuer:CN=DigiCert Global G3 Code Signing ECC SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                Signature Validation Error:The digital signature of the object did not verify
                                                Error Number:-2146869232
                                                Not Before, Not After
                                                • 30/11/2022 01:00:00 08/01/2026 00:59:59
                                                Subject Chain
                                                • CN="MobiSystems, Inc.", O="MobiSystems, Inc.", L=San Diego, S=California, C=US, SERIALNUMBER=2286585, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=California, OID.1.3.6.1.4.1.311.60.2.1.3=US
                                                Version:3
                                                Thumbprint MD5:4F8B72AE4C273A3C4638902142975641
                                                Thumbprint SHA-1:1DC9E3CC71898F07B7BF27B24B9B2D4D107D73A3
                                                Thumbprint SHA-256:D8012F271CA2FDC511D4381F7D9A0C412D3511226CA1151F20FBE4B9F784AF1F
                                                Serial:01C60E11C04CC982258D28B6CE5F304D
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x3225500x4b.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3260000xfedc.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x3326e00x2178.rsrc
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3360000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x3224fb0x1c.text
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000x3205a40x32060080005872f00f60ed81cb084586346f67unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .sdata0x3240000x1e80x2004953f0434c71e6ab7ae25231c4f257a2False0.861328125data6.624018862309492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x3260000xfedc0x10000d4d7d4818308a11f35288bce6b7842feFalse0.6804962158203125data6.737286911526343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x3360000xc0x200789b3e2941260625d82021e1013984c1False0.044921875MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "2"0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x3261c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 3779 x 3779 px/m0.47162288930581614
                                                RT_ICON0x3272680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 3779 x 3779 px/m0.3867219917012448
                                                RT_ICON0x3298100x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 3779 x 3779 px/m0.3226854038734058
                                                RT_ICON0x32da380x7e2ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.0001547891771407
                                                RT_GROUP_ICON0x3358680x3edata0.8548387096774194
                                                RT_VERSION0x3358a80x448data0.43704379562043794
                                                RT_MANIFEST0x335cf00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                07/02/24-00:21:01.164468TCP2043234ET MALWARE Redline Stealer TCP CnC - Id1Response897049711185.172.128.33192.168.2.6
                                                07/02/24-00:21:11.236244TCP2043231ET TROJAN Redline Stealer TCP CnC Activity497118970192.168.2.6185.172.128.33
                                                07/02/24-00:21:00.973788TCP2046045ET TROJAN [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)497118970192.168.2.6185.172.128.33
                                                07/02/24-00:21:06.414223TCP2046056ET TROJAN Redline Stealer/MetaStealer Family Activity (Response)897049711185.172.128.33192.168.2.6
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jul 2, 2024 00:21:00.288544893 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:00.295943022 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:00.296017885 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:00.304446936 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:00.311671972 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:00.942466021 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:00.973788023 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:00.978611946 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:01.164468050 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:01.205923080 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:06.209831953 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:06.214632034 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:06.414222956 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:06.414274931 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:06.414345026 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:06.414407969 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:06.414417982 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:06.414434910 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:06.414446115 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:06.414483070 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:06.414506912 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:06.510835886 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:06.565176010 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:06.634291887 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:06.639379978 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:06.826550961 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:06.830811024 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:06.836636066 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:07.022568941 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:07.027542114 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:07.032372952 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:07.218743086 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:07.223021030 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:07.227911949 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:07.414938927 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:07.455781937 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:07.542285919 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:07.549384117 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:07.783307076 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:07.818811893 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:07.825371981 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.038096905 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.080821037 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:08.095241070 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:08.101828098 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.101953030 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:08.101980925 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.101989985 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.102041960 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:08.103437901 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.103449106 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.103457928 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.103466034 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.104423046 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.104434013 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.104441881 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.104449987 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.108355045 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.108683109 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.108692884 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.109188080 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.386255980 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:08.440179110 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:08.842667103 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:08.851300001 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:09.037045956 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:09.080773115 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:09.155806065 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:09.160649061 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:09.346738100 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:09.377547026 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:09.382311106 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:09.567771912 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:09.571630001 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:09.578788996 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:09.774732113 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:09.776757002 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:09.783108950 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:09.968396902 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:09.970474005 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:09.976449013 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:10.161890030 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:10.163002014 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:10.167841911 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:10.353277922 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:10.358586073 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:10.363401890 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:10.548902035 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:10.552728891 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:10.557609081 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:10.743134975 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:10.748555899 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:10.753458977 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:10.753570080 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:10.753632069 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:11.035903931 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:11.043807983 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:11.049273014 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:11.235296011 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:11.236243963 CEST497118970192.168.2.6185.172.128.33
                                                Jul 2, 2024 00:21:11.243554115 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:11.438546896 CEST897049711185.172.128.33192.168.2.6
                                                Jul 2, 2024 00:21:11.471925974 CEST497118970192.168.2.6185.172.128.33
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jul 2, 2024 00:21:18.435538054 CEST53554671.1.1.1192.168.2.6
                                                Jul 2, 2024 00:21:31.947217941 CEST5355891162.159.36.2192.168.2.6
                                                Jul 2, 2024 00:21:32.423532009 CEST6211753192.168.2.61.1.1.1
                                                Jul 2, 2024 00:21:32.431566954 CEST53621171.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Jul 2, 2024 00:21:32.423532009 CEST192.168.2.61.1.1.10x2658Standard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Jul 2, 2024 00:21:32.431566954 CEST1.1.1.1192.168.2.60x2658Name error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:18:20:57
                                                Start date:01/07/2024
                                                Path:C:\Users\user\Desktop\setup.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\setup.exe"
                                                Imagebase:0xaf0000
                                                File size:3'360'856 bytes
                                                MD5 hash:E671A39FFDAD8E262A45EF77D97A14F4
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.2131936682.00000000047A2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.2131936682.00000000046BE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.2131936682.000000000470A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.2131936682.0000000004145000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.2131936682.0000000004253000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:18:20:58
                                                Start date:01/07/2024
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                Imagebase:0xc40000
                                                File size:65'440 bytes
                                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000002.00000002.2255836042.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2257653819.0000000002F18000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2257653819.0000000003233000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:14.2%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:32
                                                  Total number of Limit Nodes:1
                                                  execution_graph 17001 5bafd78 17002 5bafdc5 VirtualProtect 17001->17002 17003 5bafe31 17002->17003 17004 5b9283e 17006 5b91fc4 17004->17006 17005 5b928a0 17006->17005 17007 5b91588 WriteProcessMemory 17006->17007 17008 5b91590 WriteProcessMemory 17006->17008 17009 5b91229 Wow64SetThreadContext 17006->17009 17010 5b91230 Wow64SetThreadContext 17006->17010 17017 5b919c0 17006->17017 17021 5b919b4 17006->17021 17025 5b91430 17006->17025 17029 5b91438 17006->17029 17033 5b91108 17006->17033 17037 5b90d79 17006->17037 17007->17006 17008->17006 17009->17006 17010->17006 17018 5b91a47 CreateProcessA 17017->17018 17020 5b91c9c 17018->17020 17020->17006 17022 5b919c0 17021->17022 17022->17022 17023 5b91c32 CreateProcessA 17022->17023 17024 5b91c9c 17023->17024 17024->17006 17026 5b91436 VirtualAllocEx 17025->17026 17028 5b914f4 17026->17028 17028->17006 17030 5b9147c VirtualAllocEx 17029->17030 17032 5b914f4 17030->17032 17032->17006 17034 5b9114c ResumeThread 17033->17034 17036 5b91198 17034->17036 17036->17006 17038 5b91108 ResumeThread 17037->17038 17040 5b91198 17038->17040 17040->17006 17041 5bcfeb0 17042 5bcfef8 VirtualAlloc 17041->17042 17043 5bcff63 17042->17043

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 5ba1340-5ba137e 1 5ba1380 0->1 2 5ba1385-5ba2566 call 5bcb3b0 0->2 1->2 27 5ba2568 2->27 28 5ba256d-5ba26d6 2->28 27->28 42 5ba26dc call 5bcde4f 28->42 43 5ba26dc call 5bcde60 28->43 39 5ba26e1-5ba271f 42->39 43->39
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141764224.0000000005BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5ba0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $ $!$#$$$&$&$($*$+$+$+$+$1$3$6$6$8$8$:$;$<$?$?$?7'B$A$C$C$C$D$E$E$E$G$GycB$I$K$M$M$M$O0}B$P$P$S$S$T$T$U$U$V$Z$[$[$\$]$^$^$^$^$`$a$c$jWbB$|;zB
                                                  • API String ID: 0-3036647579
                                                  • Opcode ID: eda13db208d8ad399fd12e1dadbe65b7d76d14ed218cc10abb7fcf7a973e1b41
                                                  • Instruction ID: c03a089d5114b8aa40dc88bab967ac35aa2eac315e3b92363bc508add2003178
                                                  • Opcode Fuzzy Hash: eda13db208d8ad399fd12e1dadbe65b7d76d14ed218cc10abb7fcf7a973e1b41
                                                  • Instruction Fuzzy Hash: 68B27EB4E0162A8FEB65CF1ACD4479ABAF6FB88305F0481E9D50CA7250DB795EC58F40

                                                  Control-flow Graph

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141806127.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5bc0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $ $!$#$$$&$&$($*$+$+$+$+$1$3$6$6$8$8$:$;$<$?$?$?7'B$A$C$C$C$D$E$E$E$G$GycB$I$K$M$M$M$O0}B$P$P$S$S$T$T$U$U$V$Z$[$[$\$]$^$^$^$^$`$a$c$jWbB$|;zB
                                                  • API String ID: 0-3036647579
                                                  • Opcode ID: 879f79bd171cd9a4286bc94cdd952c816b91706f648a609764c622d583b119d0
                                                  • Instruction ID: de56a1f0415ce0e64c96d41a1d15e16ccb0767b5706e6e327cd8758a1b2a2726
                                                  • Opcode Fuzzy Hash: 879f79bd171cd9a4286bc94cdd952c816b91706f648a609764c622d583b119d0
                                                  • Instruction Fuzzy Hash: F4B29FB4D016698FEB64CF2ADD84799BBB2FB88305F1481E9950CAB250D77A5EC5CF00

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 87 5ba1350-5ba137e 88 5ba1380 87->88 89 5ba1385-5ba2566 call 5bcb3b0 87->89 88->89 114 5ba2568 89->114 115 5ba256d-5ba26d6 89->115 114->115 130 5ba26dc call 5bcde4f 115->130 131 5ba26dc call 5bcde60 115->131 126 5ba26e1-5ba271f 130->126 131->126
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141764224.0000000005BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5ba0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $ $!$#$$$&$&$($*$+$+$+$+$1$3$6$6$8$8$:$;$<$?$?$?7'B$A$C$C$C$D$E$E$E$G$GycB$I$K$M$M$M$O0}B$P$P$S$S$T$T$U$U$V$Z$[$[$\$]$^$^$^$^$`$a$c$jWbB$|;zB
                                                  • API String ID: 0-3036647579
                                                  • Opcode ID: ca00e9d136462ef326e78e7657fc6666a6e086117995eb7b13e259c5c0b2601d
                                                  • Instruction ID: ede2ca3d67230e0658e6fc21119cf5776e15619fe967dcc27fe9621be68901a0
                                                  • Opcode Fuzzy Hash: ca00e9d136462ef326e78e7657fc6666a6e086117995eb7b13e259c5c0b2601d
                                                  • Instruction Fuzzy Hash: 9BB27EB4E0162A8FEB65CF1ACD4479ABAF6FB88305F0481E9D50CA7250DB795EC58F40

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 132 5bca0a0-5bca0c0 133 5bca0c7-5bcb38d call 5bcb3b0 call 5bccb52 132->133 134 5bca0c2 132->134 168 5bcb393 call 5ba1350 133->168 169 5bcb393 call 5ba1340 133->169 134->133 166 5bcb399-5bcb3a7 168->166 169->166
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141806127.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5bc0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $ $!$#$$$&$&$($*$+$+$+$+$1$3$6$6$8$8$:$;$<$?$?$?7'B$A$C$C$C$D$E$E$E$G$GycB$I$K$M$M$M$O0}B$P$P$S$S$T$T$U$U$V$Z$[$[$\$]$^$^$^$^$`$a$c$jWbB$|;zB
                                                  • API String ID: 0-3036647579
                                                  • Opcode ID: 3f668af4c2db968305dc108d2b3f97008e7098aed7f8c826e67f9b8e17a69541
                                                  • Instruction ID: 796615176327889adbfc808da6e1c97f4109e57a3360afa9590f5f6c49bb7ca3
                                                  • Opcode Fuzzy Hash: 3f668af4c2db968305dc108d2b3f97008e7098aed7f8c826e67f9b8e17a69541
                                                  • Instruction Fuzzy Hash: 2CA28EB4D016298FEB64CF2ADD44799BBF6FB88305F1481E9950CAB250EB795EC58F00

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 171 5bccb52-5bccb8e 172 5bccb95-5bcdd72 call 5bcca10 171->172 173 5bccb90 171->173 195 5bcdd78 call 5bcde4f 172->195 196 5bcdd78 call 5bcde60 172->196 173->172 192 5bcdd7e-5bcddbc 195->192 196->192
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141806127.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5bc0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $ $!$#$$$&$&$($*$+$+$+$+$1$3$6$6$8$8$:$;$<$?$?$?7'B$A$C$C$C$D$E$E$E$G$GycB$I$K$M$M$M$O0}B$P$P$S$S$T$T$U$U$V$Z$[$[$\$]$^$^$^$^$`$a$c$jWbB$|;zB
                                                  • API String ID: 0-3036647579
                                                  • Opcode ID: 0d1188eec7da1dc2e41fdf9334f4324a9a41e085026d6dc8d3316d5be0725021
                                                  • Instruction ID: cbaf77be89f200036cff8f0d0d9ad4052f40128c814725ccf17a0c0fbe42b3f0
                                                  • Opcode Fuzzy Hash: 0d1188eec7da1dc2e41fdf9334f4324a9a41e085026d6dc8d3316d5be0725021
                                                  • Instruction Fuzzy Hash: EBA291B4D01A698FEB64CF1ACD4479ABBF6FB88305F0481E9950CA7250EB794EC58F04

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 197 5bcde4f-5bcde8e 199 5bcde95-5bceed4 197->199 200 5bcde90 197->200 201 5bceef5 199->201 202 5bceed6-5bceedf 199->202 200->199 205 5bceef8-5bcef4b 201->205 203 5bceee6-5bceee9 202->203 204 5bceee1-5bceee4 202->204 206 5bceef3 203->206 204->206 208 5bcef52-5bcef90 205->208 206->205
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141806127.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5bc0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $ $!$#$$$&$&$($*$+$+$+$+$1$3$6$6$8$8$:$;$<$?$?$?7'B$A$C$C$C$D$E$E$E$G$GycB$I$K$M$M$M$O0}B$P$P$S$S$T$T$U$U$V$Z$[$[$\$]$^$^$^$^$`$a$c$jWbB$|;zB
                                                  • API String ID: 0-3036647579
                                                  • Opcode ID: d04dcf402dbce003c11cfed724c41285bea45041eec1a80d968e052b01b3c2ee
                                                  • Instruction ID: 5498340b8f97c0b1a9d8e33868da0b88b3ee6d2002386bf97a4cc6ec366033a8
                                                  • Opcode Fuzzy Hash: d04dcf402dbce003c11cfed724c41285bea45041eec1a80d968e052b01b3c2ee
                                                  • Instruction Fuzzy Hash: 00928EB5D01A698BEB64CF1ACD44799BBF6FB88305F0481EAD50CA7250EB794EC58F04

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 211 5bcde60-5bcde8e 212 5bcde95-5bceed4 211->212 213 5bcde90 211->213 214 5bceef5 212->214 215 5bceed6-5bceedf 212->215 213->212 218 5bceef8-5bcef4b 214->218 216 5bceee6-5bceee9 215->216 217 5bceee1-5bceee4 215->217 219 5bceef3 216->219 217->219 221 5bcef52-5bcef90 218->221 219->218
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141806127.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5bc0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $ $!$#$$$&$&$($*$+$+$+$+$1$3$6$6$8$8$:$;$<$?$?$?7'B$A$C$C$C$D$E$E$E$G$GycB$I$K$M$M$M$O0}B$P$P$S$S$T$T$U$U$V$Z$[$[$\$]$^$^$^$^$`$a$c$jWbB$|;zB
                                                  • API String ID: 0-3036647579
                                                  • Opcode ID: 9841897fce516a35764aae86bd63fbef4325cb85a2825dc701e89e7e2e7bf340
                                                  • Instruction ID: fd0f3d9c4965c8b95975c11c50ce1535319f995dc8847778460bd604b9db1758
                                                  • Opcode Fuzzy Hash: 9841897fce516a35764aae86bd63fbef4325cb85a2825dc701e89e7e2e7bf340
                                                  • Instruction Fuzzy Hash: F3928DB5D01A698FEB64CF1ACD44799BAF6FB88305F0481EAD50CA7250EB794EC58F04

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 366 5b91e88-5b91eb9 367 5b91ebb 366->367 368 5b91ec0-5b91fbf 366->368 367->368 370 5b92883-5b9289a 368->370 371 5b928a0-5b928a7 370->371 372 5b91fc4-5b92035 370->372 376 5b92040-5b92082 372->376 481 5b92085 call 5b919c0 376->481 482 5b92085 call 5b919b4 376->482 377 5b92087-5b920a7 378 5b920a9-5b920c4 377->378 379 5b920cf-5b9213b 377->379 378->379 385 5b9213d 379->385 386 5b92142-5b9216e 379->386 385->386 388 5b92170-5b92186 386->388 389 5b921d7-5b92212 386->389 487 5b92189 call 5b91229 388->487 488 5b92189 call 5b91230 388->488 392 5b9223a 389->392 393 5b92214-5b9222f 389->393 391 5b9218b-5b921ab 394 5b921ad-5b921c8 391->394 395 5b921d3-5b921d5 391->395 396 5b9223b-5b92245 392->396 393->392 394->395 395->396 398 5b9224c-5b9229c 396->398 399 5b92247 396->399 404 5b9229e-5b922b9 398->404 405 5b922c4-5b922dd 398->405 399->398 404->405 406 5b9233b-5b92362 405->406 407 5b922df-5b92313 405->407 413 5b9236e-5b9239b 406->413 407->406 412 5b92315-5b92330 407->412 412->406 479 5b9239e call 5b91438 413->479 480 5b9239e call 5b91430 413->480 415 5b923a0-5b923c6 416 5b923c8-5b923e3 415->416 417 5b923ee-5b9240a 415->417 416->417 483 5b9240d call 5b91588 417->483 484 5b9240d call 5b91590 417->484 420 5b9240f-5b9242f 421 5b92431-5b9244c 420->421 422 5b92457-5b9248d 420->422 421->422 426 5b925e7-5b92603 422->426 427 5b92609 426->427 428 5b92492-5b92519 426->428 430 5b92612-5b92643 427->430 437 5b925dc-5b925e1 428->437 438 5b9251f-5b92526 428->438 475 5b92646 call 5b91588 430->475 476 5b92646 call 5b91590 430->476 432 5b92648-5b92668 434 5b9266a-5b92685 432->434 435 5b92690-5b926c4 432->435 434->435 441 5b926cc-5b926df 435->441 442 5b926c6-5b926c9 435->442 437->426 445 5b92530-5b92559 438->445 443 5b926e1 441->443 444 5b926e6-5b92711 441->444 442->441 443->444 449 5b9277a-5b927b5 444->449 450 5b92713-5b92729 444->450 448 5b92564-5b9258e 445->448 473 5b92591 call 5b91588 448->473 474 5b92591 call 5b91590 448->474 456 5b927dd 449->456 457 5b927b7-5b927d2 449->457 477 5b9272c call 5b91229 450->477 478 5b9272c call 5b91230 450->478 451 5b92593-5b925b3 454 5b925db 451->454 455 5b925b5-5b925d0 451->455 453 5b9272e-5b9274e 458 5b92750-5b9276b 453->458 459 5b92776-5b92778 453->459 454->437 455->454 460 5b927de-5b927ed 456->460 457->456 458->459 459->460 485 5b927f0 call 5b90d79 460->485 486 5b927f0 call 5b91108 460->486 464 5b927f2-5b92812 467 5b9283a-5b9287e 464->467 468 5b92814-5b9282f 464->468 467->370 467->371 468->467 473->451 474->451 475->432 476->432 477->453 478->453 479->415 480->415 481->377 482->377 483->420 484->420 485->464 486->464 487->391 488->391
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141736317.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5b90000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (
                                                  • API String ID: 0-3887548279
                                                  • Opcode ID: 927e54b939b559f9bfb2d1e20897c8718d41866bf23932e6473158eaa23cf3d8
                                                  • Instruction ID: 908f650f276c53b30e20cb9cd6d5a48e8d8fac2b4a9b8c8a1a6a2fcf741a64e2
                                                  • Opcode Fuzzy Hash: 927e54b939b559f9bfb2d1e20897c8718d41866bf23932e6473158eaa23cf3d8
                                                  • Instruction Fuzzy Hash: 0352CE74E012299FDB68DF65C954BDDBBB2FB89300F1081EAD409AB291DB346E85CF50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 622 5bc6098-5bc60c2 623 5bc60cb-5bc60cf 622->623 624 5bc60c4 622->624 625 5bc60e6-5bc6100 623->625 626 5bc60d1-5bc60d5 623->626 624->623 633 5bc610b-5bc610f 625->633 634 5bc6102 625->634 627 5bc60db-5bc60e3 626->627 628 5bc63a4-5bc63af 626->628 627->625 635 5bc63b6-5bc641a 628->635 636 5bc611a-5bc613e 633->636 637 5bc6111-5bc6117 633->637 634->633 657 5bc6421-5bc6485 635->657 645 5bc62d9-5bc62eb 636->645 646 5bc6144-5bc6156 636->646 637->636 647 5bc62f3 645->647 646->635 651 5bc615c-5bc6160 646->651 650 5bc6395-5bc639c 647->650 651->635 652 5bc6166-5bc6170 651->652 656 5bc6176-5bc617a 652->656 652->657 656->645 658 5bc6180-5bc6184 656->658 703 5bc648c-5bc64f0 657->703 661 5bc6186-5bc618d 658->661 662 5bc6193-5bc6197 658->662 661->645 661->662 663 5bc619d-5bc61ad 662->663 664 5bc64f7-5bc650d 662->664 671 5bc61dd-5bc61e3 663->671 672 5bc61af-5bc61b5 663->672 669 5bc650f-5bc6514 664->669 670 5bc6579 664->670 677 5bc651e-5bc6525 669->677 678 5bc6516-5bc651c 669->678 675 5bc657f-5bc658a 670->675 676 5bc6655-5bc669e 670->676 673 5bc61e5 671->673 674 5bc61e7-5bc61f3 671->674 679 5bc61b9-5bc61c5 672->679 680 5bc61b7 672->680 681 5bc61f5-5bc6213 673->681 674->681 682 5bc658c-5bc659a 675->682 683 5bc65fe-5bc6602 675->683 694 5bc66a5-5bc66b6 676->694 695 5bc66a0 676->695 696 5bc652f-5bc6530 677->696 697 5bc6527-5bc652b 677->697 678->677 686 5bc61c7-5bc61d7 679->686 680->686 681->645 706 5bc6219-5bc621b 681->706 682->683 707 5bc659c-5bc65ac 682->707 690 5bc6604-5bc660a 683->690 691 5bc6650 683->691 686->671 686->703 701 5bc656e-5bc6577 690->701 702 5bc6610-5bc6616 690->702 691->676 705 5bc66d1-5bc66d5 694->705 695->694 697->696 704 5bc652d 697->704 701->670 708 5bc6618-5bc6623 702->708 709 5bc6643 702->709 703->664 704->696 712 5bc66b8-5bc66ca 705->712 713 5bc66d7-5bc66e2 705->713 714 5bc621d-5bc6231 706->714 715 5bc6236-5bc623a 706->715 707->683 728 5bc65ae-5bc65b1 707->728 710 5bc6639-5bc663c 708->710 711 5bc6625-5bc6633 708->711 717 5bc6648-5bc664f 709->717 710->691 721 5bc663e-5bc6641 710->721 711->710 731 5bc6635-5bc6637 711->731 712->705 719 5bc66cc 712->719 720 5bc7242-5bc724d 713->720 714->650 715->645 723 5bc6240-5bc624a 715->723 719->705 724 5bc724f-5bc8581 720->724 725 5bc7256-5bc7261 720->725 721->708 721->709 723->645 738 5bc6250-5bc6256 723->738 724->720 740 5bc8587-5bc85ae 724->740 725->720 734 5bc65f4-5bc65f7 728->734 735 5bc65b3-5bc65b8 728->735 731->717 734->691 744 5bc65f9-5bc65fc 734->744 735->676 739 5bc65be-5bc65c3 735->739 741 5bc625c-5bc625f 738->741 742 5bc639f 738->742 739->734 745 5bc65c5-5bc65ec 739->745 740->720 741->664 746 5bc6265-5bc6282 741->746 742->628 744->683 744->728 745->734 760 5bc65ee-5bc65f0 745->760 754 5bc6284-5bc629f 746->754 755 5bc62c0-5bc62d4 746->755 764 5bc62a7-5bc62bb 754->764 765 5bc62a1-5bc62a5 754->765 755->650 760->734 764->650 765->645 765->764
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141806127.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5bc0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: y
                                                  • API String ID: 0-4225443349
                                                  • Opcode ID: e4f1f6213095b63294c4ca86f19674df0c7b8601afbd556b9b7ec2c3358fb641
                                                  • Instruction ID: 4b2bf641e7ed12f4038d4cc5095376a074b52a3d719445a394ca3cd8af9f509e
                                                  • Opcode Fuzzy Hash: e4f1f6213095b63294c4ca86f19674df0c7b8601afbd556b9b7ec2c3358fb641
                                                  • Instruction Fuzzy Hash: 5AF12C30A002199FDB14DF69D954EAE7BF6FF88311F1480A9E906A73A1DB34EC41CB95
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141806127.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5bc0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5948a6297f02d16259ef7986c9ae1e054e02c6f780d86aaddcf5bc25af373543
                                                  • Instruction ID: 96c8bcc9680498027432d1266f2ad7a2f27bc0660041843b99ab9c35a4579923
                                                  • Opcode Fuzzy Hash: 5948a6297f02d16259ef7986c9ae1e054e02c6f780d86aaddcf5bc25af373543
                                                  • Instruction Fuzzy Hash: A9919E74E002199FDB54DFA9C894B9DBBF2FF89300F1080A9E909AB355DB70A985CF50
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141806127.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5bc0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dbbcc327d310da8f1cc56057373b72d2a9503ba9ff83fe440173a58520748773
                                                  • Instruction ID: 7fd4691fd1ea8999ee24269677010c13d4b0a568566ba3e51becf3fd956ce474
                                                  • Opcode Fuzzy Hash: dbbcc327d310da8f1cc56057373b72d2a9503ba9ff83fe440173a58520748773
                                                  • Instruction Fuzzy Hash: 5891B174E002199FDB55DFA9D894A9DBBF2FF89300F1080A9E909AB355DB30A985CF50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 340 3023a89-3023af2 call 5bc7d62 345 3023af8-3023b28 340->345 347 30289e2-30289ed 345->347 348 3023b2e-3023b61 345->348 349 30289f6-3028a01 347->349 350 30289ef 347->350 348->347 352 3023b67-3023b8c 348->352 349->347 350->350 352->347 353 3023b92-3023bc4 352->353 353->347
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2129773980.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_3020000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: -$J
                                                  • API String ID: 0-2822063497
                                                  • Opcode ID: 3b083f4be7308b018269f4ae518da35edfebad0e490caef1d79a3a577bdf299c
                                                  • Instruction ID: ddee569e844e27f43a4a235586f2c445e7d69537d704c8dc83bb1947d28ec072
                                                  • Opcode Fuzzy Hash: 3b083f4be7308b018269f4ae518da35edfebad0e490caef1d79a3a577bdf299c
                                                  • Instruction Fuzzy Hash: E5318AB8D012288FDB20DFA5D9986D8BBF5BB08304F1480EAE44EA7250DB745EC8DF01

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 356 5b90d79-5b91196 ResumeThread 360 5b91198-5b9119e 356->360 361 5b9119f-5b911e1 356->361 360->361
                                                  APIs
                                                  • ResumeThread.KERNELBASE(?), ref: 05B91186
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141736317.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5b90000_setup.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: a3eda0338124183a10c007ceb26da16e442b9ce9380dc7bae2e310f1a689a2c4
                                                  • Instruction ID: c6a37675a8583ae7ef60c6beef206300447999848ed2087116e063ebf98e159d
                                                  • Opcode Fuzzy Hash: a3eda0338124183a10c007ceb26da16e442b9ce9380dc7bae2e310f1a689a2c4
                                                  • Instruction Fuzzy Hash: E831DBB5D05219AFDB14CFA9D880A9EFBB1AF49310F24846AE415B7310D734A801CF98

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 489 5b919b4-5b91a59 492 5b91a5b-5b91a72 489->492 493 5b91aa2-5b91aca 489->493 492->493 496 5b91a74-5b91a79 492->496 497 5b91acc-5b91ae0 493->497 498 5b91b10-5b91b66 493->498 499 5b91a7b-5b91a85 496->499 500 5b91a9c-5b91a9f 496->500 497->498 508 5b91ae2-5b91ae7 497->508 506 5b91b68-5b91b7c 498->506 507 5b91bac-5b91c9a CreateProcessA 498->507 501 5b91a89-5b91a98 499->501 502 5b91a87 499->502 500->493 501->501 505 5b91a9a 501->505 502->501 505->500 506->507 516 5b91b7e-5b91b83 506->516 526 5b91c9c-5b91ca2 507->526 527 5b91ca3-5b91d88 507->527 509 5b91ae9-5b91af3 508->509 510 5b91b0a-5b91b0d 508->510 513 5b91af5 509->513 514 5b91af7-5b91b06 509->514 510->498 513->514 514->514 515 5b91b08 514->515 515->510 518 5b91b85-5b91b8f 516->518 519 5b91ba6-5b91ba9 516->519 520 5b91b91 518->520 521 5b91b93-5b91ba2 518->521 519->507 520->521 521->521 523 5b91ba4 521->523 523->519 526->527 539 5b91d98-5b91d9c 527->539 540 5b91d8a-5b91d8e 527->540 542 5b91dac-5b91db0 539->542 543 5b91d9e-5b91da2 539->543 540->539 541 5b91d90 540->541 541->539 545 5b91dc0-5b91dc4 542->545 546 5b91db2-5b91db6 542->546 543->542 544 5b91da4 543->544 544->542 547 5b91dfa-5b91e28 545->547 548 5b91dc6-5b91def 545->548 546->545 549 5b91db8 546->549 554 5b91e2a 547->554 555 5b91e2f-5b91e36 547->555 548->547 549->545 554->555
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05B91C87
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141736317.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5b90000_setup.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 0c4582d5b92b3c6c5307eb66f0e8ce7606c4b90610f79c154547465d66e0f83e
                                                  • Instruction ID: fa391a2091b56db97da18969664f1db6590666f204d9d8ff77977db791eaa01d
                                                  • Opcode Fuzzy Hash: 0c4582d5b92b3c6c5307eb66f0e8ce7606c4b90610f79c154547465d66e0f83e
                                                  • Instruction Fuzzy Hash: 24C12671D0021A8FDF24CFA8C841BEDBBB1BF49300F1095AAD459B7240EB74AA85DF95

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 556 5b919c0-5b91a59 558 5b91a5b-5b91a72 556->558 559 5b91aa2-5b91aca 556->559 558->559 562 5b91a74-5b91a79 558->562 563 5b91acc-5b91ae0 559->563 564 5b91b10-5b91b66 559->564 565 5b91a7b-5b91a85 562->565 566 5b91a9c-5b91a9f 562->566 563->564 574 5b91ae2-5b91ae7 563->574 572 5b91b68-5b91b7c 564->572 573 5b91bac-5b91c9a CreateProcessA 564->573 567 5b91a89-5b91a98 565->567 568 5b91a87 565->568 566->559 567->567 571 5b91a9a 567->571 568->567 571->566 572->573 582 5b91b7e-5b91b83 572->582 592 5b91c9c-5b91ca2 573->592 593 5b91ca3-5b91d88 573->593 575 5b91ae9-5b91af3 574->575 576 5b91b0a-5b91b0d 574->576 579 5b91af5 575->579 580 5b91af7-5b91b06 575->580 576->564 579->580 580->580 581 5b91b08 580->581 581->576 584 5b91b85-5b91b8f 582->584 585 5b91ba6-5b91ba9 582->585 586 5b91b91 584->586 587 5b91b93-5b91ba2 584->587 585->573 586->587 587->587 589 5b91ba4 587->589 589->585 592->593 605 5b91d98-5b91d9c 593->605 606 5b91d8a-5b91d8e 593->606 608 5b91dac-5b91db0 605->608 609 5b91d9e-5b91da2 605->609 606->605 607 5b91d90 606->607 607->605 611 5b91dc0-5b91dc4 608->611 612 5b91db2-5b91db6 608->612 609->608 610 5b91da4 609->610 610->608 613 5b91dfa-5b91e28 611->613 614 5b91dc6-5b91def 611->614 612->611 615 5b91db8 612->615 620 5b91e2a 613->620 621 5b91e2f-5b91e36 613->621 614->613 615->611 620->621
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05B91C87
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141736317.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5b90000_setup.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: b3acf8851725efc6573d99fa3074a4b01b86069af646128a43d0d0f16be33d77
                                                  • Instruction ID: a48ccc0ccb3fed3246c4a4210a8be6a31a9daf09159e0447111f8688bfbd01bf
                                                  • Opcode Fuzzy Hash: b3acf8851725efc6573d99fa3074a4b01b86069af646128a43d0d0f16be33d77
                                                  • Instruction Fuzzy Hash: 06C11571D0021A9FDF24CFA8C841BEDBBB1BF49300F1095A9E419B7250DB74AA85DF95

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 767 5b91588-5b915fb 770 5b915fd-5b9160f 767->770 771 5b91612-5b91673 WriteProcessMemory 767->771 770->771 773 5b9167c-5b916ce 771->773 774 5b91675-5b9167b 771->774 774->773
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05B91663
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141736317.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5b90000_setup.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: bc2365e24a12c83620a6b64fec054d93ce067b4b294aa9500e08063fd387840c
                                                  • Instruction ID: f2887d6597eec2956b528c31dabc091af0fc360402d8462d56a999fe74cac780
                                                  • Opcode Fuzzy Hash: bc2365e24a12c83620a6b64fec054d93ce067b4b294aa9500e08063fd387840c
                                                  • Instruction Fuzzy Hash: DA41A9B5D052599FDF04CFA9D984ADEFBF1BB49310F24902AE819B7210D734AA41CF68
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05B91663
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141736317.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5b90000_setup.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: 050655505e4631cd4898fe2413d5e535f598c757c79d926e75dc606f90176a94
                                                  • Instruction ID: 4550354bee12979a1d2b42ad9f76ee8f5a7789f6397aa1c29131094c5a62cf03
                                                  • Opcode Fuzzy Hash: 050655505e4631cd4898fe2413d5e535f598c757c79d926e75dc606f90176a94
                                                  • Instruction Fuzzy Hash: E641B9B5D052599FDF04CFA9D984ADEFBF1FB49310F24902AE819B7210D734AA41CB68
                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05B914E2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141736317.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5b90000_setup.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: c0c30a0b1fabcb30eec8565f2999c1b70a2b13de49617f8ad003003b029948c6
                                                  • Instruction ID: e8ad868d8e2ced65180a11eb32d6aab9883724b70040e4ea8b4d62fd122949f1
                                                  • Opcode Fuzzy Hash: c0c30a0b1fabcb30eec8565f2999c1b70a2b13de49617f8ad003003b029948c6
                                                  • Instruction Fuzzy Hash: 494197B9D042599FDF14CFA9D980ADEFBB1BB49310F10942AE815BB310D735A902CF68
                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05B914E2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141736317.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5b90000_setup.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: a25b69c5d7291497803a49073aeed21421d3e9825cf12e11565300af99e06da5
                                                  • Instruction ID: 783c64592850daabde549949dbe4eb93363458acfe8e5e63e9d165f3ca124aa8
                                                  • Opcode Fuzzy Hash: a25b69c5d7291497803a49073aeed21421d3e9825cf12e11565300af99e06da5
                                                  • Instruction Fuzzy Hash: EB3195B9D04259DFCF14CFA9D880A9EFBB1BB49310F20942AE815B7310D735A902CF68
                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 05B912DF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141736317.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5b90000_setup.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: daeaee8ad2cdb4970d28064a2e3424dd861564073cbdfbb190bb60b879142ce7
                                                  • Instruction ID: 43f17b7a7b219156b066e41c0a69b409a09da5ba29375386de739caf5fa53648
                                                  • Opcode Fuzzy Hash: daeaee8ad2cdb4970d28064a2e3424dd861564073cbdfbb190bb60b879142ce7
                                                  • Instruction Fuzzy Hash: 0641BAB5D052599FDB14DFA9D884AEEFBF1BB48310F24802AE419B7240D738A945CF98
                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 05B912DF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141736317.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5b90000_setup.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: 11cbadae09c7b64c3a13054ae9bbf852e54f150e052b02c547cb8358747583c5
                                                  • Instruction ID: cfc61c7968608ad38b2665d8a6c6856d51637377f0e9813e882c37c7d418709f
                                                  • Opcode Fuzzy Hash: 11cbadae09c7b64c3a13054ae9bbf852e54f150e052b02c547cb8358747583c5
                                                  • Instruction Fuzzy Hash: C431BAB5D052599FDB14DFA9D884AEEFBF1BB48310F24802AE419B7240D738A945CF58
                                                  APIs
                                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 05BAFE1F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141764224.0000000005BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5ba0000_setup.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 047e12abc573dbc9aa3d12eb4500f133c1b7814a9b9c80bce19f98068cdeb65a
                                                  • Instruction ID: f102fe4c8bc92c00fd32de5ee62a051ae57b1eb5e627b231448787b138780700
                                                  • Opcode Fuzzy Hash: 047e12abc573dbc9aa3d12eb4500f133c1b7814a9b9c80bce19f98068cdeb65a
                                                  • Instruction Fuzzy Hash: 3C3178B9D052589FCB10CFA9D580ADEFBB0BB49310F24A06AE818B7310D735A945CF64
                                                  APIs
                                                  • ResumeThread.KERNELBASE(?), ref: 05B91186
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141736317.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5b90000_setup.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 94a4e42775ae880e538222f112c414b2b02d311418c0377752e733fbe56ab826
                                                  • Instruction ID: 08422a80c906dc8260f0b6c6aaa097cb7274e53aaf066f8393d78322399ec6a1
                                                  • Opcode Fuzzy Hash: 94a4e42775ae880e538222f112c414b2b02d311418c0377752e733fbe56ab826
                                                  • Instruction Fuzzy Hash: C331CCB5D01219AFDF14CFA9D880A9EFBB5EF48310F24946AE819B7300C734A801CF98
                                                  APIs
                                                  • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 05BCFF51
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141806127.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5bc0000_setup.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 113d5d8118de1b00deef872f5142423d2ae0ed71a37bdbd18575f8974b266579
                                                  • Instruction ID: ded29f671dad3220344c543acd83007dfbd6d98bb1510a218a402d887d6b580c
                                                  • Opcode Fuzzy Hash: 113d5d8118de1b00deef872f5142423d2ae0ed71a37bdbd18575f8974b266579
                                                  • Instruction Fuzzy Hash: F33185B9D052589FCB10CFA9D984ADEFBB5FB49310F20906AE818B7310D335A945CF68
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2129773980.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_3020000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: B
                                                  • API String ID: 0-1255198513
                                                  • Opcode ID: 269efd80f1c23ba3cbdd062fe22f2b4dd2f61112210d633fed732daed4d10df0
                                                  • Instruction ID: 534c248823a4f11a4931af52eca1a86eff76115a76b5d3ef4d86a5354d177c25
                                                  • Opcode Fuzzy Hash: 269efd80f1c23ba3cbdd062fe22f2b4dd2f61112210d633fed732daed4d10df0
                                                  • Instruction Fuzzy Hash: EE51DA789012A98FCB25DF65D8845DDBBB2BF48300F1142EAE90AE6350DB354EE4CF41
                                                  APIs
                                                  • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 05BCFF51
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141806127.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5bc0000_setup.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 5c310b0b32a633fba003edee99647635166ca31ba60684620a89f590ec9bfbd4
                                                  • Instruction ID: 28f4f818b68dbef20d5a4087bb2ebe5a939ba4e1f27f6d6ab8ad5d8492513527
                                                  • Opcode Fuzzy Hash: 5c310b0b32a633fba003edee99647635166ca31ba60684620a89f590ec9bfbd4
                                                  • Instruction Fuzzy Hash: 773184B9D05258DFCB10CFA9D980A9EFBB1FB09310F20906AE818B7310D334A945CF68
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2129346982.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_151d000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ba15aa778f2c698d9451702c8c508b984ddce517ab729b4993a3b5485090d67a
                                                  • Instruction ID: f558403a5585277286462d2d922c929a3d9b9368cf00405241cdfd1887c637c1
                                                  • Opcode Fuzzy Hash: ba15aa778f2c698d9451702c8c508b984ddce517ab729b4993a3b5485090d67a
                                                  • Instruction Fuzzy Hash: A4210375504244DFEB12DF54D9C8B2ABBB5FB84354F20896DD9090F24AD33AD446CBA2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2129346982.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_151d000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 12db860873e78ebd7b051cc5e30f6cae8af5c71b32c22a869d8eea99f64a40d9
                                                  • Instruction ID: a92b17490e6422f9a5e6f007ec87cf439ec24d85d73eace96a04641d9d7defde
                                                  • Opcode Fuzzy Hash: 12db860873e78ebd7b051cc5e30f6cae8af5c71b32c22a869d8eea99f64a40d9
                                                  • Instruction Fuzzy Hash: 05217F765093808FDB13CF24D994B16BF71FB86314F2985DAD8448F657C33A981ACB62
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2129773980.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_3020000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4ed67c46c43557ac186c0944d7ddee02a716dd95047179bab367c252c95e1197
                                                  • Instruction ID: e9d4d33ea93a83b80d2dcaea6d72cdfc5cac88168b4fb989afdcce79d81db972
                                                  • Opcode Fuzzy Hash: 4ed67c46c43557ac186c0944d7ddee02a716dd95047179bab367c252c95e1197
                                                  • Instruction Fuzzy Hash: DBF09274D0A2288FDB64DF14EAA16DABBB1BB44300F1002EAD05EA3241CB305EC4CF05
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2129773980.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_3020000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 88c0d56c05ae7fc1844c7bd626027ddf484a4a084204329f94d9eddd3e6d6961
                                                  • Instruction ID: 1fe6d831fd4eef170a5c12b498f338400fd415298ab3569033b7aa4e03a039dc
                                                  • Opcode Fuzzy Hash: 88c0d56c05ae7fc1844c7bd626027ddf484a4a084204329f94d9eddd3e6d6961
                                                  • Instruction Fuzzy Hash: 31E0B678A07228CFCB24DF54D9946D97BB1BB19300F1094D6E459A3680CB745FD4CF16
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2129773980.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_3020000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $ $!$#$$$&$&$($*$+$+$+$+$1$3$6$6$8$8$:$;$<$?$?$?7'B$A$C$C$C$D$E$E$E$G$GycB$I$K$M$M$M$O0}B$P$P$S$S$T$T$U$U$V$Z$[$[$\$]$^$^$^$^$`$a$c$jWbB$|;zB
                                                  • API String ID: 0-3036647579
                                                  • Opcode ID: 154b6f329e2fae54c3ba1238f3dbb33eb7a690163a6fed2a2a31f6da01a2791c
                                                  • Instruction ID: ad1ae193e6eaa1cbc867656707315a8d02596b102049b2ba3fc5073ecced147a
                                                  • Opcode Fuzzy Hash: 154b6f329e2fae54c3ba1238f3dbb33eb7a690163a6fed2a2a31f6da01a2791c
                                                  • Instruction Fuzzy Hash: 8CE2E3B4A016298FEB65CF2AC94479ABBF2FB88301F1581E9D409A7350DB759EC1CF44
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141764224.0000000005BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5ba0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $ $!$#$$$&$&$($*$+$+$+$+$1$3$6$6$8$8$:$;$<$?$?$?7'B$A$C$C$C$D$E$E$E$G$GycB$I$K$M$M$M$O0}B$P$P$S$S$T$T$U$U$V$Z$[$[$\$]$^$^$^$^$`$a$c$jWbB$|;zB
                                                  • API String ID: 0-3036647579
                                                  • Opcode ID: 1481092eca58eed19f09e2caaedc7a1b896141957da6a221804e365de0ed7bf7
                                                  • Instruction ID: 9798f95aed97de613de1f4b5ba952c573c197cd3212a6e5c029b27cfd747fb8e
                                                  • Opcode Fuzzy Hash: 1481092eca58eed19f09e2caaedc7a1b896141957da6a221804e365de0ed7bf7
                                                  • Instruction Fuzzy Hash: EDB28FB4D01A698FEB64CF1ACD4479ABAF5FB88305F0581EAD50CA7250DB795EC58F00
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141764224.0000000005BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5ba0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $ $!$#$$$&$&$($*$+$+$+$+$1$3$6$6$8$8$:$;$<$?$?$?7'B$A$C$C$C$D$E$E$E$G$GycB$I$K$M$M$M$O0}B$P$P$S$S$T$T$U$U$V$Z$[$[$\$]$^$^$^$^$`$a$c$jWbB$|;zB
                                                  • API String ID: 0-3036647579
                                                  • Opcode ID: 3d205f27601cd21506975bd722fce44e5629a1c1f9f1c031469ced229fbd23a0
                                                  • Instruction ID: 6bcdbb8498cbe2160a1ab6bc2d180d19b4b948d28c997d53334f2a849e03a73b
                                                  • Opcode Fuzzy Hash: 3d205f27601cd21506975bd722fce44e5629a1c1f9f1c031469ced229fbd23a0
                                                  • Instruction Fuzzy Hash: F1A27FB4D01A698FEB64CF1ACD4479ABAF5FB88305F0481EAD50CA7250EB795EC58F04
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141764224.0000000005BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5ba0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: i
                                                  • API String ID: 0-3865851505
                                                  • Opcode ID: e4586eab57a65559615c76d89f83ca31bd6e133178ae1429cde77ffb6b1012ec
                                                  • Instruction ID: 8a4466868dc9743ae3c146ba04fb37136b38703c0fb9d7779e476fc9052e4fc0
                                                  • Opcode Fuzzy Hash: e4586eab57a65559615c76d89f83ca31bd6e133178ae1429cde77ffb6b1012ec
                                                  • Instruction Fuzzy Hash: 05228178D092698FDB65DF29C985AD9BBB2FB48300F0041E9E40DA7250DB356ED1CF40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141764224.0000000005BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5ba0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: H
                                                  • API String ID: 0-2852464175
                                                  • Opcode ID: 20bac059860420b6589178b7986d67b8ffc83ab15249eb11d44b36502eec5b45
                                                  • Instruction ID: 341918d7d48d3ad64bf509b5427a5aa5eaf4a253dcb526f97c2f39b22613528c
                                                  • Opcode Fuzzy Hash: 20bac059860420b6589178b7986d67b8ffc83ab15249eb11d44b36502eec5b45
                                                  • Instruction Fuzzy Hash: A2127278D092298FDB64DF29D985AD9BBB2FB88300F1041E9E50DA7250DB356ED1CF40
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141764224.0000000005BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5ba0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e48434df880e868a4b891aa684d4b618488269aaa8500ebb7234096f850e8c94
                                                  • Instruction ID: 8c906705fcc8a3ad130a9b3afeb0a64e909ae31fc562b390975e42c1f4f2622f
                                                  • Opcode Fuzzy Hash: e48434df880e868a4b891aa684d4b618488269aaa8500ebb7234096f850e8c94
                                                  • Instruction Fuzzy Hash: CB514874E1020A8FDB45DFB9E9516AEBBF2FBC8300F108529D0159B254DB746986CF50
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2129773980.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_3020000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7ea41577c4ce7727b4fdb29a1b69701accaad1aaa881041d50aa99db082d8cf4
                                                  • Instruction ID: ec9490c0180c871b60fc73469e29bd433d58739c309afeeb3334c6413440c26d
                                                  • Opcode Fuzzy Hash: 7ea41577c4ce7727b4fdb29a1b69701accaad1aaa881041d50aa99db082d8cf4
                                                  • Instruction Fuzzy Hash: 70512C70A0020A8FDB56DFBAE85079EBFF2FF88300F14C529D4659B259DB74594ADB80
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2129773980.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_3020000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1af2d3dcb13c30a0e1f766f516c6b0d99849d0483152a946660c13e4d55b76b1
                                                  • Instruction ID: ea7524ef8e8fd56b4d91599b83d1bec48966d62ffa97b3838f78012842e0afe3
                                                  • Opcode Fuzzy Hash: 1af2d3dcb13c30a0e1f766f516c6b0d99849d0483152a946660c13e4d55b76b1
                                                  • Instruction Fuzzy Hash: D1512D70A0020A8FDB46DFBAE85069EBFF2FBC8300F14C529D4659B359DB74594ADB80
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141764224.0000000005BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5ba0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a40e3e4d6732b1dcfc3d1b6bdd7c3bf9607f36fc2f197700ca1a6a12f27b4b21
                                                  • Instruction ID: ea4dd1999b802fdeb67defdf4278ad93762464bdabef8605f1d988fce6650cda
                                                  • Opcode Fuzzy Hash: a40e3e4d6732b1dcfc3d1b6bdd7c3bf9607f36fc2f197700ca1a6a12f27b4b21
                                                  • Instruction Fuzzy Hash: 31513774E1020A8FDB45DFBAE85169EBFF2FBC8300F008529D0159B255DB746986CF50
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141806127.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5bc0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3ce99896ceb54c9e6f0819b59c03b15a42fd72a76d74c29cc92fdaa2128ca9e8
                                                  • Instruction ID: 6ccfefaac65ccee2c0bc81f83eca43b9063e86189d273bc2bbe6ee25a653928e
                                                  • Opcode Fuzzy Hash: 3ce99896ceb54c9e6f0819b59c03b15a42fd72a76d74c29cc92fdaa2128ca9e8
                                                  • Instruction Fuzzy Hash: B641EEB4D04248DFDB14CFA9C984BAEBFF2BB49700F2091AAE415AB250D774A845CF48
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141806127.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5bc0000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f2abbfd347826b0ee476c91aa69c981ad38a33e8a4f34c5d90a958a0c31e31c7
                                                  • Instruction ID: 29045dcfca46e64e748d50615cb5d407bf13c266d242097eb2ff788db2182d32
                                                  • Opcode Fuzzy Hash: f2abbfd347826b0ee476c91aa69c981ad38a33e8a4f34c5d90a958a0c31e31c7
                                                  • Instruction Fuzzy Hash: C141D0B4D04248DFDB14CFA9D984AAEFFF2FB49700F2091A9E415AB250D774A845CF49
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2141736317.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5b90000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7bd6c445a4ae6e9078e56e5dd40bd0b34ea657bef68a3e31501137117eb1f694
                                                  • Instruction ID: 8225bb1e8dd652fb5f896a973e6efcd1de20bc554e224af37ee018cc927b570e
                                                  • Opcode Fuzzy Hash: 7bd6c445a4ae6e9078e56e5dd40bd0b34ea657bef68a3e31501137117eb1f694
                                                  • Instruction Fuzzy Hash: 393185B1D056288BEB28CF66C8143DAFAF2AF85304F04C1EAC44C6A254DB750A89DF51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2129773980.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_3020000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $?$a$ffwB
                                                  • API String ID: 0-1233609132
                                                  • Opcode ID: 127e08d205b9b27787a76b68ead64c00bf5d746b2d5d4cd060de709aa1e60a24
                                                  • Instruction ID: f0184b126754a6273d5d6109e2fde074086aded4ba742afffc6f866145bf5dca
                                                  • Opcode Fuzzy Hash: 127e08d205b9b27787a76b68ead64c00bf5d746b2d5d4cd060de709aa1e60a24
                                                  • Instruction Fuzzy Hash: A521ABB8D06269CFEB64DF29D9483D8BBF0BB08305F0580EAA45DE6280D7744AD8DF01
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2129773980.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_3020000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ($-$8$S
                                                  • API String ID: 0-3270535609
                                                  • Opcode ID: 7a13b7b7831baa6e92f0a81311716bc8a3ae73a652cf18c4546340f911247427
                                                  • Instruction ID: dc213a8cd05907dbd4497c81548f6d513a43b182f337b7863364e5888a8d80e4
                                                  • Opcode Fuzzy Hash: 7a13b7b7831baa6e92f0a81311716bc8a3ae73a652cf18c4546340f911247427
                                                  • Instruction Fuzzy Hash: 821196B4D453688EEB60CF15C8547D8BAF0FB05305F1585EAD04CA6280DBB94AC4DF41
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2129773980.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_3020000_setup.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #$.$/$[ObB
                                                  • API String ID: 0-630930177
                                                  • Opcode ID: d0786bb275a9fbe2937d27223c64dbc2ee830bb4a360c154e619d9e84ec5b0c9
                                                  • Instruction ID: 35f2facff88220be2e4751423953a557a6a8a797bdce91cd043b70706ea8b916
                                                  • Opcode Fuzzy Hash: d0786bb275a9fbe2937d27223c64dbc2ee830bb4a360c154e619d9e84ec5b0c9
                                                  • Instruction Fuzzy Hash: B7F0F2B4806228CFDB20CF55C9493D8BBB4FB04304F1495EAE09EA2241CBB84AD9CF56

                                                  Execution Graph

                                                  Execution Coverage:7.5%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:51
                                                  Total number of Limit Nodes:6
                                                  execution_graph 29137 136ad38 29141 136ae30 29137->29141 29149 136ae20 29137->29149 29138 136ad47 29142 136ae41 29141->29142 29143 136ae64 29141->29143 29142->29143 29157 136b0b8 29142->29157 29161 136b0c8 29142->29161 29143->29138 29144 136ae5c 29144->29143 29145 136b068 GetModuleHandleW 29144->29145 29146 136b095 29145->29146 29146->29138 29150 136ae30 29149->29150 29151 136ae64 29150->29151 29155 136b0b8 LoadLibraryExW 29150->29155 29156 136b0c8 LoadLibraryExW 29150->29156 29151->29138 29152 136ae5c 29152->29151 29153 136b068 GetModuleHandleW 29152->29153 29154 136b095 29153->29154 29154->29138 29155->29152 29156->29152 29159 136b0dc 29157->29159 29158 136b101 29158->29144 29159->29158 29165 136a870 29159->29165 29163 136b0dc 29161->29163 29162 136b101 29162->29144 29163->29162 29164 136a870 LoadLibraryExW 29163->29164 29164->29162 29166 136b2a8 LoadLibraryExW 29165->29166 29168 136b321 29166->29168 29168->29158 29169 136d0b8 29170 136d0fe 29169->29170 29174 136d298 29170->29174 29177 136d289 29170->29177 29171 136d1eb 29180 136c9a0 29174->29180 29178 136c9a0 DuplicateHandle 29177->29178 29179 136d2c6 29177->29179 29178->29179 29179->29171 29181 136d300 DuplicateHandle 29180->29181 29182 136d2c6 29181->29182 29182->29171 29183 1364668 29184 1364684 29183->29184 29185 1364696 29184->29185 29187 13647a0 29184->29187 29188 13647c5 29187->29188 29192 13648b0 29188->29192 29196 13648a1 29188->29196 29194 13648d7 29192->29194 29193 13649b4 29193->29193 29194->29193 29200 1364248 29194->29200 29198 13648b0 29196->29198 29197 13649b4 29197->29197 29198->29197 29199 1364248 CreateActCtxA 29198->29199 29199->29197 29201 1365940 CreateActCtxA 29200->29201 29203 1365a03 29201->29203
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7bcd50140760d02fff305a36657d2e3be58eb99bb99efff76e9d10f7eb323be9
                                                  • Instruction ID: 4c8d30422300000c4e28768ad5df841401d3136cd6ee042cff0ab1cb8d0200e0
                                                  • Opcode Fuzzy Hash: 7bcd50140760d02fff305a36657d2e3be58eb99bb99efff76e9d10f7eb323be9
                                                  • Instruction Fuzzy Hash: D8128F34F002158FDB54DFA9C454AAEBBF6BF88700B258169E906EB765DB31DC42CB90
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8c6169d9d646ae5b9d6ef38ab22175f24f2c4616203ac02aac8c011a57ab8dc6
                                                  • Instruction ID: 04e29ca7f4ec55f07d5b97118a7fd2a3dcaac2cf9d11d3c25048656c76c78017
                                                  • Opcode Fuzzy Hash: 8c6169d9d646ae5b9d6ef38ab22175f24f2c4616203ac02aac8c011a57ab8dc6
                                                  • Instruction Fuzzy Hash: D7F1CC30A0030A9FDB55DF69D840B9EBBF6EF88304F148569E505EB2A1DB30ED46CB91
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ddc5f5dbbe79e5d1b126252d1c98ddc18c1ef2ba6965df23f00d433ce2e08781
                                                  • Instruction ID: e479cadba5ad98f9156de78bfe1a760a649593e9b21faebcdce122765de1d890
                                                  • Opcode Fuzzy Hash: ddc5f5dbbe79e5d1b126252d1c98ddc18c1ef2ba6965df23f00d433ce2e08781
                                                  • Instruction Fuzzy Hash: FDD1C534D01218CFDB55EFB4D854A9DBBB2FF8A305F1081A9D50AA7294DB325D86CF11
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a6b21650a70686556349444ea2e36513cab481af800571aa473b33fc9a135aa0
                                                  • Instruction ID: 1fffc0b8d86dfd6f504ba97f2bda41c18af9d320c2fb7f9d1d7f84e3fee17a8e
                                                  • Opcode Fuzzy Hash: a6b21650a70686556349444ea2e36513cab481af800571aa473b33fc9a135aa0
                                                  • Instruction Fuzzy Hash: E2D1D434D01218CFCB59EFB4D854A9DBBB2FF8A305F1081A9D50AA7294DB329D86CF11

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 6940598-69405c7 2 6940ad7-6940d2e 0->2 3 69405cd-69405fd 0->3 11 6940138-6940145 3->11 15 694076a-6940774 11->15 16 694014b-6940160 11->16 16->11 19 6940162 16->19 20 69402c4-69402f2 19->20 21 6940337 19->21 22 6940251-694027f 19->22 23 6940422-6940445 19->23 24 6940512-6940535 19->24 25 69401de 19->25 26 6940169-694018c 19->26 27 69403aa-69403cd 19->27 28 694049a-69404bd 19->28 57 69402f4-69402fa 20->57 58 694030a-6940332 20->58 38 6940341-694035d 21->38 50 6940297-69402bf 22->50 51 6940281-6940287 22->51 81 69408bb-69408ea 23->81 82 694044b-694044f 23->82 83 69409ff-6940a2e 24->83 84 694053b-694053f 24->84 34 69401e8-6940204 25->34 74 6940777-69407a6 26->74 75 6940192-6940196 26->75 76 69403d3-69403d7 27->76 77 6940819-6940848 27->77 78 69404c3-69404c7 28->78 79 694095d-694098c 28->79 44 694020a-694020c 34->44 48 6940363-6940365 38->48 53 6940224-694024c 44->53 54 694020e-6940214 44->54 55 6940367-694036d 48->55 56 694037d-69403a5 48->56 50->11 59 6940289 51->59 60 694028b-694028d 51->60 53->11 68 6940216 54->68 69 6940218-694021a 54->69 70 6940371-6940373 55->70 71 694036f 55->71 56->11 64 69402fc 57->64 65 69402fe-6940300 57->65 58->11 59->50 60->50 64->58 65->58 68->53 69->53 70->56 71->56 104 69407ad-69407dc 74->104 87 69407e3-6940812 75->87 88 694019c-69401a6 75->88 89 6940885-69408b4 76->89 90 69403dd-69403e7 76->90 106 694084f-694087e 77->106 91 69404cd-69404d7 78->91 92 69409c9-69409f8 78->92 107 6940993-69409c2 79->107 113 69408f1-6940920 81->113 93 6940455-694045f 82->93 94 6940927-6940956 82->94 114 6940a35-6940a64 83->114 95 6940545-694054f 84->95 96 6940a6b-6940ad0 84->96 87->77 103 69401ac-69401d9 88->103 88->104 89->81 105 69403ed-694041d 90->105 90->106 91->107 108 69404dd-694050d 91->108 92->83 112 6940465-6940495 93->112 93->113 94->79 95->114 115 6940555-6940585 95->115 96->2 103->11 104->87 105->11 106->89 107->92 108->11 112->11 113->94 114->96 115->11
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267307005.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6940000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: hlPj
                                                  • API String ID: 0-2311579558
                                                  • Opcode ID: 82b33356e247d28af8dd5b53fdc0e061ad07d6b4edf09331e19b79553c882d4c
                                                  • Instruction ID: af3c6f1cb10c5aa4bfcc993c46dced4db2250179341e341790d1a4e9d22393d0
                                                  • Opcode Fuzzy Hash: 82b33356e247d28af8dd5b53fdc0e061ad07d6b4edf09331e19b79553c882d4c
                                                  • Instruction Fuzzy Hash: 4402AC307012158FEB54AF65C854A6D77B6FF89304F10891EEA039B7A1CFB6ED068B91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 208 136ae30-136ae3f 209 136ae41-136ae4e call 1369838 208->209 210 136ae6b-136ae6f 208->210 217 136ae64 209->217 218 136ae50 209->218 211 136ae83-136aec4 210->211 212 136ae71-136ae7b 210->212 219 136aec6-136aece 211->219 220 136aed1-136aedf 211->220 212->211 217->210 267 136ae56 call 136b0b8 218->267 268 136ae56 call 136b0c8 218->268 219->220 222 136af03-136af05 220->222 223 136aee1-136aee6 220->223 221 136ae5c-136ae5e 221->217 224 136afa0-136afb7 221->224 225 136af08-136af0f 222->225 226 136aef1 223->226 227 136aee8-136aeef call 136a814 223->227 241 136afb9-136b018 224->241 229 136af11-136af19 225->229 230 136af1c-136af23 225->230 228 136aef3-136af01 226->228 227->228 228->225 229->230 232 136af25-136af2d 230->232 233 136af30-136af39 call 136a824 230->233 232->233 239 136af46-136af4b 233->239 240 136af3b-136af43 233->240 242 136af4d-136af54 239->242 243 136af69-136af76 239->243 240->239 259 136b01a-136b01c 241->259 242->243 244 136af56-136af66 call 136a834 call 136a844 242->244 249 136af78-136af96 243->249 250 136af99-136af9f 243->250 244->243 249->250 260 136b01e-136b046 259->260 261 136b048-136b060 259->261 260->261 262 136b062-136b065 261->262 263 136b068-136b093 GetModuleHandleW 261->263 262->263 264 136b095-136b09b 263->264 265 136b09c-136b0b0 263->265 264->265 267->221 268->221
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0136B086
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2257052306.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1360000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: a70f99a106eee79c786ff25f71686435a401040240f8be9ecdd1d2e100622926
                                                  • Instruction ID: 69862a0a7fed90f913caa857689715142ccf4bd7fe4693e9b08cfb71ef1a18c7
                                                  • Opcode Fuzzy Hash: a70f99a106eee79c786ff25f71686435a401040240f8be9ecdd1d2e100622926
                                                  • Instruction Fuzzy Hash: FF816AB0A00B058FD724DF69D44179ABBF5FF88308F00892DD54AEBA44D775E84ACB91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 269 1365935-136593c 270 1365944-1365a01 CreateActCtxA 269->270 272 1365a03-1365a09 270->272 273 1365a0a-1365a64 270->273 272->273 280 1365a66-1365a69 273->280 281 1365a73-1365a77 273->281 280->281 282 1365a88 281->282 283 1365a79-1365a85 281->283 285 1365a89 282->285 283->282 285->285
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 013659F1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2257052306.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1360000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: 5cc1f3ebd2e316d07d287bdeca60978e0396e7cb87c6bcd1f69e604aaccd44b3
                                                  • Instruction ID: 5fda48ba1bd0bc8e2679a4b86cda00c499603b62fcacb7d6a4a6e1d5473e911e
                                                  • Opcode Fuzzy Hash: 5cc1f3ebd2e316d07d287bdeca60978e0396e7cb87c6bcd1f69e604aaccd44b3
                                                  • Instruction Fuzzy Hash: 8B41C1B4C00719CEEB24CFA9C884BDDBBB5BF45704F20816AD508AB255DB755946CF90

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 286 1364248-1365a01 CreateActCtxA 289 1365a03-1365a09 286->289 290 1365a0a-1365a64 286->290 289->290 297 1365a66-1365a69 290->297 298 1365a73-1365a77 290->298 297->298 299 1365a88 298->299 300 1365a79-1365a85 298->300 302 1365a89 299->302 300->299 302->302
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 013659F1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2257052306.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1360000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: 99d441a3373ada6ac02077a41d14d5f7e0c45f5b99f74f4d536213b930e6b7f5
                                                  • Instruction ID: 71887d365ed6cf25d0494a818170d5f315f071934011a166f84b707ceb68248c
                                                  • Opcode Fuzzy Hash: 99d441a3373ada6ac02077a41d14d5f7e0c45f5b99f74f4d536213b930e6b7f5
                                                  • Instruction Fuzzy Hash: 4141BF70C0071DCBEB24CFAAC884BDDBBB5BF45714F20816AD508AB255DB756945CF90

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 303 136a858-136a860 305 136a862-136b2e8 303->305 306 136a88c 303->306 311 136b2f0-136b31f LoadLibraryExW 305->311 312 136b2ea-136b2ed 305->312 308 136a88e-136a8c0 306->308 309 136a8ec-136a954 306->309 308->309 313 136b321-136b327 311->313 314 136b328-136b345 311->314 312->311 313->314
                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0136B101,00000800,00000000,00000000), ref: 0136B312
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2257052306.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1360000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 13bf084633b6f63d00d79eb513c6a64a9984acd9ea677789cefeab58d1ad7175
                                                  • Instruction ID: bf4158b0b3270da712d3bc7eee672176acbde86a7bb3b1b74c2123601e422b63
                                                  • Opcode Fuzzy Hash: 13bf084633b6f63d00d79eb513c6a64a9984acd9ea677789cefeab58d1ad7175
                                                  • Instruction Fuzzy Hash: 8131AFB6808359CFEB01CF99C4407DABFF8EB55314F04805AD554A7201C3789546CFA1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 319 136c9a0-136d394 DuplicateHandle 321 136d396-136d39c 319->321 322 136d39d-136d3ba 319->322 321->322
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0136D2C6,?,?,?,?,?), ref: 0136D387
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2257052306.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1360000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 0d04f1fa06604c9474ca0fae586070d56efd64f2749ef26bf3e7d22e9791ca06
                                                  • Instruction ID: cdd67e9b110daa8b6d113a472d1cd3bf61321d9649a1b62a3a30467686d78ed6
                                                  • Opcode Fuzzy Hash: 0d04f1fa06604c9474ca0fae586070d56efd64f2749ef26bf3e7d22e9791ca06
                                                  • Instruction Fuzzy Hash: C121E9B5900249DFDB10CF9AD984ADEBFF8EB48314F14841AE958A7310D374A954CFA4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 325 136d2f9-136d394 DuplicateHandle 326 136d396-136d39c 325->326 327 136d39d-136d3ba 325->327 326->327
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0136D2C6,?,?,?,?,?), ref: 0136D387
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2257052306.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1360000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 0eb0e1160c53fc1cec18c0e618d88ba76e604598f045ffc0a17ebdcfc46265bc
                                                  • Instruction ID: fcd02039338f8d365427e8a6d3c3cf017307c3efcd9d29aa0580e9852ec8fc41
                                                  • Opcode Fuzzy Hash: 0eb0e1160c53fc1cec18c0e618d88ba76e604598f045ffc0a17ebdcfc46265bc
                                                  • Instruction Fuzzy Hash: 1221E2B5900259DFDB10CFA9D984ADEBBF4EB48324F24841AE958B7310D378A954CFA4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 330 136a870-136b2e8 332 136b2f0-136b31f LoadLibraryExW 330->332 333 136b2ea-136b2ed 330->333 334 136b321-136b327 332->334 335 136b328-136b345 332->335 333->332 334->335
                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0136B101,00000800,00000000,00000000), ref: 0136B312
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2257052306.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1360000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: f7abebdf2a95bacdc057eb107db2330b45566af8b07b2f034e64111d51e0c716
                                                  • Instruction ID: fd10b0b9665ff621a3c5784fd70dbfc96b0e45813b162fe90d6f95773831b0cf
                                                  • Opcode Fuzzy Hash: f7abebdf2a95bacdc057eb107db2330b45566af8b07b2f034e64111d51e0c716
                                                  • Instruction Fuzzy Hash: 481112B69003498FDB10CF9AC844ADEFBF8EB88724F14842EE919A7200C374A545CFA4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 338 136b2a0-136b2e8 339 136b2f0-136b31f LoadLibraryExW 338->339 340 136b2ea-136b2ed 338->340 341 136b321-136b327 339->341 342 136b328-136b345 339->342 340->339 341->342
                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0136B101,00000800,00000000,00000000), ref: 0136B312
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2257052306.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1360000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 258e87fddb01103437abc1e84e595819893011974f7e5915663eaef886e0f788
                                                  • Instruction ID: cd46469a6e63b6f72bbcfbd1df131b4556978e64a5fa8c14ede503d38c75e9b7
                                                  • Opcode Fuzzy Hash: 258e87fddb01103437abc1e84e595819893011974f7e5915663eaef886e0f788
                                                  • Instruction Fuzzy Hash: 761126B69042498FDB10CFAAC844ADEFFF4EB48724F14841ED969A7300C375A545CFA4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 345 136b020-136b060 346 136b062-136b065 345->346 347 136b068-136b093 GetModuleHandleW 345->347 346->347 348 136b095-136b09b 347->348 349 136b09c-136b0b0 347->349 348->349
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0136B086
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2257052306.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1360000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 4b9eef36106589e120d90fc476d1a284d71385bea4c55c018bc6568868e46d43
                                                  • Instruction ID: 6a698984ea79651d76c29c63e2831fb8be09d9d32360ee3ae8244e89a2e3c817
                                                  • Opcode Fuzzy Hash: 4b9eef36106589e120d90fc476d1a284d71385bea4c55c018bc6568868e46d43
                                                  • Instruction Fuzzy Hash: F31113B5D007498FDB10CF9AC444ADEFBF4AB88724F10841AD968B7214C375A545CFA1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 351 6941ba0-6941bc3 352 6941bc5-6941bc7 351->352 353 6941bd1-6941c2d 351->353 352->353 358 6942056-6942070 353->358 359 6941c33-6941c69 353->359 362 6942072-6942074 358->362 363 69420cc-6942119 358->363 359->358 374 6941c6f-6941ca5 359->374 364 69420a5-69420a6 362->364 365 6942076-694209e 362->365 383 6942ea1-6942ee8 363->383 384 694211f-6942139 363->384 370 69420a8 364->370 371 69420aa-69420b4 364->371 368 69420b6-69420c4 365->368 369 69420a0 365->369 368->363 369->364 370->368 371->368 374->358 382 6941cab-6941ce2 374->382 382->358 400 6941ce8-6941d1e 382->400 388 6942f00-6942f78 383->388 389 6942eea-6942ef0 383->389 384->383 390 694213f-694216f 384->390 413 6942fa2-6942fa9 388->413 414 6942f7a-6942fa0 388->414 392 6942ef4-6942efe 389->392 393 6942ef2 389->393 404 6942171-6942187 390->404 405 6942189-69421d5 390->405 392->388 393->388 400->358 416 6941d24-6941d5a 400->416 417 69421dc-69421f9 404->417 405->417 414->413 416->358 428 6941d60-6941d9e 416->428 417->383 424 69421ff-6942235 417->424 433 6942237-694224d 424->433 434 694224f-694229b 424->434 428->358 438 6941da4-6941ded 428->438 441 69422a2-69422bf 433->441 434->441 438->358 454 6941df3-6941e29 438->454 441->383 447 69422c5-69422fb 441->447 455 6942315-6942361 447->455 456 69422fd-6942313 447->456 454->358 466 6941e2f-6941e65 454->466 463 6942368-6942385 455->463 456->463 463->383 470 694238b-69423c1 463->470 466->358 475 6941e6b-6941ea1 466->475 478 69423c3-69423d9 470->478 479 69423db-6942427 470->479 475->358 487 6941ea7-6941edd 475->487 486 694242e-694244b 478->486 479->486 486->383 491 6942451-6942487 486->491 487->358 496 6941ee3-6941efa 487->496 501 69424a1-69424f9 491->501 502 6942489-694249f 491->502 496->358 500 6941f00-6941f32 496->500 513 6941f34-6941f5a 500->513 514 6941f5c-6941f9e 500->514 509 6942500-694251d 501->509 502->509 509->383 516 6942523-6942559 509->516 525 6941fce-6942001 513->525 531 6941fa0-6941fb6 514->531 532 6941fbc-6941fc8 514->532 527 6942573-69425d1 516->527 528 694255b-6942571 516->528 525->358 541 6942003-6942039 525->541 538 69425d8-69425f5 527->538 528->538 531->532 532->525 538->383 543 69425fb-6942631 538->543 541->358 550 694203b-6942053 541->550 553 6942633-6942649 543->553 554 694264b-69426a9 543->554 559 69426b0-69426cd 553->559 554->559 559->383 563 69426d3-6942709 559->563 567 6942723-6942781 563->567 568 694270b-6942721 563->568 573 6942788-69427a5 567->573 568->573 573->383 576 69427ab-69427c5 573->576 576->383 579 69427cb-69427fb 576->579 583 6942815-6942873 579->583 584 69427fd-6942813 579->584 589 694287a-6942897 583->589 584->589 589->383 592 694289d-69428b7 589->592 592->383 595 69428bd-69428ed 592->595 599 6942907-6942965 595->599 600 69428ef-6942905 595->600 605 694296c-6942989 599->605 600->605 605->383 609 694298f-69429a9 605->609 609->383 611 69429af-69429df 609->611 615 69429e1-69429f7 611->615 616 69429f9-6942a57 611->616 621 6942a5e-6942a7b 615->621 616->621 621->383 625 6942a81-6942ab7 621->625 629 6942ad1-6942b2f 625->629 630 6942ab9-6942acf 625->630 635 6942b36-6942b53 629->635 630->635 635->383 638 6942b59-6942b8f 635->638 643 6942b91-6942ba7 638->643 644 6942ba9-6942c07 638->644 649 6942c0e-6942c2b 643->649 644->649 649->383 653 6942c31-6942c67 649->653 657 6942c81-6942cdf 653->657 658 6942c69-6942c7f 653->658 663 6942ce6-6942d03 657->663 658->663 663->383 666 6942d09-6942d3f 663->666 671 6942d41-6942d57 666->671 672 6942d59-6942db7 666->672 677 6942dbe-6942ddb 671->677 672->677 677->383 681 6942de1-6942e13 677->681 685 6942e15-6942e2b 681->685 686 6942e2d-6942e82 681->686 691 6942e89-6942e9e 685->691 686->691
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267307005.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6940000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e2b2f261c57283307465454284dd5cd9c36e7b6b3efc30d4556ca16af8820b87
                                                  • Instruction ID: c8859945f6e9fa0c6ab780a696253178650c694a8e1061232fbdb3f0ec49e05f
                                                  • Opcode Fuzzy Hash: e2b2f261c57283307465454284dd5cd9c36e7b6b3efc30d4556ca16af8820b87
                                                  • Instruction Fuzzy Hash: C7C22C70A001189FDB54DF64C895EEDBBB6FF89700F10449AE60AAB3A1DB719E81CF51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 991 69400d8-69400fc 993 6940114-6940135 991->993 994 69400fe-6940104 991->994 999 6940138-6940145 993->999 995 6940106 994->995 996 6940108-694010a 994->996 995->993 996->993 1001 694076a-6940774 999->1001 1002 694014b-6940160 999->1002 1002->999 1004 6940162 1002->1004 1005 69402c4-69402f2 1004->1005 1006 6940337-694035d 1004->1006 1007 6940251-694027f 1004->1007 1008 6940422-6940445 1004->1008 1009 6940512-6940535 1004->1009 1010 69401de-6940204 1004->1010 1011 6940169-694018c 1004->1011 1012 69403aa-69403cd 1004->1012 1013 694049a-69404bd 1004->1013 1038 69402f4-69402fa 1005->1038 1039 694030a-6940332 1005->1039 1030 6940363-6940365 1006->1030 1032 6940297-69402bf 1007->1032 1033 6940281-6940287 1007->1033 1061 69408bb-69408ea 1008->1061 1062 694044b-694044f 1008->1062 1063 69409ff-6940a2e 1009->1063 1064 694053b-694053f 1009->1064 1026 694020a-694020c 1010->1026 1054 6940777-69407a6 1011->1054 1055 6940192-6940196 1011->1055 1056 69403d3-69403d7 1012->1056 1057 6940819-6940848 1012->1057 1058 69404c3-69404c7 1013->1058 1059 694095d-694098c 1013->1059 1034 6940224-694024c 1026->1034 1035 694020e-6940214 1026->1035 1036 6940367-694036d 1030->1036 1037 694037d-69403a5 1030->1037 1032->999 1040 6940289 1033->1040 1041 694028b-694028d 1033->1041 1034->999 1049 6940216 1035->1049 1050 6940218-694021a 1035->1050 1051 6940371-6940373 1036->1051 1052 694036f 1036->1052 1037->999 1045 69402fc 1038->1045 1046 69402fe-6940300 1038->1046 1039->999 1040->1032 1041->1032 1045->1039 1046->1039 1049->1034 1050->1034 1051->1037 1052->1037 1083 69407ad-69407dc 1054->1083 1067 69407e3-6940812 1055->1067 1068 694019c-69401a6 1055->1068 1069 6940885-69408b4 1056->1069 1070 69403dd-69403e7 1056->1070 1085 694084f-694087e 1057->1085 1071 69404cd-69404d7 1058->1071 1072 69409c9-69409f8 1058->1072 1086 6940993-69409c2 1059->1086 1092 69408f1-6940920 1061->1092 1073 6940455-694045f 1062->1073 1074 6940927-6940956 1062->1074 1093 6940a35-6940a64 1063->1093 1075 6940545-694054f 1064->1075 1076 6940a6b-6940d2e 1064->1076 1067->1057 1082 69401ac-69401d9 1068->1082 1068->1083 1069->1061 1084 69403ed-694041d 1070->1084 1070->1085 1071->1086 1087 69404dd-694050d 1071->1087 1072->1063 1091 6940465-6940495 1073->1091 1073->1092 1074->1059 1075->1093 1094 6940555-6940585 1075->1094 1082->999 1083->1067 1084->999 1085->1069 1086->1072 1087->999 1091->999 1092->1074 1093->1076 1094->999
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267307005.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6940000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5e8f56c9d55c288e12181b22d9efc4051858cd0d076704829aae5d63c230bdd3
                                                  • Instruction ID: 13d1741747f6e2c423040bcb718825ab31d6f303bf390dc1d6ec220af4b93b84
                                                  • Opcode Fuzzy Hash: 5e8f56c9d55c288e12181b22d9efc4051858cd0d076704829aae5d63c230bdd3
                                                  • Instruction Fuzzy Hash: E5428B3070162A8FDB65AF79D450A6EB7F6FBC5204B008A1DD6039B7A0CFB5ED058B91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1200 6943838-694385e 1201 6943876-69438cf 1200->1201 1202 6943860-6943866 1200->1202 1210 69438d5-6943914 1201->1210 1211 6943e77-6943f08 1201->1211 1203 6943868 1202->1203 1204 694386a-6943874 1202->1204 1203->1201 1204->1201 1210->1211 1218 694391a-6943936 1210->1218 1232 6943f0e-6943f2a 1211->1232 1233 6943fd9-6943fe0 1211->1233 1218->1211 1222 694393c-6943973 1218->1222 1229 6943975-6943999 1222->1229 1230 694399e-6943a05 1222->1230 1244 6943a3b-6943a55 1229->1244 1248 6943a27-6943a35 1230->1248 1249 6943a07-6943a21 1230->1249 1241 6943f52-6943f90 1232->1241 1242 6943f2c-6943f50 1232->1242 1261 6943f92-6943fa5 1241->1261 1262 6943fab-6943fb4 1241->1262 1257 6943fba-6943fd3 1242->1257 1244->1211 1252 6943a5b-6943a92 1244->1252 1248->1244 1249->1248 1264 6943a94-6943ab8 1252->1264 1265 6943abd-6943b20 1252->1265 1257->1232 1257->1233 1261->1262 1262->1257 1273 6943b56-6943b70 1264->1273 1276 6943b42-6943b50 1265->1276 1277 6943b22-6943b3c 1265->1277 1273->1211 1278 6943b76-6943bad 1273->1278 1276->1273 1277->1276 1282 6943baf-6943bd3 1278->1282 1283 6943bd8-6943c3b 1278->1283 1290 6943c71-6943c8b 1282->1290 1292 6943c5d-6943c6b 1283->1292 1293 6943c3d-6943c57 1283->1293 1290->1211 1295 6943c91-6943cc8 1290->1295 1292->1290 1293->1292 1299 6943cf3-6943d56 1295->1299 1300 6943cca-6943cee 1295->1300 1309 6943d78-6943d86 1299->1309 1310 6943d58-6943d72 1299->1310 1307 6943d8c-6943da6 1300->1307 1307->1211 1312 6943dac-6943de0 1307->1312 1309->1307 1310->1309 1316 6943de2-6943e06 1312->1316 1317 6943e08-6943e58 1312->1317 1324 6943e5f-6943e74 1316->1324 1317->1324
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267307005.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6940000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 67ea439b90e3aa5d537c08a107405be701963a6ef7b508d466e1c690b8ba61ac
                                                  • Instruction ID: 5bf05a48c08213b9c6dc35e3f86723c0bd2d8bd141f95d35d2a81581300bc73f
                                                  • Opcode Fuzzy Hash: 67ea439b90e3aa5d537c08a107405be701963a6ef7b508d466e1c690b8ba61ac
                                                  • Instruction Fuzzy Hash: D4421474B002149FDB44DF69C894EAEBBF6BF89704F14809AE606DB3A1DB71ED418B50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1327 6940d80-6940dcb 1332 6940dd1-6940dd3 1327->1332 1333 6940efd-6940f10 1327->1333 1334 6940dd6-6940de5 1332->1334 1337 6941006-6941011 1333->1337 1338 6940f16-6940f25 1333->1338 1339 6940e9d-6940ea1 1334->1339 1340 6940deb-6940e1d 1334->1340 1341 6941019-6941022 1337->1341 1347 6940fd1-6940fd5 1338->1347 1348 6940f2b-6940f51 1338->1348 1342 6940eb0 1339->1342 1343 6940ea3-6940eae 1339->1343 1374 6940e26-6940e2d 1340->1374 1375 6940e1f-6940e24 1340->1375 1345 6940eb5-6940eb8 1342->1345 1343->1345 1345->1341 1352 6940ebe-6940ec2 1345->1352 1350 6940fe4 1347->1350 1351 6940fd7-6940fe2 1347->1351 1376 6940f53-6940f58 1348->1376 1377 6940f5a-6940f61 1348->1377 1353 6940fe6-6940fe8 1350->1353 1351->1353 1354 6940ec4-6940ecf 1352->1354 1355 6940ed1 1352->1355 1360 6941039-69410b5 1353->1360 1361 6940fea-6940ff4 1353->1361 1358 6940ed3-6940ed5 1354->1358 1355->1358 1363 6941025-6941032 1358->1363 1364 6940edb-6940ee5 1358->1364 1409 6941189-694119c 1360->1409 1410 69410bb-69410bd 1360->1410 1369 6940ff7-6941000 1361->1369 1363->1360 1378 6940ee8-6940ef2 1364->1378 1369->1337 1369->1338 1381 6940e52-6940e76 1374->1381 1382 6940e2f-6940e50 1374->1382 1380 6940e91-6940e9b 1375->1380 1383 6940fc5-6940fcf 1376->1383 1384 6940f86-6940faa 1377->1384 1385 6940f63-6940f84 1377->1385 1378->1334 1386 6940ef8 1378->1386 1380->1378 1402 6940e8e 1381->1402 1403 6940e78-6940e7e 1381->1403 1382->1380 1383->1369 1399 6940fc2 1384->1399 1400 6940fac-6940fb2 1384->1400 1385->1383 1386->1341 1399->1383 1404 6940fb4 1400->1404 1405 6940fb6-6940fb8 1400->1405 1402->1380 1406 6940e80 1403->1406 1407 6940e82-6940e84 1403->1407 1404->1399 1405->1399 1406->1402 1407->1402 1414 6941234-694123f 1409->1414 1415 69411a2-69411b1 1409->1415 1411 69410c0-69410cf 1410->1411 1416 69410d1-69410fe 1411->1416 1417 6941129-694112d 1411->1417 1418 6941247-6941250 1414->1418 1424 69411b3-69411dc 1415->1424 1425 69411ff-6941203 1415->1425 1439 6941104-6941106 1416->1439 1419 694113c 1417->1419 1420 694112f-694113a 1417->1420 1423 6941141-6941144 1419->1423 1420->1423 1423->1418 1429 694114a-694114e 1423->1429 1447 69411f4-69411fd 1424->1447 1448 69411de-69411e4 1424->1448 1427 6941205-6941210 1425->1427 1428 6941212 1425->1428 1430 6941214-6941216 1427->1430 1428->1430 1433 6941150-694115b 1429->1433 1434 694115d 1429->1434 1435 6941267-6941284 1430->1435 1436 6941218-6941222 1430->1436 1437 694115f-6941161 1433->1437 1434->1437 1461 6941286-6941295 1435->1461 1462 6941298-69412af 1435->1462 1452 6941225-694122e 1436->1452 1442 6941167-6941171 1437->1442 1443 6941253-6941260 1437->1443 1444 694111e-6941127 1439->1444 1445 6941108-694110e 1439->1445 1459 6941174-694117e 1442->1459 1443->1435 1444->1459 1450 6941110 1445->1450 1451 6941112-6941114 1445->1451 1447->1452 1453 69411e6 1448->1453 1454 69411e8-69411ea 1448->1454 1450->1444 1451->1444 1452->1414 1452->1415 1453->1447 1454->1447 1459->1411 1463 6941184 1459->1463 1461->1462 1465 69412c7-69412e9 1462->1465 1466 69412b1-69412b7 1462->1466 1463->1418 1471 69412ec-69412f0 1465->1471 1467 69412b9 1466->1467 1468 69412bb-69412bd 1466->1468 1467->1465 1468->1465 1472 69412f2-69412f7 1471->1472 1473 69412f9-69412fe 1471->1473 1474 6941304-6941307 1472->1474 1473->1474 1475 694130d-6941322 1474->1475 1476 69414f8-6941500 1474->1476 1475->1471 1478 6941324 1475->1478 1479 69413e0-6941405 1478->1479 1480 6941498-69414b9 1478->1480 1481 694132b-6941350 1478->1481 1491 6941407-6941409 1479->1491 1492 694140b-694140f 1479->1492 1485 69414bf-69414f3 1480->1485 1493 6941356-694135a 1481->1493 1494 6941352-6941354 1481->1494 1485->1471 1498 694146d-6941493 1491->1498 1499 6941430-6941453 1492->1499 1500 6941411-694142e 1492->1500 1495 694135c-6941379 1493->1495 1496 694137b-694139e 1493->1496 1501 69413b8-69413db 1494->1501 1495->1501 1517 69413b6 1496->1517 1518 69413a0-69413a6 1496->1518 1498->1471 1515 6941455-694145b 1499->1515 1516 694146b 1499->1516 1500->1498 1501->1471 1519 694145d 1515->1519 1520 694145f-6941461 1515->1520 1516->1498 1517->1501 1521 69413a8 1518->1521 1522 69413aa-69413ac 1518->1522 1519->1516 1520->1516 1521->1517 1522->1517
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267307005.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6940000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e2fdcef43984ba44aea11d61a82f354e31e83a292be57b86bc1a8421e1ede28e
                                                  • Instruction ID: 1b10f41856675d892152323ffe75d4043dc59d78d63a90de1e83c47f2dd14168
                                                  • Opcode Fuzzy Hash: e2fdcef43984ba44aea11d61a82f354e31e83a292be57b86bc1a8421e1ede28e
                                                  • Instruction Fuzzy Hash: F1229130B002059FDB55AB65C854E7EBBF6BF89300B15845AE616CB7A2CF71DC81CB91
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3f90020706e004d0388dcc69ef5e5511354a98166698cc6f943b2a5a4f5f27f8
                                                  • Instruction ID: 52ab8c10f71bcfdd4970d51960df44ad5f4e648a200bda11b244e55d9c76b066
                                                  • Opcode Fuzzy Hash: 3f90020706e004d0388dcc69ef5e5511354a98166698cc6f943b2a5a4f5f27f8
                                                  • Instruction Fuzzy Hash: C4325934B007018FDB55DF6AD888A6ABBF6FF89704B2584A9E506CB761DB30EC45CB50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267307005.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6940000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2de0fc56841e64c1dda1e79aec65f605b079c7d3ad75a799be32341d386fef4d
                                                  • Instruction ID: 80f44c99fb157b9803aefa32be731eba5d3e289c8d0e27465d04e058862c3e41
                                                  • Opcode Fuzzy Hash: 2de0fc56841e64c1dda1e79aec65f605b079c7d3ad75a799be32341d386fef4d
                                                  • Instruction Fuzzy Hash: 72028C307102158FEB54AF65C854F6D77B6FB89304F10891AEA029B7A1CFB6ED06CB91
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267307005.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6940000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d08fade55f639cca8abde1e195972a530d0a4b67764e2a741349061b68d40a4d
                                                  • Instruction ID: aa90e3dda0a395f7241f568885c82d3fc6bde6a3bb62a7b8acc408088bf5aa47
                                                  • Opcode Fuzzy Hash: d08fade55f639cca8abde1e195972a530d0a4b67764e2a741349061b68d40a4d
                                                  • Instruction Fuzzy Hash: 29E19E30B002149FEB54AB65C894F6D77B6FB89304F10895AEA028B7A1CFB5ED45CB91
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267307005.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6940000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 36156be7a4e41405949b3c6763555bb8efc1fc5e97f46a6671a403a7cb1252fe
                                                  • Instruction ID: c477ab9ae7082ec8541f98cd54432b5ccc5013a459a3d36e8c85ce26bd1f98e8
                                                  • Opcode Fuzzy Hash: 36156be7a4e41405949b3c6763555bb8efc1fc5e97f46a6671a403a7cb1252fe
                                                  • Instruction Fuzzy Hash: 40D17130B002149FEB54AF65C898FA977B6FF89704F10845AEA028B7A1CFB5DD45CB91
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267307005.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6940000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 75c3b9875902fb47981d336ccab6200f964eaeeed36f7a785c32b4c10407cec2
                                                  • Instruction ID: 71969a6a96e791da3ea95e4d6cddd66d07fccf1d262cef5bc90fbd6c6452d0e2
                                                  • Opcode Fuzzy Hash: 75c3b9875902fb47981d336ccab6200f964eaeeed36f7a785c32b4c10407cec2
                                                  • Instruction Fuzzy Hash: 92C17F30B102049FEB44AB65C858FA97BB6FF89704F14845AEA02CB7A1CFB5DD41CB91
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267307005.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6940000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c271865e2592fc5b6916603153f676fcd17175cc75dd996d32b349eb5c00b26e
                                                  • Instruction ID: 751949e2620dcfd87a675bba992611be89abebfefb987ef6e9c74352d973237c
                                                  • Opcode Fuzzy Hash: c271865e2592fc5b6916603153f676fcd17175cc75dd996d32b349eb5c00b26e
                                                  • Instruction Fuzzy Hash: 16C1E234B042459FDB94AB65C854F3ABBEAEF85304F10885AE6038B7A2DF71DC85C791
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 05da1f995286076ab2531d327759c27d5b053629dd91ea54d40534b4215b594a
                                                  • Instruction ID: 4b32e8d3f84e2c444604098b8d9716a955025c625420a7589d7fcb791a529790
                                                  • Opcode Fuzzy Hash: 05da1f995286076ab2531d327759c27d5b053629dd91ea54d40534b4215b594a
                                                  • Instruction Fuzzy Hash: E8B16934B00605CFCB54DF7AD598AAABBF6BF88704B2580A9E546DB761DB30EC05CB50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b1508f52d4e307929f91fc2444d40cae77aec5ec9230978e9eb220ad8efab3c0
                                                  • Instruction ID: a30c721111119a389443d10a5e42e65f8301afebaaa838fccac11c87992f4a01
                                                  • Opcode Fuzzy Hash: b1508f52d4e307929f91fc2444d40cae77aec5ec9230978e9eb220ad8efab3c0
                                                  • Instruction Fuzzy Hash: 53512471E003188FDB55CFEAD890BEEBBF5AB88714F248429E419AB654DB749845CB80
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267307005.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6940000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4d607503d5f587f94d0aaf7b0ef78a7e4c4ee09302eccdb31c386b78cfeac1c4
                                                  • Instruction ID: 58587c2a43534f231e1a0d3a3885b80bfb15bd6f77c961c00d3222562a5ecff5
                                                  • Opcode Fuzzy Hash: 4d607503d5f587f94d0aaf7b0ef78a7e4c4ee09302eccdb31c386b78cfeac1c4
                                                  • Instruction Fuzzy Hash: A4513635B101159FCB44DF69C894DAABBB6EF89310B1180A9E90AEB361DB31EC05CB50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9827749f720e7ea084dfcc2e8227732cc1ff33c3088af4cecf7550dae993c903
                                                  • Instruction ID: e1b10ff7f75eb723454c507c427a33d94fb1dcaaade6145c1cc9c7871ed417ec
                                                  • Opcode Fuzzy Hash: 9827749f720e7ea084dfcc2e8227732cc1ff33c3088af4cecf7550dae993c903
                                                  • Instruction Fuzzy Hash: D4513670D003599FDB55CFEAD880BEEBBF5AF48708F24842AE415AB650DB749845CF80
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dfd4b7c2b9cecf221f814c5bc1530dfaabf271fe8f0ebdcc7579581231321177
                                                  • Instruction ID: b3cbdbd6fe1ba3f9a23c8afbf0610953dcb5208f937cd7b38169833137c8155e
                                                  • Opcode Fuzzy Hash: dfd4b7c2b9cecf221f814c5bc1530dfaabf271fe8f0ebdcc7579581231321177
                                                  • Instruction Fuzzy Hash: 3C414A34A00606CFCB15CF5AC880D6ABBF2FF89314B26C999E555DB661D730F901CB90
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 831368995f79e99f41dc3f302a302a865baac91091c067a51ad95a8f3acc652e
                                                  • Instruction ID: 640bbecb01010f8c31f78552a64810456593c3d0e7eb9aa9368ab295976ce4b1
                                                  • Opcode Fuzzy Hash: 831368995f79e99f41dc3f302a302a865baac91091c067a51ad95a8f3acc652e
                                                  • Instruction Fuzzy Hash: 0B313431B053528FC326A738A4145AE7BE6EFCA21031544AFE94ACB781CE30DC0BC7A5
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9399e0604360a8fa2a484054e3f7b0b216d47a585c592e2a5c083ade5cdc2dcf
                                                  • Instruction ID: d21b81e45f9f52c2296e8e61cc335d53cc1795ede189d039d3b4a5fb56673ddf
                                                  • Opcode Fuzzy Hash: 9399e0604360a8fa2a484054e3f7b0b216d47a585c592e2a5c083ade5cdc2dcf
                                                  • Instruction Fuzzy Hash: 7A318E35B013119FCB55DF34E84896EBBB6BF89301B158469E905DB365CB30DD45CBA0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 25af175294cd195a4e25fcceb68847411fbeca00005e999031162d6b91084036
                                                  • Instruction ID: 5e28ccf371b50c432752a034d11cc44f8d9a48331296f43be69c5986a1a9aeae
                                                  • Opcode Fuzzy Hash: 25af175294cd195a4e25fcceb68847411fbeca00005e999031162d6b91084036
                                                  • Instruction Fuzzy Hash: BB318D31B012168BCB19EF7DE46456E37E3AFC8210724487AD60ACB3C5EE39DC068B95
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ea429b9ec87a48bd49c4f412bcaffff01b48106351aa2f899b4a7d36c12b34f9
                                                  • Instruction ID: 5f659275fb7486b7fa49e76ce81dd74e043bb0ff1dfc4ab69b1a2fd9ad234392
                                                  • Opcode Fuzzy Hash: ea429b9ec87a48bd49c4f412bcaffff01b48106351aa2f899b4a7d36c12b34f9
                                                  • Instruction Fuzzy Hash: 52313935B053119FC7067BB9A82859E3FBBFBC621531445AAF606CB395DE308C06C7A2
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: db17daadd7a6f60fded2f07ae0ec5789676e65d93bde1a80cefc29a310014ac6
                                                  • Instruction ID: 0cbdf44d25a75db6c9e585559eeebd38bb403b99acb2fd676deb56d00de5c26b
                                                  • Opcode Fuzzy Hash: db17daadd7a6f60fded2f07ae0ec5789676e65d93bde1a80cefc29a310014ac6
                                                  • Instruction Fuzzy Hash: 6B316834B003119FCB55DF39E88896EBBB6BF89300B118469EA05CB365DB31ED41CBA0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 58e9534ddd035ce1bb99f26dac6167d19b518e05cace936f159f381333fb4eb2
                                                  • Instruction ID: a81f07f2d1c5c11e5662470856f2b31e7c98e098498de3846ad1449cad2f9b94
                                                  • Opcode Fuzzy Hash: 58e9534ddd035ce1bb99f26dac6167d19b518e05cace936f159f381333fb4eb2
                                                  • Instruction Fuzzy Hash: C741E2B1D01248DFDB54CFAAD950ADEBBF5AF88310F24842AE415BB250DB34A945CF90
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0af5aa91f30433bc59a2c2c6dfa37509e70226215b100f2067d214e616691b79
                                                  • Instruction ID: d553c27674f32afcae40e4667502fc2566143bf3ccf819666227800038407f42
                                                  • Opcode Fuzzy Hash: 0af5aa91f30433bc59a2c2c6dfa37509e70226215b100f2067d214e616691b79
                                                  • Instruction Fuzzy Hash: 063115B1D013489FDB14CFAAD950ADEBBF5AF88310F24842AE425BB250DB349945CFA0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e62709982ebbfafbdd4b2c333112ca37a3d33a8fd29054fbfd8432da15f9f4ab
                                                  • Instruction ID: d874a046045cd784e32d3f15f4e7cef294d095d13b0f60d9ff337cc047551f79
                                                  • Opcode Fuzzy Hash: e62709982ebbfafbdd4b2c333112ca37a3d33a8fd29054fbfd8432da15f9f4ab
                                                  • Instruction Fuzzy Hash: 573108B1D01358DFDB54CFAAD950BDEBBF9AF48310F24841AE415B7240C775A945CBA0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2256801002.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_130d000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 14db41ac824b6c592555559926a6193d69eea863889812f4630cc5451120eaf0
                                                  • Instruction ID: 45fa9cd0446b8229e69f7aa4ab5ce26a8a069e294cf1f15fd94520b8458783eb
                                                  • Opcode Fuzzy Hash: 14db41ac824b6c592555559926a6193d69eea863889812f4630cc5451120eaf0
                                                  • Instruction Fuzzy Hash: F5214571100204DFDB02DF84D9C0B66BFE5FB84328F20C56DE9091B286C736E446CBA2
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2256850111.000000000131D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_131d000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1f53540fcf9acd03741db93527cdfce9351587727f412e2ee1ca9d0d80838876
                                                  • Instruction ID: cfea016bf9b27f5dec105025a15f5f09ba867dbd0c5c605a27f093e662a62f4a
                                                  • Opcode Fuzzy Hash: 1f53540fcf9acd03741db93527cdfce9351587727f412e2ee1ca9d0d80838876
                                                  • Instruction Fuzzy Hash: 38213475604204EFDB19DF58D9C8B16BB65FB85318F20C56DD90A4B24AC33AD447CA61
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d15e1e16e55dc9b930333b15199a1f842cf81273e4309ba6dd3800bac494335f
                                                  • Instruction ID: fe3d056c70d8d5021cae668cbc3a648968301485d836f09914214e45ae711366
                                                  • Opcode Fuzzy Hash: d15e1e16e55dc9b930333b15199a1f842cf81273e4309ba6dd3800bac494335f
                                                  • Instruction Fuzzy Hash: CC214274D0424ADFCF04CFA9D584AEEBBB4FB09311F2041AAE411A7391C7341A82DBA0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 573abe9030707d8936ce5bad3768454134b3a5615413e0ab0f778b07b27db8bc
                                                  • Instruction ID: d2e9f0ed11e68ec1f35233429630f720274913188f576633ecf15dcc2fb4174a
                                                  • Opcode Fuzzy Hash: 573abe9030707d8936ce5bad3768454134b3a5615413e0ab0f778b07b27db8bc
                                                  • Instruction Fuzzy Hash: 642124B1D013589FDB14CFAAC994BDEBFF9AF48710F24842AE405BB240CB749845CBA4
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: aad3d24e8c448343c080d2f5faaa491be8fe0b5076281aa08346a57b80124492
                                                  • Instruction ID: a75737a0e09d9a871cb779b652d4aee7a8d7ee8f1bc6fa243a9e7951ded96d7e
                                                  • Opcode Fuzzy Hash: aad3d24e8c448343c080d2f5faaa491be8fe0b5076281aa08346a57b80124492
                                                  • Instruction Fuzzy Hash: C501B9622092D47FC7234ABA5C24CFB3FADD98B155309418BF9D4D6492C0288A52D7B1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8bd10716654578fb68ca08ccad670cc4450723806a11a56fd1c5eeb62ffff911
                                                  • Instruction ID: 5f765da7f45ad002dd395c16900ecb955ab208b1dba954fc866ad1ee002a4c98
                                                  • Opcode Fuzzy Hash: 8bd10716654578fb68ca08ccad670cc4450723806a11a56fd1c5eeb62ffff911
                                                  • Instruction Fuzzy Hash: 8911A9312212025FC786B778A87456E7BE7FEC2244744891DE2078B742CE70AD4787A2
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2256801002.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_130d000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0975082927a414f3a70faae16f5f7251334da3a266367595ab6f83674f7d4e0c
                                                  • Instruction ID: 18f827b993f078da7c0220f1349572dbcae7d2299a50c0f30ea14a0eb1630483
                                                  • Opcode Fuzzy Hash: 0975082927a414f3a70faae16f5f7251334da3a266367595ab6f83674f7d4e0c
                                                  • Instruction Fuzzy Hash: 06110372404280CFCB02CF84D9C0B56BFB1FB84328F24C6A9D8090B657C33AE456CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2256850111.000000000131D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_131d000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e5dafeece261ed5f36609df0c38f61fd31d97a5851a4554c05f514f158599941
                                                  • Instruction ID: b498663dc48bbfa3b034dcea1c3f7151247d2dbe64705cae980ee90fa8bfbd56
                                                  • Opcode Fuzzy Hash: e5dafeece261ed5f36609df0c38f61fd31d97a5851a4554c05f514f158599941
                                                  • Instruction Fuzzy Hash: 2411D075504280CFCB16CF54D9C4B15FF61FB45318F24C6A9D8094B65AC33AD44ACB62
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 30e8ff78c3b0e41f15bcb506e0313596f1125cdcf3ff3fd403be1d1d0a05a49b
                                                  • Instruction ID: b766b44b696ff725289b4d5f5fd3fa1b2f676d115c49440ff431861c6a3ea69d
                                                  • Opcode Fuzzy Hash: 30e8ff78c3b0e41f15bcb506e0313596f1125cdcf3ff3fd403be1d1d0a05a49b
                                                  • Instruction Fuzzy Hash: BD01A1352042018FD316FBA9E85465A7BE3FFC6315B108B29D14B8B781CF749D0B8B92
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0130ef29b9b0cc340ca49414d71eacf824c7c3474d2e760b1fb41c024d48821b
                                                  • Instruction ID: d907b472954b5f63ac85e49cead710bad5cc956df6227a41cf7968cb14744809
                                                  • Opcode Fuzzy Hash: 0130ef29b9b0cc340ca49414d71eacf824c7c3474d2e760b1fb41c024d48821b
                                                  • Instruction Fuzzy Hash: 0C018F71B001199FDF10DEAAEC44ABFB7FEFBC8651B14403AE614D3241EB71991587A1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cbc9c4dab6c86fefd31245af69fd54db58058fe3e819976b3a9caee4eee7f740
                                                  • Instruction ID: 5eced8f0e6f421f8a50e7187436ed07395a0b478fb576bbecdb1221ec9151a56
                                                  • Opcode Fuzzy Hash: cbc9c4dab6c86fefd31245af69fd54db58058fe3e819976b3a9caee4eee7f740
                                                  • Instruction Fuzzy Hash: 4FF028367093555FC7636BA96C244EB7FA5D9C6245344409EE283C7652CA648C07C7F1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 36b5372b4263eea3f6dd788dd1836888e0fcf9585bc11377fa5df29c1a18b1c2
                                                  • Instruction ID: f69b916d662791db330b82e7c1f6c9075b0de5a456aa8c1738fce2813b86a5f9
                                                  • Opcode Fuzzy Hash: 36b5372b4263eea3f6dd788dd1836888e0fcf9585bc11377fa5df29c1a18b1c2
                                                  • Instruction Fuzzy Hash: B4015E312211068FC796B7B8A87852E7BE3FEC1254754882CE2078B741DE70BD878796
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c0e2ba2bb5725e2ae58ac20c2fd57f26f262738fd03f8a82781d5c32026ce99d
                                                  • Instruction ID: dafc4500e6ea6ab76f9feab79f176c35eaec608b96424b15aa900c4809e03798
                                                  • Opcode Fuzzy Hash: c0e2ba2bb5725e2ae58ac20c2fd57f26f262738fd03f8a82781d5c32026ce99d
                                                  • Instruction Fuzzy Hash: 2801F9346093049FCB01EFB4D81499A7FBAEF8A20071485E9F501CB762DB32DD06C792
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8409e353392ebb2e809e23d85c04f138271c9f86ac95123eae858a2f64595af3
                                                  • Instruction ID: bb4619159f2c87253519e8d8b84b98144ec8097e7362e232be4da7c6b87b322c
                                                  • Opcode Fuzzy Hash: 8409e353392ebb2e809e23d85c04f138271c9f86ac95123eae858a2f64595af3
                                                  • Instruction Fuzzy Hash: CA015E35600206CFD325BFA9D45865A7BE3FBC5319B108A2DD14B87784DF75AC0B8B92
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7e9ce7ed4f5764110a2d99730eb7ff5186ce19cdcddde96e3426790fa0a57e4a
                                                  • Instruction ID: b1196dffc603da91c4a11329c1cd121de6da7beb0f4e88ef7431df3ea5003a8c
                                                  • Opcode Fuzzy Hash: 7e9ce7ed4f5764110a2d99730eb7ff5186ce19cdcddde96e3426790fa0a57e4a
                                                  • Instruction Fuzzy Hash: 2B018130A11702CFD7A99A3AE508527B7EBBF84305725882DE506C6A54EA71E881CB90
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 69a7584baee8734b3c507cabc79bd9b6fd0af8fc9fd2e60b7a7796af8deff19d
                                                  • Instruction ID: 7c5990feb30af0a508c50c77a27c2ca5866ec34f1c84ce3fe2797a023972b412
                                                  • Opcode Fuzzy Hash: 69a7584baee8734b3c507cabc79bd9b6fd0af8fc9fd2e60b7a7796af8deff19d
                                                  • Instruction Fuzzy Hash: 58018F3490624AEFCB45FBB8E89459CBFB2FF89300B144299E446A7351DB305E47CB92
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f870a8c11f6d3dc96d405f870e90ee75d3430dda75a8909fa1c5c4f48b81f91b
                                                  • Instruction ID: 091f479279180af4ab9a87a1401b488e35a021d9fca892529e35bbc42f776d06
                                                  • Opcode Fuzzy Hash: f870a8c11f6d3dc96d405f870e90ee75d3430dda75a8909fa1c5c4f48b81f91b
                                                  • Instruction Fuzzy Hash: 96016975E042188FDF24CFA9E848AEDBBF5FB8D310F04916AE454B3641CB344845CBA4
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3d8f18a0ce6ff343dbaac8bd5282fbe5f1430d7b6ec5d924d132b83f826866ec
                                                  • Instruction ID: dcd050f4b29124d89294994533c994572f4b789f63e24f1a1c08f4cf8acdaa29
                                                  • Opcode Fuzzy Hash: 3d8f18a0ce6ff343dbaac8bd5282fbe5f1430d7b6ec5d924d132b83f826866ec
                                                  • Instruction Fuzzy Hash: 5401A235501B409FC311EF66E804592BBF6FF89301700861AE44B82611CB30A90BCFD5
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 09a81b3874b4bf798a8aef396f15b724354e32b7d6e6a4e6fc98e2bd71cfe575
                                                  • Instruction ID: 0cf8978f7065ca9746ddf5b6fafc1da8e513c74bbe5d25359b8483e376e1ab6d
                                                  • Opcode Fuzzy Hash: 09a81b3874b4bf798a8aef396f15b724354e32b7d6e6a4e6fc98e2bd71cfe575
                                                  • Instruction Fuzzy Hash: 1F01D6B4D0420AEFDB54DFAAD5456EEBBF5BB48301F2085AAE415A3340E7740A41DF90
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 06b3cd8908caf1bb892fde1b8fc3f4bd62ab2914ee0b92fa84fabbcf7e32df55
                                                  • Instruction ID: a03e47c2b76446625be29038ce83c66041fc4507dfba06ac5ed635e3d877f530
                                                  • Opcode Fuzzy Hash: 06b3cd8908caf1bb892fde1b8fc3f4bd62ab2914ee0b92fa84fabbcf7e32df55
                                                  • Instruction Fuzzy Hash: D6F046305093428FC762CB22D804AA3BFBBAF81214F09459DF04182D22C771E884CBA0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: deb6e59c86605257c00930eaedc9220ee41b101fb9673bea3411866ccc98bb9c
                                                  • Instruction ID: ed4c30919f81146cfe4f5181e1ab6b0f1b33746fa322ef6f1ff2353c8f4fef3c
                                                  • Opcode Fuzzy Hash: deb6e59c86605257c00930eaedc9220ee41b101fb9673bea3411866ccc98bb9c
                                                  • Instruction Fuzzy Hash: DDF090303002038FC229E729E4649AF77D7EBC9250310892DD20A8B344EF70EC4B87A5
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c1b42dab56ffa5cef755fe58205ff916e3b471e657dfb07cb1e2a37e2756214d
                                                  • Instruction ID: afa3f0067bf626e20a317ac16e84591399a6cbf3babbfc47ab669fe1a0935b5f
                                                  • Opcode Fuzzy Hash: c1b42dab56ffa5cef755fe58205ff916e3b471e657dfb07cb1e2a37e2756214d
                                                  • Instruction Fuzzy Hash: C1F04975E002188BCF14DFAAE804AEDBBF9FB8D311F00912AE414B3340CB345844CBA4
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f2f9c29f7bdd22500353ac3e47107beaf510b127677f923d61308c5746029093
                                                  • Instruction ID: a0bc3924dea7da0c0e399de544405530b8591365b595116f493b2f147228a336
                                                  • Opcode Fuzzy Hash: f2f9c29f7bdd22500353ac3e47107beaf510b127677f923d61308c5746029093
                                                  • Instruction Fuzzy Hash: 4AF0A7352091416FC321776DAC64BDFBEDAEFCA255F404029F20B87283CB65184587B6
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9278eea3116c4e8222812479a517049b53690699e802133650a6b2e451191067
                                                  • Instruction ID: be40bf3243b7f01b5b99b832ba6f837c0a3dc1326417c2c2266bad41430bb5e0
                                                  • Opcode Fuzzy Hash: 9278eea3116c4e8222812479a517049b53690699e802133650a6b2e451191067
                                                  • Instruction Fuzzy Hash: C6F096301067D19FC312A769E81469B7FE6DFC2204B04459EE2868B652CA655D0687E2
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0ed0e8a5f3130843966df46af8f9bc38da93bbf2c61f143b00d49096bd66224b
                                                  • Instruction ID: 34907530a00df85a88cec51d0c7065623bbe6bb0aa4536eb3c29ad94e379d96c
                                                  • Opcode Fuzzy Hash: 0ed0e8a5f3130843966df46af8f9bc38da93bbf2c61f143b00d49096bd66224b
                                                  • Instruction Fuzzy Hash: C8F012622051E87F8B618E9A5C14CFB7FEDDA8E1617094156FE99D2181C429CD21ABB0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d8b670a4b65f6ef9a58ce4e8f2243a830b10a9fbd4068df0020d3a26e4a6cd39
                                                  • Instruction ID: 3b5cde52b505f3145aa494862ce84f86c146d1ada57a9c983fb294d3f4aa5c98
                                                  • Opcode Fuzzy Hash: d8b670a4b65f6ef9a58ce4e8f2243a830b10a9fbd4068df0020d3a26e4a6cd39
                                                  • Instruction Fuzzy Hash: 50F0B432B403009FD7208B29EC04F957BEA9B82714F14826AF214CB5F2D2B1D8069780
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 58728e476a25d63116813612355f7736dc20f6ad212cb05c00e83be79898155d
                                                  • Instruction ID: d82295eb793d34b90bcfad7fc6afa9309623913fcbbc4b059bd5d42c18f3be62
                                                  • Opcode Fuzzy Hash: 58728e476a25d63116813612355f7736dc20f6ad212cb05c00e83be79898155d
                                                  • Instruction Fuzzy Hash: 7EF0CDB5C08249EFDB00CFA1C9551FEBFB0EB5A201F0042CAF406E7B50E6358A41DB90
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a065aacd27c98b7f9b6090b0283d1a8603a9c50ffe19d788645d08781c98c278
                                                  • Instruction ID: af87b464208b64365d9b1487fe699bc99778cf5090b7ebc6a63b219146d12d67
                                                  • Opcode Fuzzy Hash: a065aacd27c98b7f9b6090b0283d1a8603a9c50ffe19d788645d08781c98c278
                                                  • Instruction Fuzzy Hash: 55F0E572F101155BCF10DAA9AD49AFF7BEEEB84260B1C0127EA14E3101FB34881A83B1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1205475875ae8f7781c95230fb9c14d7808ba75c2303c4b51a1bdbd3090153a6
                                                  • Instruction ID: 14a13b4312f8e69902c193f671f2ac89684cf12fe68aba62ee6e50b1440b1d67
                                                  • Opcode Fuzzy Hash: 1205475875ae8f7781c95230fb9c14d7808ba75c2303c4b51a1bdbd3090153a6
                                                  • Instruction Fuzzy Hash: 27F04F74E0220AEFCB44FFF9E89455CBBB2FB84200B1445A9D506A7350DF305E46DB51
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d909531b34a83ab54a2da4772bf1ef4267e056aa8535e7bc5fdb7dabe816ed2e
                                                  • Instruction ID: e05c57cf618bd4ca11867013527cb8711f814dc3131301e362d99a6fa5c402b4
                                                  • Opcode Fuzzy Hash: d909531b34a83ab54a2da4772bf1ef4267e056aa8535e7bc5fdb7dabe816ed2e
                                                  • Instruction Fuzzy Hash: E9E09235305101AFC3117B9AAC58A9FBADAEBC9355B00802CE20FC3246CB666C0647A5
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 975ea582fcb1d1298cabf1789fd0ecc028853383129c0c8f80e5231c0c70c881
                                                  • Instruction ID: 358647a7a2436e013f68dc9ee893ae8d2103a9c3ec29234f3a6d1577bde376ed
                                                  • Opcode Fuzzy Hash: 975ea582fcb1d1298cabf1789fd0ecc028853383129c0c8f80e5231c0c70c881
                                                  • Instruction Fuzzy Hash: A2F06735901B018FD725EFA6E408512BBF6FB88301700C62AE98B82A10DB71A90BCF85
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 75edd151de2651030727da263840de7fa39dd6edce0940517c5396f6c544e640
                                                  • Instruction ID: 0e917e5d7e6fa4ccafc3b6223f94ae5fdf4154fd04ebbabc1597a2d2c85bf008
                                                  • Opcode Fuzzy Hash: 75edd151de2651030727da263840de7fa39dd6edce0940517c5396f6c544e640
                                                  • Instruction Fuzzy Hash: BCE04F312167609FCF52FB2EFC10AEA7BA6EB46611B044355F102CB64ACA3409478BE6
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8e4abe3c7b3d83026957d3d6c98963531c85e52657e4905fbe4f92d58b8c7c9a
                                                  • Instruction ID: 331b9da0274c8c4f16cd8a39180280a0bd4251a61a79c1229939060d448d89d5
                                                  • Opcode Fuzzy Hash: 8e4abe3c7b3d83026957d3d6c98963531c85e52657e4905fbe4f92d58b8c7c9a
                                                  • Instruction Fuzzy Hash: B7F01535D0120CEFCB41EFB4D9489CDBBB9EB44200F1042A6E846E2240EA305B459F92
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 08b84a3c6c2810e10509516f64c887f10056d82333f11ee018f13a93f6a3a632
                                                  • Instruction ID: c1c40463bc47cc8c50c20e39b12cff284a22d238541ceec585b924261459400c
                                                  • Opcode Fuzzy Hash: 08b84a3c6c2810e10509516f64c887f10056d82333f11ee018f13a93f6a3a632
                                                  • Instruction Fuzzy Hash: A0E030302007529FC711B76DE85879EBBE6DBD5219F04052DE24687741CAA1AC068792
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cbf06ee2bf928718cad60ec4dfbcccae0a6c5045da5a6ba45458aede76167c51
                                                  • Instruction ID: 7b64b1ca32c503bfc27dc90083bb39cff3d079ec81c70689cb5a8956c63efbf9
                                                  • Opcode Fuzzy Hash: cbf06ee2bf928718cad60ec4dfbcccae0a6c5045da5a6ba45458aede76167c51
                                                  • Instruction Fuzzy Hash: 0AE0D87000B3A1EFDF03F328B8055A93FB5EB026007004295F8418BA45C6304C4387D2
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 958da2b7e7a19e033159fd6c051d71080ae30db4d503a068f681a5d5bce3a339
                                                  • Instruction ID: 20e580d1c40a62dd4999d2881b463e3f412d24c39750ad0e2512e054682642d3
                                                  • Opcode Fuzzy Hash: 958da2b7e7a19e033159fd6c051d71080ae30db4d503a068f681a5d5bce3a339
                                                  • Instruction Fuzzy Hash: 68E04FB211D3504FD3059625F8099C63B99EB62320F558CAEE140CA096EA7DD443CA56
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 756dd09f26bd979095173817b35df151cf4350f52c5494597ff740acbd9dd48f
                                                  • Instruction ID: 5f0d655ef364cad021445f7ab84d51ff86085be8561c3b42ef6a787bea06c840
                                                  • Opcode Fuzzy Hash: 756dd09f26bd979095173817b35df151cf4350f52c5494597ff740acbd9dd48f
                                                  • Instruction Fuzzy Hash: 59E0EC79115244AFC7429A58D840C967FBABF5A6113444186F5418F173C72199259BA1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f5090a43f8706da515db640fc3a8c2083ba9b9a9d6470f06f876a12e3854da41
                                                  • Instruction ID: 7fff7abac17240b5fce1a5bfe510ddd89768f8ff78feae5d40aea132041fa41d
                                                  • Opcode Fuzzy Hash: f5090a43f8706da515db640fc3a8c2083ba9b9a9d6470f06f876a12e3854da41
                                                  • Instruction Fuzzy Hash: 8AE0CD296057155F8705266D58201F77B9BD6C76113158153F101CB106DA254C0B4391
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c2b6eef0a6c4e0d2c51eccb1b5887aa46889ebcdf346cb4a1af2e5f5a1dcfd50
                                                  • Instruction ID: 1c7c98969bf7657a2e10ec97135ff02f546ff786903a4d8d3e423c4bbf6a814c
                                                  • Opcode Fuzzy Hash: c2b6eef0a6c4e0d2c51eccb1b5887aa46889ebcdf346cb4a1af2e5f5a1dcfd50
                                                  • Instruction Fuzzy Hash: 18E0D871909205EFCB01EBA8E80089D7BF1DB4220072046DAD805D3290D5300F128792
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 348091abf7d16030283fe0dfb836ae0659ef58164d3d0c1c53ebd2b714c1f38c
                                                  • Instruction ID: 9016bc3920bdcdbafa1aebcc46a083d50c16376fc2df469f97433d80539c7583
                                                  • Opcode Fuzzy Hash: 348091abf7d16030283fe0dfb836ae0659ef58164d3d0c1c53ebd2b714c1f38c
                                                  • Instruction Fuzzy Hash: FFD05E353101299B8B06776DBC184AFBBABEAC9662300402EE70BC3340CF665D0387E5
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1cb9f9aa2e1188a49ffd4db0e5e55c7748a71bcaf872cd5799f39622b1b39529
                                                  • Instruction ID: a6d080f63bf40d297282a30cb884a82f58c00413b0a1e2335efaa95ede07780b
                                                  • Opcode Fuzzy Hash: 1cb9f9aa2e1188a49ffd4db0e5e55c7748a71bcaf872cd5799f39622b1b39529
                                                  • Instruction Fuzzy Hash: 78E09A75D0020CEFCB40EFE5D9448DDBBB9EB48200F1082A6D905A3200EB315F55DF81
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e78b86ca060e1ea5aa43469e00adce9c523136ac1e4f88ad597e43ee53639871
                                                  • Instruction ID: 4c95fb58e29b727ae3a7b267b44c13ded648333a47c9dd73cf89a4e71dda6aa6
                                                  • Opcode Fuzzy Hash: e78b86ca060e1ea5aa43469e00adce9c523136ac1e4f88ad597e43ee53639871
                                                  • Instruction Fuzzy Hash: 87E0CD30504226CFCB56FB15FD0678977A2FB49708F101204D9121B6A8D7B01A578BC5
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4b55e6a80bf607ed6c3680e8e4beddc8cf547b9e2e087023d6728fac10b9871e
                                                  • Instruction ID: e316f87ecaa540b7c0a69f9a9dbca256b3e84070b26a8e91593aaf1a29f409a2
                                                  • Opcode Fuzzy Hash: 4b55e6a80bf607ed6c3680e8e4beddc8cf547b9e2e087023d6728fac10b9871e
                                                  • Instruction Fuzzy Hash: 96D01771A01209FFCB41EFA8E90095DB7F9EB45204B1085A99609E3300EA316E019B91
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 30f5ce6c68743bb16969d7ebed117575eb53c4581ab1dcae0b9064e3c81bb472
                                                  • Instruction ID: b2558a2a131a369b6122707048c387256e997e38bb4123ba01616de02a8df80d
                                                  • Opcode Fuzzy Hash: 30f5ce6c68743bb16969d7ebed117575eb53c4581ab1dcae0b9064e3c81bb472
                                                  • Instruction Fuzzy Hash: D2C01272B111200F4285B7AC74240AE6AD7E6E92A3399402AE60FC7388CEB08C424382
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c364d92f29e8bb7c90adfc9da44f69fd3cb5ecc0333e0858975f7fdeff8dffb9
                                                  • Instruction ID: 678cb9c8360ea26dbc660d86e5c943ce9b60ffbe6ca370ada0a107d50a7b65ac
                                                  • Opcode Fuzzy Hash: c364d92f29e8bb7c90adfc9da44f69fd3cb5ecc0333e0858975f7fdeff8dffb9
                                                  • Instruction Fuzzy Hash: 6FC09BD351F3805FD30715105C618F21F2555B715430F42C3F9D1E7553D52846265773
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fd70acf28079aac0fb96fadba7ba764ab74fd19ae2ad5d9e1de790dff9e5e494
                                                  • Instruction ID: e135ea07b2feb766e787ace1a1c34606f8a32344bf9aa940f96419dcc817ecb1
                                                  • Opcode Fuzzy Hash: fd70acf28079aac0fb96fadba7ba764ab74fd19ae2ad5d9e1de790dff9e5e494
                                                  • Instruction Fuzzy Hash: 4DC04C6158B6905ADB0617648C0D5857F16EB5372071540C6E2418A466D61104068AD6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj
                                                  • API String ID: 0-948655305
                                                  • Opcode ID: 8cb59ef3be303f55863b15faade5e6419e280791ffb1ceb64e7433d5ed60ed14
                                                  • Instruction ID: 66d0be5a3aa5386251ae3d7b1bf8d6013cd3780455deef9be79299325826c4dd
                                                  • Opcode Fuzzy Hash: 8cb59ef3be303f55863b15faade5e6419e280791ffb1ceb64e7433d5ed60ed14
                                                  • Instruction Fuzzy Hash: D7D19130710712EFD606ABA99C92E6DB2D3BBC6304B40852CD22A0F795DFB1AD1743D6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj
                                                  • API String ID: 0-948655305
                                                  • Opcode ID: 2ea790055ed46b6072cef825dfccb71331f9d5d08f883572a5c3cb53c1c08bb3
                                                  • Instruction ID: ac5a6a9c93b4760d9ef924abdd489925d51534803df3b080c7d097037ee0918c
                                                  • Opcode Fuzzy Hash: 2ea790055ed46b6072cef825dfccb71331f9d5d08f883572a5c3cb53c1c08bb3
                                                  • Instruction Fuzzy Hash: 7FD18030710712EFD606ABA99C92E6DB6D3BBC6304B40852CD22A4F795DFB1AC1743D6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj
                                                  • API String ID: 0-2102174151
                                                  • Opcode ID: 6e6e50f71c9c796644b42958d11b6995acd525318af8f54acae275fb320926fb
                                                  • Instruction ID: e659eca8dbd5cb28f388ec415dacf34691ef13005001a1f087a0e565b508c1f3
                                                  • Opcode Fuzzy Hash: 6e6e50f71c9c796644b42958d11b6995acd525318af8f54acae275fb320926fb
                                                  • Instruction Fuzzy Hash: 8641C630700712AFD602ABA59C92E6DB693FB86600B40453CD21A4FB96DFB5AD4743D7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj
                                                  • API String ID: 0-2102174151
                                                  • Opcode ID: 2d7ad56997d4b94a5570ee4144e3dd41e031f840d126f115e5d7eb96874ae3b9
                                                  • Instruction ID: 97f00c531d307117f1eff6ffb2fdc6398052350e511b13c10421a4234cfd044b
                                                  • Opcode Fuzzy Hash: 2d7ad56997d4b94a5570ee4144e3dd41e031f840d126f115e5d7eb96874ae3b9
                                                  • Instruction Fuzzy Hash: 8541A530700712AFD606AFA59C92E6DB693FBC6700B40893CD21A0FB95DFB5AD074396
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj
                                                  • API String ID: 0-2578666656
                                                  • Opcode ID: 7019faa7da783b4d209cd319453f6ccff351d461c824a9df6d9d510439c40c9e
                                                  • Instruction ID: c70fb7574d9dec0a52b808c957f18ee76ceeaed5b1d78cce389a9aca082e66cc
                                                  • Opcode Fuzzy Hash: 7019faa7da783b4d209cd319453f6ccff351d461c824a9df6d9d510439c40c9e
                                                  • Instruction Fuzzy Hash: 9131B631700312AFD6026BA59C92E6DB693FB86300B40457CD21A4FB96CFB5AD4643E6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: DFj$DFj$DFj$DFj$DFj$DFj$DFj$DFj
                                                  • API String ID: 0-2578666656
                                                  • Opcode ID: c031fc7862c47801b38775fa8e6236b3865097c78b61686aa11ec35356fd2947
                                                  • Instruction ID: 48a35a066f20050bbaf0aca0a87fe780cd06d2833d0651ca748247d3f0a24fcd
                                                  • Opcode Fuzzy Hash: c031fc7862c47801b38775fa8e6236b3865097c78b61686aa11ec35356fd2947
                                                  • Instruction Fuzzy Hash: CF21A230710312AFD606AFA59C92E6DB693FBC6704B40853CD22A4FB95CFB5AC4643D6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: DFj$DFj$DFj$DFj$DFj$DFj$DFj
                                                  • API String ID: 0-309315082
                                                  • Opcode ID: efcf3e529b9c93ca62ecaac00c60240bb8a8641d1b9405a17b859803099ed696
                                                  • Instruction ID: 02475dd9ab19790cf9780e69c89bfde43874e38665c3c86c52570087fdf6d375
                                                  • Opcode Fuzzy Hash: efcf3e529b9c93ca62ecaac00c60240bb8a8641d1b9405a17b859803099ed696
                                                  • Instruction Fuzzy Hash: D431A430701253AFD7027BA5DC959AD7B93FB96304700456CE21A9F6E5CEB05D8B8782
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: DFj$DFj$DFj$DFj$DFj$DFj$DFj
                                                  • API String ID: 0-309315082
                                                  • Opcode ID: bb3fc83ef690d385aba31f06af08df4d2cead98cfe7e4530f544ffe5539e01ae
                                                  • Instruction ID: 712ffdd42baf7dd12c044f58572f9c94664dd0de32da591ce542456c8dc93431
                                                  • Opcode Fuzzy Hash: bb3fc83ef690d385aba31f06af08df4d2cead98cfe7e4530f544ffe5539e01ae
                                                  • Instruction Fuzzy Hash: 12218530B00253AFDB057BA5DC9596D7793FB963007004528D21A8F7A4CEB15D8B8786
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: DFj$DFj$DFj$DFj$DFj$DFj
                                                  • API String ID: 0-3326637079
                                                  • Opcode ID: 644287147257272d0c59718fdca608ff97ee3dce48466003c4f6b25a6abbd9f6
                                                  • Instruction ID: cb7fe800d24d3337c2ed25296a8135b69027b9e4ecedfd0f812ebaae581fb3ba
                                                  • Opcode Fuzzy Hash: 644287147257272d0c59718fdca608ff97ee3dce48466003c4f6b25a6abbd9f6
                                                  • Instruction Fuzzy Hash: 9721A4317007116FD6026BA59C92EADA693FB86704B40866CD21A4FB96CFB25D1743E2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2267335446.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6960000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: DFj$DFj$DFj$DFj$DFj$DFj
                                                  • API String ID: 0-3326637079
                                                  • Opcode ID: da73f7460c4d6df83d0e8e95d6bf4a47dea7b123d2c98a10410de9417a0e542b
                                                  • Instruction ID: f429525dc389b54761c4337922d1f61688ec8eb89b19e8b798631c6db2f92dcf
                                                  • Opcode Fuzzy Hash: da73f7460c4d6df83d0e8e95d6bf4a47dea7b123d2c98a10410de9417a0e542b
                                                  • Instruction Fuzzy Hash: 4411A7307002116FD6026BA59C92E6DB693FBC6604B40853CD21A4FB95CFB2AD5643E2