Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SOA-Al Daleel.exe

Overview

General Information

Sample name:SOA-Al Daleel.exe
Analysis ID:1467074
MD5:487de74e533bec62ad60b71ed4990b14
SHA1:68816bdb2128901d938adee5bbbdcfe9ad710bf1
SHA256:4d7a7d2b1e9422eae20449218fc515b1e526d03f1bbf0d371ad4ffbcb13a51b4
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: MSBuild connects to smtp port
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SOA-Al Daleel.exe (PID: 7508 cmdline: "C:\Users\user\Desktop\SOA-Al Daleel.exe" MD5: 487DE74E533BEC62AD60B71ED4990B14)
    • powershell.exe (PID: 7732 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 8044 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7764 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2314.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MSBuild.exe (PID: 7896 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 7904 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 7912 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • eeXxnIpy.exe (PID: 8016 cmdline: C:\Users\user\AppData\Roaming\eeXxnIpy.exe MD5: 487DE74E533BEC62AD60B71ED4990B14)
    • schtasks.exe (PID: 8152 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2F78.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 8164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MSBuild.exe (PID: 5960 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "naz@itc-ib.net", "Password": "*SGCViVH2@@@@11$#4%%   "}
SourceRuleDescriptionAuthorStrings
0000000A.00000002.1366722684.0000000003020000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000F.00000002.2566283854.0000000002C3A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000A.00000002.1363137995.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000A.00000002.1363137995.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0000000B.00000002.1398049009.0000000004450000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 17 entries
            SourceRuleDescriptionAuthorStrings
            10.2.MSBuild.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              10.2.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                10.2.MSBuild.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x334a3:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x33515:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x3359f:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x33631:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x3369b:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3370d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x337a3:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x33833:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                11.2.eeXxnIpy.exe.448aa90.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  11.2.eeXxnIpy.exe.448aa90.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 11 entries

                    Networking

                    barindex
                    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 208.91.199.223, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 7912, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49708

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SOA-Al Daleel.exe", ParentImage: C:\Users\user\Desktop\SOA-Al Daleel.exe, ParentProcessId: 7508, ParentProcessName: SOA-Al Daleel.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe", ProcessId: 7732, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SOA-Al Daleel.exe", ParentImage: C:\Users\user\Desktop\SOA-Al Daleel.exe, ParentProcessId: 7508, ParentProcessName: SOA-Al Daleel.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe", ProcessId: 7732, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2F78.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2F78.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\eeXxnIpy.exe, ParentImage: C:\Users\user\AppData\Roaming\eeXxnIpy.exe, ParentProcessId: 8016, ParentProcessName: eeXxnIpy.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2F78.tmp", ProcessId: 8152, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2314.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2314.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\SOA-Al Daleel.exe", ParentImage: C:\Users\user\Desktop\SOA-Al Daleel.exe, ParentProcessId: 7508, ParentProcessName: SOA-Al Daleel.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2314.tmp", ProcessId: 7764, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SOA-Al Daleel.exe", ParentImage: C:\Users\user\Desktop\SOA-Al Daleel.exe, ParentProcessId: 7508, ParentProcessName: SOA-Al Daleel.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe", ProcessId: 7732, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2314.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2314.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\SOA-Al Daleel.exe", ParentImage: C:\Users\user\Desktop\SOA-Al Daleel.exe, ParentProcessId: 7508, ParentProcessName: SOA-Al Daleel.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2314.tmp", ProcessId: 7764, ProcessName: schtasks.exe
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "naz@itc-ib.net", "Password": "*SGCViVH2@@@@11$#4%% "}
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeReversingLabs: Detection: 28%
                    Source: SOA-Al Daleel.exeReversingLabs: Detection: 28%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeJoe Sandbox ML: detected
                    Source: SOA-Al Daleel.exeJoe Sandbox ML: detected
                    Source: SOA-Al Daleel.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: SOA-Al Daleel.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: NWau.pdbSHA256/ source: SOA-Al Daleel.exe, eeXxnIpy.exe.1.dr
                    Source: Binary string: NWau.pdb source: SOA-Al Daleel.exe, eeXxnIpy.exe.1.dr
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 4x nop then jmp 0160630Fh1_2_01605D8A
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 4x nop then jmp 0160630Fh1_2_01605E1B
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 4x nop then jmp 0160630Fh1_2_01605E87
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 4x nop then jmp 05465567h11_2_05464FE2
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 4x nop then jmp 05465567h11_2_054650DF

                    Networking

                    barindex
                    Source: Yara matchFile source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.7:49708 -> 208.91.199.223:587
                    Source: global trafficTCP traffic: 192.168.2.7:49183 -> 162.159.36.2:53
                    Source: Joe Sandbox ViewIP Address: 208.91.199.223 208.91.199.223
                    Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                    Source: global trafficTCP traffic: 192.168.2.7:49708 -> 208.91.199.223:587
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: time.windows.com
                    Source: global trafficDNS traffic detected: DNS query: us2.smtp.mailhostbox.com
                    Source: global trafficDNS traffic detected: DNS query: 56.126.166.20.in-addr.arpa
                    Source: MSBuild.exe, 0000000A.00000002.1370457143.0000000006180000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.1366722684.0000000003028000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2566283854.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2572939795.0000000005E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: MSBuild.exe, 0000000A.00000002.1370457143.0000000006180000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2572939795.0000000005E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: MSBuild.exe, 0000000A.00000002.1370457143.0000000006180000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.1366722684.0000000003028000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2566283854.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2572939795.0000000005E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                    Source: MSBuild.exe, 0000000A.00000002.1370457143.0000000006180000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.1366722684.0000000003028000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2566283854.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2572939795.0000000005E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: MSBuild.exe, 0000000A.00000002.1370457143.0000000006180000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.1366722684.0000000003028000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2566283854.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2572939795.0000000005E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
                    Source: SOA-Al Daleel.exe, 00000001.00000002.1350225634.0000000003151000.00000004.00000800.00020000.00000000.sdmp, eeXxnIpy.exe, 0000000B.00000002.1384682495.00000000033E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: MSBuild.exe, 0000000A.00000002.1366722684.0000000003028000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2566283854.0000000002C17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: SOA-Al Daleel.exe, 00000001.00000002.1351009324.00000000041BF000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.1363137995.0000000000402000.00000040.00000400.00020000.00000000.sdmp, eeXxnIpy.exe, 0000000B.00000002.1398049009.0000000004450000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: MSBuild.exe, 0000000A.00000002.1370457143.0000000006180000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.1366722684.0000000003028000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2566283854.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2572939795.0000000005E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, 3DlgK9re6m.cs.Net Code: j72D
                    Source: 11.2.eeXxnIpy.exe.448aa90.2.raw.unpack, 3DlgK9re6m.cs.Net Code: j72D

                    System Summary

                    barindex
                    Source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 11.2.eeXxnIpy.exe.448aa90.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 11.2.eeXxnIpy.exe.448aa90.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.2.SOA-Al Daleel.exe.317880c.1.raw.unpack, -Module-.csLarge array initialization: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E: array initializer size 3088
                    Source: 1.2.SOA-Al Daleel.exe.7460000.6.raw.unpack, -Module-.csLarge array initialization: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E: array initializer size 3088
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_0136D3641_2_0136D364
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_016017001_2_01601700
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_016017101_2_01601710
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_01607B481_2_01607B48
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_01608BE81_2_01608BE8
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_0313F7181_2_0313F718
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_0313BB701_2_0313BB70
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_0313F6CE1_2_0313F6CE
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_0313BB601_2_0313BB60
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_0313FBC81_2_0313FBC8
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_074810601_2_07481060
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_07487F281_2_07487F28
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_07483D501_2_07483D50
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_074887791_2_07488779
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_0748877B1_2_0748877B
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_074887881_2_07488788
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_074824501_2_07482450
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_074824601_2_07482460
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_074864381_2_07486438
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_0748F4C81_2_0748F4C8
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_074872F01_2_074872F0
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_074882B11_2_074882B1
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_074810531_2_07481053
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_0748F0901_2_0748F090
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_07487F181_2_07487F18
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_07483EE31_2_07483EE3
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_07483D431_2_07483D43
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_0748EC581_2_0748EC58
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_074879671_2_07487967
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_074879781_2_07487978
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_0748F9001_2_0748F900
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_074819181_2_07481918
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_074819131_2_07481913
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_014ED02510_2_014ED025
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_014E937810_2_014E9378
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_014E9B3810_2_014E9B38
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_014E4A9810_2_014E4A98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_014E3E8010_2_014E3E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_014ED16810_2_014ED168
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_014E41C810_2_014E41C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_063A56A810_2_063A56A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_063A004010_2_063A0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_063A3F1810_2_063A3F18
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_063ADCF010_2_063ADCF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_063ABCD810_2_063ABCD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_063A9AB810_2_063A9AB8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_063A2AF010_2_063A2AF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_063A8B6810_2_063A8B68
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_063A321010_2_063A3210
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_063A4FC810_2_063A4FC8
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_05466CD011_2_05466CD0
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_0546170011_2_05461700
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_0546171011_2_05461710
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_0546797011_2_05467970
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_058E7D5811_2_058E7D58
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_058E7FB011_2_058E7FB0
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_058E000611_2_058E0006
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_058E004011_2_058E0040
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_058EAEB011_2_058EAEB0
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_058E7FA111_2_058E7FA1
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_0592F71811_2_0592F718
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_0592BB7011_2_0592BB70
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_0592F6CE11_2_0592F6CE
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_0592FBC811_2_0592FBC8
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_0592BB6011_2_0592BB60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_0122D02115_2_0122D021
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_0122937815_2_01229378
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_01229B3815_2_01229B38
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_01224A9815_2_01224A98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_01223E8015_2_01223E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_0122D16815_2_0122D168
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_012241C815_2_012241C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_05F4DCF015_2_05F4DCF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_05F4BCD815_2_05F4BCD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_05F43F1815_2_05F43F18
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_05F456A815_2_05F456A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_05F4004015_2_05F40040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_05F48B6815_2_05F48B68
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_05F42AF015_2_05F42AF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_05F44FC815_2_05F44FC8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 15_2_05F4321015_2_05F43210
                    Source: SOA-Al Daleel.exe, 00000001.00000002.1350225634.0000000003151000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRT.dll. vs SOA-Al Daleel.exe
                    Source: SOA-Al Daleel.exe, 00000001.00000002.1350225634.0000000003151000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecd9b6a9b-2173-42d1-b391-e58738cecc5f.exe4 vs SOA-Al Daleel.exe
                    Source: SOA-Al Daleel.exe, 00000001.00000002.1353183069.0000000007460000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRT.dll. vs SOA-Al Daleel.exe
                    Source: SOA-Al Daleel.exe, 00000001.00000002.1351009324.00000000041BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecd9b6a9b-2173-42d1-b391-e58738cecc5f.exe4 vs SOA-Al Daleel.exe
                    Source: SOA-Al Daleel.exe, 00000001.00000002.1351009324.00000000041BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SOA-Al Daleel.exe
                    Source: SOA-Al Daleel.exe, 00000001.00000002.1348671494.000000000109E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SOA-Al Daleel.exe
                    Source: SOA-Al Daleel.exe, 00000001.00000002.1354161903.0000000007E00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SOA-Al Daleel.exe
                    Source: SOA-Al Daleel.exeBinary or memory string: OriginalFilenameNWau.exe> vs SOA-Al Daleel.exe
                    Source: SOA-Al Daleel.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 11.2.eeXxnIpy.exe.448aa90.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 11.2.eeXxnIpy.exe.448aa90.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: SOA-Al Daleel.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: eeXxnIpy.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, slKb.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, mAKJ.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, xQRSe0Fg.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, n3rhMa.csCryptographic APIs: 'CreateDecryptor'
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, MQzE4FWn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, nSmgRyX5a1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, nmWwLFp6y3CsQoaaSm.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, nmWwLFp6y3CsQoaaSm.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, JHelOmGX9xBk92vdl7.csSecurity API names: _0020.SetAccessControl
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, JHelOmGX9xBk92vdl7.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, JHelOmGX9xBk92vdl7.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, JHelOmGX9xBk92vdl7.csSecurity API names: _0020.SetAccessControl
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, JHelOmGX9xBk92vdl7.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, JHelOmGX9xBk92vdl7.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, nmWwLFp6y3CsQoaaSm.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, JHelOmGX9xBk92vdl7.csSecurity API names: _0020.SetAccessControl
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, JHelOmGX9xBk92vdl7.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, JHelOmGX9xBk92vdl7.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                    Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@20/11@3/1
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeFile created: C:\Users\user\AppData\Roaming\eeXxnIpy.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7740:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8164:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMutant created: \Sessions\1\BaseNamedObjects\qrtQzlNBltcEPhWY
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7784:120:WilError_03
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2314.tmpJump to behavior
                    Source: SOA-Al Daleel.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: SOA-Al Daleel.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SOA-Al Daleel.exeReversingLabs: Detection: 28%
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeFile read: C:\Users\user\Desktop\SOA-Al Daleel.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\SOA-Al Daleel.exe "C:\Users\user\Desktop\SOA-Al Daleel.exe"
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2314.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\eeXxnIpy.exe C:\Users\user\AppData\Roaming\eeXxnIpy.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2F78.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2314.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2F78.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: SOA-Al Daleel.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SOA-Al Daleel.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: SOA-Al Daleel.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: NWau.pdbSHA256/ source: SOA-Al Daleel.exe, eeXxnIpy.exe.1.dr
                    Source: Binary string: NWau.pdb source: SOA-Al Daleel.exe, eeXxnIpy.exe.1.dr

                    Data Obfuscation

                    barindex
                    Source: SOA-Al Daleel.exe, mainscreen.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                    Source: eeXxnIpy.exe.1.dr, mainscreen.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                    Source: 1.2.SOA-Al Daleel.exe.317880c.1.raw.unpack, -Module-.cs.Net Code: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E System.Reflection.Assembly.Load(byte[])
                    Source: 1.2.SOA-Al Daleel.exe.317880c.1.raw.unpack, PingPong.cs.Net Code: _206E_206D_206E_206E_202E_202E_200C_206A_202D_206E_200C_202B_200F_206E_200B_202E_200E_202A_202D_200E_200E_200E_200E_202B_200E_202C_200C_200B_202C_202D_200C_202A_200B_200C_206D_206B_202B_202A_202E_200C_202E System.Reflection.Assembly.Load(byte[])
                    Source: 1.2.SOA-Al Daleel.exe.7460000.6.raw.unpack, -Module-.cs.Net Code: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E System.Reflection.Assembly.Load(byte[])
                    Source: 1.2.SOA-Al Daleel.exe.7460000.6.raw.unpack, PingPong.cs.Net Code: _206E_206D_206E_206E_202E_202E_200C_206A_202D_206E_200C_202B_200F_206E_200B_202E_200E_202A_202D_200E_200E_200E_200E_202B_200E_202C_200C_200B_202C_202D_200C_202A_200B_200C_206D_206B_202B_202A_202E_200C_202E System.Reflection.Assembly.Load(byte[])
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, JHelOmGX9xBk92vdl7.cs.Net Code: Gkjn1GV4xw System.Reflection.Assembly.Load(byte[])
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, JHelOmGX9xBk92vdl7.cs.Net Code: Gkjn1GV4xw System.Reflection.Assembly.Load(byte[])
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, JHelOmGX9xBk92vdl7.cs.Net Code: Gkjn1GV4xw System.Reflection.Assembly.Load(byte[])
                    Source: SOA-Al Daleel.exeStatic PE information: 0x9E3D2D85 [Sun Feb 15 23:04:37 2054 UTC]
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeCode function: 1_2_0313EFD5 push esp; retf 1_2_0313EFDC
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_0592EFD5 push esp; retf 11_2_0592EFDC
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeCode function: 11_2_0592084A pushfd ; ret 11_2_05920851
                    Source: SOA-Al Daleel.exeStatic PE information: section name: .text entropy: 7.976235825353332
                    Source: eeXxnIpy.exe.1.drStatic PE information: section name: .text entropy: 7.976235825353332
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, FS4WZPMtGmHZsvtoqxr.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'OpGs0t0u2p', 'EGMsc3hQGy', 'y1FsioBIwG', 'yGPs2vPoSy', 'jlKsED5VnD', 'Hh1sWwSddW', 'vEYsHiNQt6'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, xLnFXNr3HFxaLKS95p.csHigh entropy of concatenated method names: 'H2tqPfQ5NC', 'ROfqj5oVNJ', 'kGXqVgnKSj', 'VQbVmawvla', 'TVZVzro6JV', 'bGuqKjlXm4', 'IJ6qMeWbdy', 'V6hqYMe6Wo', 'cbSqtgm584', 'vkHqn6OPDE'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, WpTrCDeRd6UKSRIBf0.csHigh entropy of concatenated method names: 'KKw5NqH0jc', 'dF65x4J3D5', 'pmjj6Em8FG', 'a5Yj9PFkuV', 'FlIjU3pqOb', 'zywjT0EKX1', 'owgjrMyjRp', 'IWTjAVSa8C', 'idHjDx1akG', 'VqXjQImgBV'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, mRTYIxOiui1rh23kdo.csHigh entropy of concatenated method names: 'UfxwPnjyMD', 'z6awIQMqKZ', 'BjHwjpqwOt', 'C46w5wZYqZ', 'WgcwVtCHZ8', 'MHtwqReAx0', 'roJwGrIOYm', 'ARDwScggQa', 'I7PwJ5vbSp', 'EynwgbV2i5'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, hYU3HGMKWv8bkPWU6ax.csHigh entropy of concatenated method names: 'DqBC4bdBc1', 'G1HCosUVyR', 'PuEC1T1xbG', 'yCXC8DnlUO', 'vueCNkxMJS', 'gRnCZwqSxF', 'rdHCx1mcax', 'bptCp2CcLH', 'MDMCBduhj7', 'PgdCejNSg3'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, nmWwLFp6y3CsQoaaSm.csHigh entropy of concatenated method names: 'HmII0Qj0iD', 'ysrIcIfavG', 'AMGIi6OSyM', 'UyaI2R4pQj', 'rmLIENfF5m', 'vBoIWq596Q', 'gPGIHjhlSi', 'c9cIOp0ebS', 'j8cIFjMiQS', 'OyiIm205qG'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, NOe3SomiFjQjwIKZ19.csHigh entropy of concatenated method names: 'pwwCMMGNRl', 'QAPCtlSaJe', 'deDCnphy84', 'IgYCPnGkSu', 'liJCIERrnG', 'MqRC5Ixl2U', 'eACCVVKvC0', 'QdbwHapMg5', 'eaiwOiYppc', 'SyJwFLCUB8'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, bTT64qIAwoSlECeHGn.csHigh entropy of concatenated method names: 'Dispose', 'arQMF4Qkw2', 'lQHYkem6Gi', 'VWCbbJBeIj', 'bJRMmTYIxi', 'ui1Mzrh23k', 'ProcessDialogKey', 'OoPYKX7iEk', 'MJyYMYRb1m', 'jPVYYQOe3S'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, WX1d9xMMPbCWFZFN1bJ.csHigh entropy of concatenated method names: 'ToString', 'xE9stCbvrV', 'rKusnBNcM6', 'vaPs7PGZrX', 'vuOsP0vo1l', 'kljsIn6Kvk', 'CbQsjShd0o', 'Hhps5m2EVY', 'AW31hKWRkDBxue9ujjw', 'kyZA0SW6BjZLNha57Em'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, LuTWFhDqbyYGms4qGU.csHigh entropy of concatenated method names: 'o2pq4HHOYF', 'RMsqonMdDi', 'dN1q1TOFsJ', 'Iu6q8XTHZG', 'dGpqNiW6Ny', 'iLxqZcUhyo', 'XtMqxNqAQP', 'bSOqpJ2ACZ', 'x68qBq1gyA', 'SOXqe0ryUd'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, BFcI26iDUMvT9J3TRi.csHigh entropy of concatenated method names: 'ToString', 'E0GXdM9HRU', 'mAcXkJotsZ', 'VcaX6jy0HS', 'Ya9X9mf835', 'MCBXUb5s86', 'd2ZXTOkVNF', 'elFXr7AWpm', 'k8oXAXCnL1', 'x1JXDwmIcX'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, tFal2IWqM4KEuopdVU.csHigh entropy of concatenated method names: 'LsgRObLiK0', 'BUfRmw0jrT', 'SaCwKLPviK', 'fKPwMfeCBM', 'BGFRdbNv2T', 'mAFRhkvjgl', 'CE2RLjkVGh', 'qnWR0QbHtN', 'EgcRcCDl8v', 'TOmRi2osne'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, Q7YLY1zjDKs4A9wNqQ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'yggClUrEYY', 'hMdCyLCJko', 'G2jCXh7A37', 'BHiCRKMxFX', 'rRKCwAi4Am', 'PXwCCP9MxL', 'sArCs13RcM'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, hkDdW7nnKXps9uafUV.csHigh entropy of concatenated method names: 'X5lMqmWwLF', 'Iy3MGCsQoa', 'UO7MJj0XYh', 'lu4MgnHpTr', 'qIBMyf0dUv', 'GbpMXFjlmj', 'SZggXJ5LBlaVun6rde', 'UurvbqrwC453On0kGM', 'enqZqZhBMld2aa4SnV', 'oh3MMl6yxl'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, PvJ5GG095hCttXfFSn.csHigh entropy of concatenated method names: 'Dk2yQkXhvJ', 'PnWyh8pcUW', 'bpJy0xxabw', 'bp5ycTMwKL', 'NeUykt14Mn', 'yEky6L9y8H', 'sZMy92wMDr', 'CA9yU2PKq8', 'Op3yTA58m1', 'Nlbyrg6p1t'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, KawfvEBO7j0XYhJu4n.csHigh entropy of concatenated method names: 'MABj80TYh1', 'KEwjZKo9ZQ', 'p6fjpZuR9a', 'JJcjBdA0Sg', 'Og4jy7Q2tb', 'yCYjXt40TJ', 'cMXjRaLaGs', 'VFBjwa4Qx1', 'vlJjCNNCAy', 'rB9jsDIHHx'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, fX7iEkFDJyYRb1mqPV.csHigh entropy of concatenated method names: 'xGqwaJtMUf', 'tQdwk3YJhV', 'Jfiw60dadM', 'iiiw9yCdJp', 'aABw0aNRZJ', 'fqCwUL79RX', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, OUvkbpaFjlmjZtt3qe.csHigh entropy of concatenated method names: 'n1bV7PsxsA', 'MxXVI9u9Tx', 'kgBV5aut62', 'ogmVqig8kr', 'xSLVGkkq7T', 'SxI5E5r5lw', 'Uqt5WARj8j', 'D6p5HIxtDO', 'OKp5Os5roF', 'h3D5Fmece7'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, JHelOmGX9xBk92vdl7.csHigh entropy of concatenated method names: 'tYNt7gPTUp', 'wH2tPynM1X', 'F1xtIfmu2q', 'yFptjdVbZn', 'GLit5jEGVq', 'U4atVklNcI', 'H6dtqAlNFV', 'rsytGbqbgU', 'QYTtSnfiFU', 'ofetJdp4RK'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, zYcJRlYQUJlOxnn6is.csHigh entropy of concatenated method names: 'N4q14g5iG', 'dB28oC7LP', 'a6qZb04mn', 'ihoxYgJmA', 'jgyBCCfCX', 'Seye1YUvV', 'rEkgBJ3ygkxoQR86pO', 'rAuQgYvKmUqvfnxo6p', 'iquw7GlW5', 'SuSs1Xevj'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, cLoPfEL4mIMos0teB9.csHigh entropy of concatenated method names: 'sqJlp5mwrG', 'U8QlBXAKeb', 'luZlaOkHIa', 'KpIlk5st04', 'ERhl9ymdeT', 'tBylULSZZJ', 'L1Nlr8jTvL', 'TT9lAo2G3A', 'sbulQQnuhK', 'iBQldgbKWh'
                    Source: 1.2.SOA-Al Daleel.exe.7e00000.8.raw.unpack, Ml3vWW25nwsS3efjZZ.csHigh entropy of concatenated method names: 'STRRJwhDj0', 'UenRg0SYmG', 'ToString', 'LgYRPcYP3E', 'LxORIbiZll', 'sffRjxJRxt', 'MkoR5DA9gu', 'rUrRVdnW5f', 'rFhRq1NYIh', 'h4aRGd5qeC'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, FS4WZPMtGmHZsvtoqxr.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'OpGs0t0u2p', 'EGMsc3hQGy', 'y1FsioBIwG', 'yGPs2vPoSy', 'jlKsED5VnD', 'Hh1sWwSddW', 'vEYsHiNQt6'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, xLnFXNr3HFxaLKS95p.csHigh entropy of concatenated method names: 'H2tqPfQ5NC', 'ROfqj5oVNJ', 'kGXqVgnKSj', 'VQbVmawvla', 'TVZVzro6JV', 'bGuqKjlXm4', 'IJ6qMeWbdy', 'V6hqYMe6Wo', 'cbSqtgm584', 'vkHqn6OPDE'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, WpTrCDeRd6UKSRIBf0.csHigh entropy of concatenated method names: 'KKw5NqH0jc', 'dF65x4J3D5', 'pmjj6Em8FG', 'a5Yj9PFkuV', 'FlIjU3pqOb', 'zywjT0EKX1', 'owgjrMyjRp', 'IWTjAVSa8C', 'idHjDx1akG', 'VqXjQImgBV'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, mRTYIxOiui1rh23kdo.csHigh entropy of concatenated method names: 'UfxwPnjyMD', 'z6awIQMqKZ', 'BjHwjpqwOt', 'C46w5wZYqZ', 'WgcwVtCHZ8', 'MHtwqReAx0', 'roJwGrIOYm', 'ARDwScggQa', 'I7PwJ5vbSp', 'EynwgbV2i5'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, hYU3HGMKWv8bkPWU6ax.csHigh entropy of concatenated method names: 'DqBC4bdBc1', 'G1HCosUVyR', 'PuEC1T1xbG', 'yCXC8DnlUO', 'vueCNkxMJS', 'gRnCZwqSxF', 'rdHCx1mcax', 'bptCp2CcLH', 'MDMCBduhj7', 'PgdCejNSg3'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, nmWwLFp6y3CsQoaaSm.csHigh entropy of concatenated method names: 'HmII0Qj0iD', 'ysrIcIfavG', 'AMGIi6OSyM', 'UyaI2R4pQj', 'rmLIENfF5m', 'vBoIWq596Q', 'gPGIHjhlSi', 'c9cIOp0ebS', 'j8cIFjMiQS', 'OyiIm205qG'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, NOe3SomiFjQjwIKZ19.csHigh entropy of concatenated method names: 'pwwCMMGNRl', 'QAPCtlSaJe', 'deDCnphy84', 'IgYCPnGkSu', 'liJCIERrnG', 'MqRC5Ixl2U', 'eACCVVKvC0', 'QdbwHapMg5', 'eaiwOiYppc', 'SyJwFLCUB8'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, bTT64qIAwoSlECeHGn.csHigh entropy of concatenated method names: 'Dispose', 'arQMF4Qkw2', 'lQHYkem6Gi', 'VWCbbJBeIj', 'bJRMmTYIxi', 'ui1Mzrh23k', 'ProcessDialogKey', 'OoPYKX7iEk', 'MJyYMYRb1m', 'jPVYYQOe3S'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, WX1d9xMMPbCWFZFN1bJ.csHigh entropy of concatenated method names: 'ToString', 'xE9stCbvrV', 'rKusnBNcM6', 'vaPs7PGZrX', 'vuOsP0vo1l', 'kljsIn6Kvk', 'CbQsjShd0o', 'Hhps5m2EVY', 'AW31hKWRkDBxue9ujjw', 'kyZA0SW6BjZLNha57Em'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, LuTWFhDqbyYGms4qGU.csHigh entropy of concatenated method names: 'o2pq4HHOYF', 'RMsqonMdDi', 'dN1q1TOFsJ', 'Iu6q8XTHZG', 'dGpqNiW6Ny', 'iLxqZcUhyo', 'XtMqxNqAQP', 'bSOqpJ2ACZ', 'x68qBq1gyA', 'SOXqe0ryUd'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, BFcI26iDUMvT9J3TRi.csHigh entropy of concatenated method names: 'ToString', 'E0GXdM9HRU', 'mAcXkJotsZ', 'VcaX6jy0HS', 'Ya9X9mf835', 'MCBXUb5s86', 'd2ZXTOkVNF', 'elFXr7AWpm', 'k8oXAXCnL1', 'x1JXDwmIcX'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, tFal2IWqM4KEuopdVU.csHigh entropy of concatenated method names: 'LsgRObLiK0', 'BUfRmw0jrT', 'SaCwKLPviK', 'fKPwMfeCBM', 'BGFRdbNv2T', 'mAFRhkvjgl', 'CE2RLjkVGh', 'qnWR0QbHtN', 'EgcRcCDl8v', 'TOmRi2osne'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, Q7YLY1zjDKs4A9wNqQ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'yggClUrEYY', 'hMdCyLCJko', 'G2jCXh7A37', 'BHiCRKMxFX', 'rRKCwAi4Am', 'PXwCCP9MxL', 'sArCs13RcM'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, hkDdW7nnKXps9uafUV.csHigh entropy of concatenated method names: 'X5lMqmWwLF', 'Iy3MGCsQoa', 'UO7MJj0XYh', 'lu4MgnHpTr', 'qIBMyf0dUv', 'GbpMXFjlmj', 'SZggXJ5LBlaVun6rde', 'UurvbqrwC453On0kGM', 'enqZqZhBMld2aa4SnV', 'oh3MMl6yxl'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, PvJ5GG095hCttXfFSn.csHigh entropy of concatenated method names: 'Dk2yQkXhvJ', 'PnWyh8pcUW', 'bpJy0xxabw', 'bp5ycTMwKL', 'NeUykt14Mn', 'yEky6L9y8H', 'sZMy92wMDr', 'CA9yU2PKq8', 'Op3yTA58m1', 'Nlbyrg6p1t'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, KawfvEBO7j0XYhJu4n.csHigh entropy of concatenated method names: 'MABj80TYh1', 'KEwjZKo9ZQ', 'p6fjpZuR9a', 'JJcjBdA0Sg', 'Og4jy7Q2tb', 'yCYjXt40TJ', 'cMXjRaLaGs', 'VFBjwa4Qx1', 'vlJjCNNCAy', 'rB9jsDIHHx'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, fX7iEkFDJyYRb1mqPV.csHigh entropy of concatenated method names: 'xGqwaJtMUf', 'tQdwk3YJhV', 'Jfiw60dadM', 'iiiw9yCdJp', 'aABw0aNRZJ', 'fqCwUL79RX', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, OUvkbpaFjlmjZtt3qe.csHigh entropy of concatenated method names: 'n1bV7PsxsA', 'MxXVI9u9Tx', 'kgBV5aut62', 'ogmVqig8kr', 'xSLVGkkq7T', 'SxI5E5r5lw', 'Uqt5WARj8j', 'D6p5HIxtDO', 'OKp5Os5roF', 'h3D5Fmece7'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, JHelOmGX9xBk92vdl7.csHigh entropy of concatenated method names: 'tYNt7gPTUp', 'wH2tPynM1X', 'F1xtIfmu2q', 'yFptjdVbZn', 'GLit5jEGVq', 'U4atVklNcI', 'H6dtqAlNFV', 'rsytGbqbgU', 'QYTtSnfiFU', 'ofetJdp4RK'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, zYcJRlYQUJlOxnn6is.csHigh entropy of concatenated method names: 'N4q14g5iG', 'dB28oC7LP', 'a6qZb04mn', 'ihoxYgJmA', 'jgyBCCfCX', 'Seye1YUvV', 'rEkgBJ3ygkxoQR86pO', 'rAuQgYvKmUqvfnxo6p', 'iquw7GlW5', 'SuSs1Xevj'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, cLoPfEL4mIMos0teB9.csHigh entropy of concatenated method names: 'sqJlp5mwrG', 'U8QlBXAKeb', 'luZlaOkHIa', 'KpIlk5st04', 'ERhl9ymdeT', 'tBylULSZZJ', 'L1Nlr8jTvL', 'TT9lAo2G3A', 'sbulQQnuhK', 'iBQldgbKWh'
                    Source: 1.2.SOA-Al Daleel.exe.4457ff0.3.raw.unpack, Ml3vWW25nwsS3efjZZ.csHigh entropy of concatenated method names: 'STRRJwhDj0', 'UenRg0SYmG', 'ToString', 'LgYRPcYP3E', 'LxORIbiZll', 'sffRjxJRxt', 'MkoR5DA9gu', 'rUrRVdnW5f', 'rFhRq1NYIh', 'h4aRGd5qeC'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, FS4WZPMtGmHZsvtoqxr.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'OpGs0t0u2p', 'EGMsc3hQGy', 'y1FsioBIwG', 'yGPs2vPoSy', 'jlKsED5VnD', 'Hh1sWwSddW', 'vEYsHiNQt6'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, xLnFXNr3HFxaLKS95p.csHigh entropy of concatenated method names: 'H2tqPfQ5NC', 'ROfqj5oVNJ', 'kGXqVgnKSj', 'VQbVmawvla', 'TVZVzro6JV', 'bGuqKjlXm4', 'IJ6qMeWbdy', 'V6hqYMe6Wo', 'cbSqtgm584', 'vkHqn6OPDE'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, WpTrCDeRd6UKSRIBf0.csHigh entropy of concatenated method names: 'KKw5NqH0jc', 'dF65x4J3D5', 'pmjj6Em8FG', 'a5Yj9PFkuV', 'FlIjU3pqOb', 'zywjT0EKX1', 'owgjrMyjRp', 'IWTjAVSa8C', 'idHjDx1akG', 'VqXjQImgBV'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, mRTYIxOiui1rh23kdo.csHigh entropy of concatenated method names: 'UfxwPnjyMD', 'z6awIQMqKZ', 'BjHwjpqwOt', 'C46w5wZYqZ', 'WgcwVtCHZ8', 'MHtwqReAx0', 'roJwGrIOYm', 'ARDwScggQa', 'I7PwJ5vbSp', 'EynwgbV2i5'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, hYU3HGMKWv8bkPWU6ax.csHigh entropy of concatenated method names: 'DqBC4bdBc1', 'G1HCosUVyR', 'PuEC1T1xbG', 'yCXC8DnlUO', 'vueCNkxMJS', 'gRnCZwqSxF', 'rdHCx1mcax', 'bptCp2CcLH', 'MDMCBduhj7', 'PgdCejNSg3'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, nmWwLFp6y3CsQoaaSm.csHigh entropy of concatenated method names: 'HmII0Qj0iD', 'ysrIcIfavG', 'AMGIi6OSyM', 'UyaI2R4pQj', 'rmLIENfF5m', 'vBoIWq596Q', 'gPGIHjhlSi', 'c9cIOp0ebS', 'j8cIFjMiQS', 'OyiIm205qG'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, NOe3SomiFjQjwIKZ19.csHigh entropy of concatenated method names: 'pwwCMMGNRl', 'QAPCtlSaJe', 'deDCnphy84', 'IgYCPnGkSu', 'liJCIERrnG', 'MqRC5Ixl2U', 'eACCVVKvC0', 'QdbwHapMg5', 'eaiwOiYppc', 'SyJwFLCUB8'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, bTT64qIAwoSlECeHGn.csHigh entropy of concatenated method names: 'Dispose', 'arQMF4Qkw2', 'lQHYkem6Gi', 'VWCbbJBeIj', 'bJRMmTYIxi', 'ui1Mzrh23k', 'ProcessDialogKey', 'OoPYKX7iEk', 'MJyYMYRb1m', 'jPVYYQOe3S'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, WX1d9xMMPbCWFZFN1bJ.csHigh entropy of concatenated method names: 'ToString', 'xE9stCbvrV', 'rKusnBNcM6', 'vaPs7PGZrX', 'vuOsP0vo1l', 'kljsIn6Kvk', 'CbQsjShd0o', 'Hhps5m2EVY', 'AW31hKWRkDBxue9ujjw', 'kyZA0SW6BjZLNha57Em'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, LuTWFhDqbyYGms4qGU.csHigh entropy of concatenated method names: 'o2pq4HHOYF', 'RMsqonMdDi', 'dN1q1TOFsJ', 'Iu6q8XTHZG', 'dGpqNiW6Ny', 'iLxqZcUhyo', 'XtMqxNqAQP', 'bSOqpJ2ACZ', 'x68qBq1gyA', 'SOXqe0ryUd'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, BFcI26iDUMvT9J3TRi.csHigh entropy of concatenated method names: 'ToString', 'E0GXdM9HRU', 'mAcXkJotsZ', 'VcaX6jy0HS', 'Ya9X9mf835', 'MCBXUb5s86', 'd2ZXTOkVNF', 'elFXr7AWpm', 'k8oXAXCnL1', 'x1JXDwmIcX'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, tFal2IWqM4KEuopdVU.csHigh entropy of concatenated method names: 'LsgRObLiK0', 'BUfRmw0jrT', 'SaCwKLPviK', 'fKPwMfeCBM', 'BGFRdbNv2T', 'mAFRhkvjgl', 'CE2RLjkVGh', 'qnWR0QbHtN', 'EgcRcCDl8v', 'TOmRi2osne'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, Q7YLY1zjDKs4A9wNqQ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'yggClUrEYY', 'hMdCyLCJko', 'G2jCXh7A37', 'BHiCRKMxFX', 'rRKCwAi4Am', 'PXwCCP9MxL', 'sArCs13RcM'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, hkDdW7nnKXps9uafUV.csHigh entropy of concatenated method names: 'X5lMqmWwLF', 'Iy3MGCsQoa', 'UO7MJj0XYh', 'lu4MgnHpTr', 'qIBMyf0dUv', 'GbpMXFjlmj', 'SZggXJ5LBlaVun6rde', 'UurvbqrwC453On0kGM', 'enqZqZhBMld2aa4SnV', 'oh3MMl6yxl'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, PvJ5GG095hCttXfFSn.csHigh entropy of concatenated method names: 'Dk2yQkXhvJ', 'PnWyh8pcUW', 'bpJy0xxabw', 'bp5ycTMwKL', 'NeUykt14Mn', 'yEky6L9y8H', 'sZMy92wMDr', 'CA9yU2PKq8', 'Op3yTA58m1', 'Nlbyrg6p1t'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, KawfvEBO7j0XYhJu4n.csHigh entropy of concatenated method names: 'MABj80TYh1', 'KEwjZKo9ZQ', 'p6fjpZuR9a', 'JJcjBdA0Sg', 'Og4jy7Q2tb', 'yCYjXt40TJ', 'cMXjRaLaGs', 'VFBjwa4Qx1', 'vlJjCNNCAy', 'rB9jsDIHHx'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, fX7iEkFDJyYRb1mqPV.csHigh entropy of concatenated method names: 'xGqwaJtMUf', 'tQdwk3YJhV', 'Jfiw60dadM', 'iiiw9yCdJp', 'aABw0aNRZJ', 'fqCwUL79RX', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, OUvkbpaFjlmjZtt3qe.csHigh entropy of concatenated method names: 'n1bV7PsxsA', 'MxXVI9u9Tx', 'kgBV5aut62', 'ogmVqig8kr', 'xSLVGkkq7T', 'SxI5E5r5lw', 'Uqt5WARj8j', 'D6p5HIxtDO', 'OKp5Os5roF', 'h3D5Fmece7'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, JHelOmGX9xBk92vdl7.csHigh entropy of concatenated method names: 'tYNt7gPTUp', 'wH2tPynM1X', 'F1xtIfmu2q', 'yFptjdVbZn', 'GLit5jEGVq', 'U4atVklNcI', 'H6dtqAlNFV', 'rsytGbqbgU', 'QYTtSnfiFU', 'ofetJdp4RK'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, zYcJRlYQUJlOxnn6is.csHigh entropy of concatenated method names: 'N4q14g5iG', 'dB28oC7LP', 'a6qZb04mn', 'ihoxYgJmA', 'jgyBCCfCX', 'Seye1YUvV', 'rEkgBJ3ygkxoQR86pO', 'rAuQgYvKmUqvfnxo6p', 'iquw7GlW5', 'SuSs1Xevj'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, cLoPfEL4mIMos0teB9.csHigh entropy of concatenated method names: 'sqJlp5mwrG', 'U8QlBXAKeb', 'luZlaOkHIa', 'KpIlk5st04', 'ERhl9ymdeT', 'tBylULSZZJ', 'L1Nlr8jTvL', 'TT9lAo2G3A', 'sbulQQnuhK', 'iBQldgbKWh'
                    Source: 1.2.SOA-Al Daleel.exe.4511010.5.raw.unpack, Ml3vWW25nwsS3efjZZ.csHigh entropy of concatenated method names: 'STRRJwhDj0', 'UenRg0SYmG', 'ToString', 'LgYRPcYP3E', 'LxORIbiZll', 'sffRjxJRxt', 'MkoR5DA9gu', 'rUrRVdnW5f', 'rFhRq1NYIh', 'h4aRGd5qeC'
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeFile created: C:\Users\user\AppData\Roaming\eeXxnIpy.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2314.tmp"

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: SOA-Al Daleel.exe PID: 7508, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: eeXxnIpy.exe PID: 8016, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: 1320000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: 3150000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: 1580000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: 7BB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: 75D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: 8BB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: 9BB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: 9EE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: AEE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: 7EC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: 9EE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: AEE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 14E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2FD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2D20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory allocated: 17D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory allocated: 33E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory allocated: 53E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory allocated: 7E30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory allocated: 8E30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory allocated: 8FD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory allocated: 9FD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory allocated: A300000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory allocated: B300000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory allocated: 8FD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory allocated: A300000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory allocated: B300000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 1210000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2BC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2A00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6693Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2920Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 1480Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 2701Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 1761Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 2515Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exe TID: 7560Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7968Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -99858s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8024Thread sleep count: 1480 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8024Thread sleep count: 2701 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -99749s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -99638s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -99529s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -99419s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -99312s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -99203s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -99094s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -98984s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -98875s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -98765s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -98656s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -98544s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -98437s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -98328s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -98219s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -98094s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -97984s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -97874s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -97765s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 8008Thread sleep time: -97656s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exe TID: 8088Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -17524406870024063s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6608Thread sleep count: 1761 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -99844s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6608Thread sleep count: 2515 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -99734s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -99625s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -99495s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -99389s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -99281s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -99135s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -99025s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -98916s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -98800s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -98594s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -98457s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -98132s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -97737s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -97609s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -97498s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -97391s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -97281s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -97170s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -97044s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -96937s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6820Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99858Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99749Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99638Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99529Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99419Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99312Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99203Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99094Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98984Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98544Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98219Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98094Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97984Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97874Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97656Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99625Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99495Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99389Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99135Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99025Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98916Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98800Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98594Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98457Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98132Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97737Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97498Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97391Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97170Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97044Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96937Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: MSBuild.exe, 0000000A.00000002.1370457143.0000000006180000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllContH
                    Source: MSBuild.exe, 0000000F.00000002.2572939795.0000000005E10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllb
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe"
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43C000Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43E000Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: D6C008Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43C000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43E000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: A0F008Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2314.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2F78.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeQueries volume information: C:\Users\user\Desktop\SOA-Al Daleel.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeQueries volume information: C:\Users\user\AppData\Roaming\eeXxnIpy.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eeXxnIpy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA-Al Daleel.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.eeXxnIpy.exe.448aa90.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SOA-Al Daleel.exe.41f9a78.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.eeXxnIpy.exe.448aa90.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.1366722684.0000000003020000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2566283854.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1363137995.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1398049009.0000000004450000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2566283854.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1366722684.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1351009324.00000000041BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SOA-Al Daleel.exe PID: 7508, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7912, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: eeXxnIpy.exe PID: 8016, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5960, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.eeXxnIpy.exe.448aa90.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SOA-Al Daleel.exe.41f9a78.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.eeXxnIpy.exe.448aa90.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.1363137995.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1398049009.0000000004450000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2566283854.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1366722684.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1351009324.00000000041BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SOA-Al Daleel.exe PID: 7508, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7912, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: eeXxnIpy.exe PID: 8016, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5960, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.eeXxnIpy.exe.448aa90.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SOA-Al Daleel.exe.41f9a78.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.eeXxnIpy.exe.448aa90.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SOA-Al Daleel.exe.41f9a78.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.1366722684.0000000003020000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2566283854.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1363137995.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1398049009.0000000004450000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2566283854.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1366722684.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1351009324.00000000041BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SOA-Al Daleel.exe PID: 7508, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7912, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: eeXxnIpy.exe PID: 8016, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5960, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    12
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    311
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Scheduled Task/Job
                    3
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    211
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model1
                    Input Capture
                    12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Timestomp
                    LSA Secrets141
                    Virtualization/Sandbox Evasion
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Masquerading
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                    Virtualization/Sandbox Evasion
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt311
                    Process Injection
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1467074 Sample: SOA-Al Daleel.exe Startdate: 03/07/2024 Architecture: WINDOWS Score: 100 44 us2.smtp.mailhostbox.com 2->44 46 time.windows.com 2->46 48 2 other IPs or domains 2->48 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Sigma detected: Scheduled temp file as task from temp location 2->56 58 13 other signatures 2->58 8 SOA-Al Daleel.exe 7 2->8         started        12 eeXxnIpy.exe 5 2->12         started        signatures3 process4 file5 36 C:\Users\user\AppData\Roaming\eeXxnIpy.exe, PE32 8->36 dropped 38 C:\Users\...\eeXxnIpy.exe:Zone.Identifier, ASCII 8->38 dropped 40 C:\Users\user\AppData\Local\...\tmp2314.tmp, XML 8->40 dropped 42 C:\Users\user\...\SOA-Al Daleel.exe.log, ASCII 8->42 dropped 60 Writes to foreign memory regions 8->60 62 Allocates memory in foreign processes 8->62 64 Adds a directory exclusion to Windows Defender 8->64 14 MSBuild.exe 2 8->14         started        18 powershell.exe 23 8->18         started        20 MSBuild.exe 8->20         started        26 2 other processes 8->26 66 Multi AV Scanner detection for dropped file 12->66 68 Machine Learning detection for dropped file 12->68 70 Injects a PE file into a foreign processes 12->70 22 MSBuild.exe 2 12->22         started        24 schtasks.exe 1 12->24         started        signatures6 process7 dnsIp8 50 us2.smtp.mailhostbox.com 208.91.199.223, 49708, 49711, 587 PUBLIC-DOMAIN-REGISTRYUS United States 14->50 72 Loading BitLocker PowerShell Module 18->72 28 conhost.exe 18->28         started        30 WmiPrvSE.exe 18->30         started        74 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 20->74 76 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 22->76 78 Tries to steal Mail credentials (via file / registry access) 22->78 80 Tries to harvest and steal ftp login credentials 22->80 82 Tries to harvest and steal browser information (history, passwords, etc) 22->82 32 conhost.exe 24->32         started        34 conhost.exe 26->34         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SOA-Al Daleel.exe29%ReversingLabsWin32.Trojan.Generic
                    SOA-Al Daleel.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\eeXxnIpy.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\eeXxnIpy.exe29%ReversingLabsWin32.Trojan.Generic
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://sectigo.com/CPS00%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://ocsp.sectigo.com0A0%Avira URL Cloudsafe
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%Avira URL Cloudsafe
                    http://us2.smtp.mailhostbox.com0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    bg.microsoft.map.fastly.net
                    199.232.214.172
                    truefalse
                      unknown
                      us2.smtp.mailhostbox.com
                      208.91.199.223
                      truetrue
                        unknown
                        time.windows.com
                        unknown
                        unknownfalse
                          unknown
                          56.126.166.20.in-addr.arpa
                          unknown
                          unknownfalse
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#MSBuild.exe, 0000000A.00000002.1370457143.0000000006180000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.1366722684.0000000003028000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2566283854.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2572939795.0000000005E10000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://ocsp.sectigo.com0AMSBuild.exe, 0000000A.00000002.1370457143.0000000006180000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.1366722684.0000000003028000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2566283854.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2572939795.0000000005E10000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://sectigo.com/CPS0MSBuild.exe, 0000000A.00000002.1370457143.0000000006180000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.1366722684.0000000003028000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2566283854.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2572939795.0000000005E10000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://account.dyn.com/SOA-Al Daleel.exe, 00000001.00000002.1351009324.00000000041BF000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.1363137995.0000000000402000.00000040.00000400.00020000.00000000.sdmp, eeXxnIpy.exe, 0000000B.00000002.1398049009.0000000004450000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://us2.smtp.mailhostbox.comMSBuild.exe, 0000000A.00000002.1366722684.0000000003028000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000F.00000002.2566283854.0000000002C17000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSOA-Al Daleel.exe, 00000001.00000002.1350225634.0000000003151000.00000004.00000800.00020000.00000000.sdmp, eeXxnIpy.exe, 0000000B.00000002.1384682495.00000000033E1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.91.199.223
                            us2.smtp.mailhostbox.comUnited States
                            394695PUBLIC-DOMAIN-REGISTRYUStrue
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1467074
                            Start date and time:2024-07-03 17:47:05 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 7m 58s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:21
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:SOA-Al Daleel.exe
                            Detection:MAL
                            Classification:mal100.spre.troj.spyw.evad.winEXE@20/11@3/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 98%
                            • Number of executed functions: 240
                            • Number of non-executed functions: 20
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 40.119.148.38, 184.28.90.27, 40.68.123.157, 2.19.126.163, 2.19.126.137, 20.3.187.198, 20.166.126.56, 13.85.23.86
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, twc.trafficmanager.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, e16604.g.akamaiedge.net, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtCreateKey calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: SOA-Al Daleel.exe
                            TimeTypeDescription
                            11:48:07API Interceptor1x Sleep call for process: SOA-Al Daleel.exe modified
                            11:48:08API Interceptor12x Sleep call for process: powershell.exe modified
                            11:48:09API Interceptor44x Sleep call for process: MSBuild.exe modified
                            11:48:10API Interceptor1x Sleep call for process: eeXxnIpy.exe modified
                            17:48:09Task SchedulerRun new task: eeXxnIpy path: C:\Users\user\AppData\Roaming\eeXxnIpy.exe
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.91.199.223SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.12946.7200.exeGet hashmaliciousAgentTeslaBrowse
                              QUOTATION.exeGet hashmaliciousAgentTeslaBrowse
                                Attached Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                  Swift Copy_98754.bat.exeGet hashmaliciousAgentTeslaBrowse
                                    Swift Copy TT USD14037800.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                      PO#0094321.exeGet hashmaliciousAgentTeslaBrowse
                                        P.O (PA) 452.exeGet hashmaliciousAgentTeslaBrowse
                                          DHL Shipping Documents.exeGet hashmaliciousAgentTeslaBrowse
                                            Product Sample 76438.exeGet hashmaliciousAgentTeslaBrowse
                                              HSBC-payment-Advice.batGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                us2.smtp.mailhostbox.com6bdudXAsQW.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.225
                                                SecuriteInfo.com.Win32.PWSX-gen.21042.22708.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.225
                                                SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.12946.7200.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.223
                                                001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.224
                                                payment order.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.91.198.143
                                                Quotation No.06262024.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.224
                                                I0Hw9G8QDJ.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.225
                                                Urgent PO.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.91.199.224
                                                z1PURCHASEORDER736353.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.91.199.224
                                                PO#0094321.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.224
                                                bg.microsoft.map.fastly.netInvoices AMM Consol 020-04860612.exeGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                Invoices AMM Consol 020-04860612.exeGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                http://beetrootculture.comGet hashmaliciousUnknownBrowse
                                                • 199.232.210.172
                                                https://isothermcx-my.sharepoint.com/:o:/p/m_chiasson/EldSmlva1OBFixvWpubo0mgB0DZQ4Do42riWb9YO1XmP-g?e=5%3av4rvfI&at=9Get hashmaliciousHTMLPhisherBrowse
                                                • 199.232.210.172
                                                https://www.filemail.com/t/RuKZYfeBGet hashmaliciousHTMLPhisherBrowse
                                                • 199.232.210.172
                                                kZa81nzREg.exeGet hashmaliciousAgentTeslaBrowse
                                                • 199.232.214.172
                                                SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.6737.3783.exeGet hashmaliciousAgentTeslaBrowse
                                                • 199.232.210.172
                                                dhl_awb_shipping_doc_03072024224782020031808174CN18030724000000324(991KB).vbsGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                https://url7304.disco-mailer.net/ls/click?upn=u001.DWLeRfOXStcSaUNphm6ZnGquuezyvOF0FIuLMCSCrIQ9t3e8n3fjexKHJjVTV-2BQUFT1dnxR3BcyXaxz-2BblhjX71zswvTIlAGm31luuFhJgeOGXb3dn9Itq74-2Fe-2BlKg-2Bs0-2F4odRns7kSdvfqBhyqSbrYsnPmx4SeDwlRdlhHbM3UucitnipcwJ1gR7h8DzOIUWsvEslHUA8FsNTNWtsq3Q-2FU-2FPeBtGbo-2Fx3kgcXxAZuE-3DPmkq_5KlZmZKASPtIpYbHU6HHQmxS-2FHe3g010GX01BBBmlalJnMdBClXoEYQADKPWInqgHw-2B5921oa-2Fum9DxIHV8wgOarlsOnYJwzp6I2lNDfeCQdFcL55956QetBM0U9iihLLCXzc7MWVFcQDUwnaU8PUgQFrTwK63nQhJu8ngVllYSJR-2BUamfX7Ej8Gpp4vMWsL8t65JTtpjdFVQ36IgP-2B2LxLYSj9SfdmLAt97TCVXHWn7xANKqYpl-2BYx09SetkszDOjJuUV9L9bqZ-2FbmClOsUrPLylG74RJ8zQAREr7-2BUktmlWKoc8C7oqqTOKv340mZnTc-2FztCVjFgPMm1Bz5lR5AptUVEvvSBboXVGluKKoNkkMFkS-2BmNybyD3Aa-2BX8UZ5sGet hashmaliciousHTMLPhisherBrowse
                                                • 199.232.214.172
                                                https://inpzk.useringimportdulcimer.ink/?=vxkncwole9Get hashmaliciousHTMLPhisherBrowse
                                                • 199.232.214.172
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                PUBLIC-DOMAIN-REGISTRYUS6bdudXAsQW.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.225
                                                SecuriteInfo.com.Win32.PWSX-gen.21042.22708.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.225
                                                SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.12946.7200.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.223
                                                https://wazzootech.co/cgi-ssl/Get hashmaliciousUnknownBrowse
                                                • 162.251.85.203
                                                cp3pOZHLxp.exeGet hashmaliciousAgentTeslaBrowse
                                                • 216.10.246.185
                                                NsqPGxz4Gj.exeGet hashmaliciousAgentTeslaBrowse
                                                • 216.10.246.185
                                                001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.224
                                                payment order.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.91.198.143
                                                Quotation No.06262024.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.224
                                                I0Hw9G8QDJ.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.225
                                                No context
                                                No context
                                                Process:C:\Users\user\Desktop\SOA-Al Daleel.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1216
                                                Entropy (8bit):5.34331486778365
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                Malicious:true
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                Process:C:\Users\user\AppData\Roaming\eeXxnIpy.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1216
                                                Entropy (8bit):5.34331486778365
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                Malicious:false
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2232
                                                Entropy (8bit):5.3797706053345555
                                                Encrypted:false
                                                SSDEEP:48:fWSU4xympx4RfoUP7gZ9tK8NPZHUx7u1iMuge//MPUyus:fLHxv/IwLZ2KRH6Ougss
                                                MD5:DDD33D9AF3DCABB4627D243179EE42B4
                                                SHA1:9370876B9D2ADEFB2D5EA5B3D1891DD553C53C79
                                                SHA-256:11C6FC8165BE652FA9537A58E6C221CE712B800370BEE30F369917A957007ABC
                                                SHA-512:D65BF41523B71A0C3D038981843066372E59C7AAFFAC899804F401FEB87F5A5D34138C78A91D2F5D4876235F67A5AB02F81D4FAE9EDF71B77E4EFB931AA8A0BA
                                                Malicious:false
                                                Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Users\user\Desktop\SOA-Al Daleel.exe
                                                File Type:XML 1.0 document, ASCII text
                                                Category:dropped
                                                Size (bytes):1602
                                                Entropy (8bit):5.1167969545122345
                                                Encrypted:false
                                                SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtJLxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTJ1v
                                                MD5:3D7CFEEEA3CCEF43E837D48E414BD62D
                                                SHA1:4E3A9DBAAEB25E6BD189290F31D99AE0908A42D1
                                                SHA-256:2E050483ED971F2BE02867D359A101904098B45D0BE711654F64EE003A79456D
                                                SHA-512:F837D245F4E323CEF230CB1D46768450B75B3358F69D83C881B1712043EFC75135B5730403936AE01D0999B2486E02CD8892BE969C9D2F7A235905207BFDF7A9
                                                Malicious:true
                                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                Process:C:\Users\user\AppData\Roaming\eeXxnIpy.exe
                                                File Type:XML 1.0 document, ASCII text
                                                Category:dropped
                                                Size (bytes):1602
                                                Entropy (8bit):5.1167969545122345
                                                Encrypted:false
                                                SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtJLxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTJ1v
                                                MD5:3D7CFEEEA3CCEF43E837D48E414BD62D
                                                SHA1:4E3A9DBAAEB25E6BD189290F31D99AE0908A42D1
                                                SHA-256:2E050483ED971F2BE02867D359A101904098B45D0BE711654F64EE003A79456D
                                                SHA-512:F837D245F4E323CEF230CB1D46768450B75B3358F69D83C881B1712043EFC75135B5730403936AE01D0999B2486E02CD8892BE969C9D2F7A235905207BFDF7A9
                                                Malicious:false
                                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                Process:C:\Users\user\Desktop\SOA-Al Daleel.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):959488
                                                Entropy (8bit):7.947573023101732
                                                Encrypted:false
                                                SSDEEP:24576:3t4/d6Itn2xHd9AwO5U92mJKvy8YheLxl+qD9l:3Yd62gMU91KvyCX9v
                                                MD5:487DE74E533BEC62AD60B71ED4990B14
                                                SHA1:68816BDB2128901D938ADEE5BBBDCFE9AD710BF1
                                                SHA-256:4D7A7D2B1E9422EAE20449218FC515B1E526D03F1BBF0D371AD4FFBCB13A51B4
                                                SHA-512:27159C1378FD047D12BB6DFE533A176105D37B1845EFDBFDEF1A6D4F96C4DFEA1C6630B5B62DC522D7F2CC24EC5B0F142DDD19EBBE24F7A62A01A0E275E36F96
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 29%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....-=...............0..<...f.......Z... ...`....@.. ....................................@.................................2Z..O....`...d...........................=..p............................................ ............... ..H............text....:... ...<.................. ..`.rsrc....d...`...d...>..............@..@.reloc..............................@..B................fZ......H.......Xk...E......5....................................................0............}.....s....}......}.....(.......(......{.....o.....(C........,b..{....r...po......r...po......{....(J......(....o......{.....o......{....r...po.......}.....8U......}.....{....r)..po......r)..po.....(C.....{.....oX......(....o......{.....oZ...o......{.....o^......(....o......{.....o\......(....o......{.....o`......(....o......{.....ob......(....o......u...........,H..{.....o......{....r...po.
                                                Process:C:\Users\user\Desktop\SOA-Al Daleel.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:true
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.947573023101732
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Windows Screen Saver (13104/52) 0.07%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                File name:SOA-Al Daleel.exe
                                                File size:959'488 bytes
                                                MD5:487de74e533bec62ad60b71ed4990b14
                                                SHA1:68816bdb2128901d938adee5bbbdcfe9ad710bf1
                                                SHA256:4d7a7d2b1e9422eae20449218fc515b1e526d03f1bbf0d371ad4ffbcb13a51b4
                                                SHA512:27159c1378fd047d12bb6dfe533a176105d37b1845efdbfdef1a6d4f96c4dfea1c6630b5b62dc522d7f2cc24ec5b0f142ddd19ebbe24f7a62a01a0e275e36f96
                                                SSDEEP:24576:3t4/d6Itn2xHd9AwO5U92mJKvy8YheLxl+qD9l:3Yd62gMU91KvyCX9v
                                                TLSH:2415222327A5CB12C93E4FF9C136A4501772FD1628A5C39D2DD6B0FA96B2B304825F67
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....-=...............0..<...f.......Z... ...`....@.. ....................................@................................
                                                Icon Hash:66666667e69c310e
                                                Entrypoint:0x4e5a86
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x9E3D2D85 [Sun Feb 15 23:04:37 2054 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xe5a320x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xe60000x6400.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xee0000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xe3d100x70.text
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xe3a8c0xe3c00997797e1d6ed825ba755533a2a14bdb6False0.971199446007135data7.976235825353332IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rsrc0xe60000x64000x6400b5ea3ae5e9194fb0e15de0d3f7c9564dFalse0.395546875data5.147795841907734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xee0000xc0x200e12199d472f186b74914aa28a23a1832False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0xe61e00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 00.2701612903225806
                                                RT_ICON0xe64d80x128Device independent bitmap graphic, 16 x 32 x 4, image size 00.4966216216216216
                                                RT_ICON0xe66100xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.5439765458422174
                                                RT_ICON0xe74c80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.6656137184115524
                                                RT_ICON0xe7d800x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5021676300578035
                                                RT_ICON0xe82f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.3157676348547718
                                                RT_ICON0xea8b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.4090056285178236
                                                RT_ICON0xeb9680x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.5859929078014184
                                                RT_GROUP_ICON0xebde00x76data0.6440677966101694
                                                RT_VERSION0xebe680x398OpenPGP Public Key0.41956521739130437
                                                RT_MANIFEST0xec2100x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jul 3, 2024 17:48:03.203267097 CEST49677443192.168.2.720.50.201.200
                                                Jul 3, 2024 17:48:03.589106083 CEST49677443192.168.2.720.50.201.200
                                                Jul 3, 2024 17:48:03.932893038 CEST49671443192.168.2.7204.79.197.203
                                                Jul 3, 2024 17:48:03.995409966 CEST49674443192.168.2.7104.98.116.138
                                                Jul 3, 2024 17:48:03.995425940 CEST49675443192.168.2.7104.98.116.138
                                                Jul 3, 2024 17:48:04.089169025 CEST49672443192.168.2.7104.98.116.138
                                                Jul 3, 2024 17:48:04.339118004 CEST49677443192.168.2.720.50.201.200
                                                Jul 3, 2024 17:48:05.839179039 CEST49677443192.168.2.720.50.201.200
                                                Jul 3, 2024 17:48:08.823513031 CEST49677443192.168.2.720.50.201.200
                                                Jul 3, 2024 17:48:10.669138908 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:10.674163103 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:10.674245119 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:11.594008923 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:11.594904900 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:11.595489979 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:11.595534086 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:11.599904060 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:11.758618116 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:11.758793116 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:11.764245987 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:11.919146061 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:11.926153898 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:11.931231022 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.086302996 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.086323977 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.086335897 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.086349010 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.086385012 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:12.086441040 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:12.178772926 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.222887039 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:12.227880001 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.383338928 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.399636984 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:12.404823065 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.559670925 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.561415911 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:12.566557884 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.723911047 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.725133896 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:12.730000019 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.925925970 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:12.926198006 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:12.931097031 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:13.088927031 CEST58749708208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:13.182898998 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:13.651676893 CEST49671443192.168.2.7204.79.197.203
                                                Jul 3, 2024 17:48:13.698518991 CEST49674443192.168.2.7104.98.116.138
                                                Jul 3, 2024 17:48:13.698529005 CEST49675443192.168.2.7104.98.116.138
                                                Jul 3, 2024 17:48:13.753437996 CEST49672443192.168.2.7104.98.116.138
                                                Jul 3, 2024 17:48:13.854036093 CEST49708587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:14.104731083 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:14.109601974 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:14.109687090 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:14.655329943 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:14.656063080 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:14.661978960 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:14.811686993 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:14.811943054 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:14.817756891 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:14.886024952 CEST49677443192.168.2.720.50.201.200
                                                Jul 3, 2024 17:48:14.966609955 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:14.972779036 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:14.977803946 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:15.436369896 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:15.436395884 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:15.436407089 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:15.436469078 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:15.436499119 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:15.436645985 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:15.436702013 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:15.438484907 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:15.439435959 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:15.439486027 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:15.494842052 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:15.499855042 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:15.651171923 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:15.687803984 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:15.693717957 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:15.874062061 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:15.920413017 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:15.925403118 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:16.081845045 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:16.136065006 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:16.199441910 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:16.205262899 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:16.360378027 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:16.362230062 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:16.367281914 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:16.519902945 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:16.520153046 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:16.524967909 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:16.704893112 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:16.705132961 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:16.709969044 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:16.913655996 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:16.921257019 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:16.921574116 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:16.921600103 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:16.921618938 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:16.926426888 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:16.926589012 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:16.926599979 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:16.926609039 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:17.214711905 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:17.448537111 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:17.448539972 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:48:17.448611021 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:48:24.603090048 CEST49704443192.168.2.7104.98.116.138
                                                Jul 3, 2024 17:48:24.613979101 CEST44349704104.98.116.138192.168.2.7
                                                Jul 3, 2024 17:48:26.792382002 CEST49677443192.168.2.720.50.201.200
                                                Jul 3, 2024 17:48:44.099287033 CEST4918353192.168.2.7162.159.36.2
                                                Jul 3, 2024 17:48:44.104240894 CEST5349183162.159.36.2192.168.2.7
                                                Jul 3, 2024 17:48:44.104346991 CEST4918353192.168.2.7162.159.36.2
                                                Jul 3, 2024 17:48:44.104373932 CEST4918353192.168.2.7162.159.36.2
                                                Jul 3, 2024 17:48:44.109329939 CEST5349183162.159.36.2192.168.2.7
                                                Jul 3, 2024 17:48:44.574497938 CEST5349183162.159.36.2192.168.2.7
                                                Jul 3, 2024 17:48:44.578984022 CEST4918353192.168.2.7162.159.36.2
                                                Jul 3, 2024 17:48:44.584225893 CEST5349183162.159.36.2192.168.2.7
                                                Jul 3, 2024 17:48:44.584280014 CEST4918353192.168.2.7162.159.36.2
                                                Jul 3, 2024 17:49:54.121217012 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:49:54.132643938 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:49:54.285662889 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:49:54.286983967 CEST58749711208.91.199.223192.168.2.7
                                                Jul 3, 2024 17:49:54.287072897 CEST49711587192.168.2.7208.91.199.223
                                                Jul 3, 2024 17:49:54.290275097 CEST49711587192.168.2.7208.91.199.223
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jul 3, 2024 17:48:07.904119015 CEST6065953192.168.2.71.1.1.1
                                                Jul 3, 2024 17:48:10.647198915 CEST5493753192.168.2.71.1.1.1
                                                Jul 3, 2024 17:48:10.658288002 CEST53549371.1.1.1192.168.2.7
                                                Jul 3, 2024 17:48:44.098644972 CEST5362739162.159.36.2192.168.2.7
                                                Jul 3, 2024 17:48:44.596067905 CEST5426153192.168.2.71.1.1.1
                                                Jul 3, 2024 17:48:44.604533911 CEST53542611.1.1.1192.168.2.7
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Jul 3, 2024 17:48:07.904119015 CEST192.168.2.71.1.1.10x5732Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                                                Jul 3, 2024 17:48:10.647198915 CEST192.168.2.71.1.1.10x967fStandard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                                Jul 3, 2024 17:48:44.596067905 CEST192.168.2.71.1.1.10x9e62Standard query (0)56.126.166.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Jul 3, 2024 17:48:07.911601067 CEST1.1.1.1192.168.2.70x5732No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                Jul 3, 2024 17:48:10.658288002 CEST1.1.1.1192.168.2.70x967fNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                Jul 3, 2024 17:48:10.658288002 CEST1.1.1.1192.168.2.70x967fNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                Jul 3, 2024 17:48:10.658288002 CEST1.1.1.1192.168.2.70x967fNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                Jul 3, 2024 17:48:10.658288002 CEST1.1.1.1192.168.2.70x967fNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                Jul 3, 2024 17:48:42.097206116 CEST1.1.1.1192.168.2.70x2c1aNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                Jul 3, 2024 17:48:42.097206116 CEST1.1.1.1192.168.2.70x2c1aNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                Jul 3, 2024 17:48:44.604533911 CEST1.1.1.1192.168.2.70x9e62Name error (3)56.126.166.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                Jul 3, 2024 17:48:11.594008923 CEST58749708208.91.199.223192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                Jul 3, 2024 17:48:11.594904900 CEST49708587192.168.2.7208.91.199.223EHLO 928100
                                                Jul 3, 2024 17:48:11.595489979 CEST58749708208.91.199.223192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                Jul 3, 2024 17:48:11.758618116 CEST58749708208.91.199.223192.168.2.7250-us2.outbound.mailhostbox.com
                                                250-PIPELINING
                                                250-SIZE 41648128
                                                250-VRFY
                                                250-ETRN
                                                250-STARTTLS
                                                250-AUTH PLAIN LOGIN
                                                250-AUTH=PLAIN LOGIN
                                                250-ENHANCEDSTATUSCODES
                                                250-8BITMIME
                                                250-DSN
                                                250 CHUNKING
                                                Jul 3, 2024 17:48:11.758793116 CEST49708587192.168.2.7208.91.199.223STARTTLS
                                                Jul 3, 2024 17:48:11.919146061 CEST58749708208.91.199.223192.168.2.7220 2.0.0 Ready to start TLS
                                                Jul 3, 2024 17:48:14.655329943 CEST58749711208.91.199.223192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                Jul 3, 2024 17:48:14.656063080 CEST49711587192.168.2.7208.91.199.223EHLO 928100
                                                Jul 3, 2024 17:48:14.811686993 CEST58749711208.91.199.223192.168.2.7250-us2.outbound.mailhostbox.com
                                                250-PIPELINING
                                                250-SIZE 41648128
                                                250-VRFY
                                                250-ETRN
                                                250-STARTTLS
                                                250-AUTH PLAIN LOGIN
                                                250-AUTH=PLAIN LOGIN
                                                250-ENHANCEDSTATUSCODES
                                                250-8BITMIME
                                                250-DSN
                                                250 CHUNKING
                                                Jul 3, 2024 17:48:14.811943054 CEST49711587192.168.2.7208.91.199.223STARTTLS
                                                Jul 3, 2024 17:48:14.966609955 CEST58749711208.91.199.223192.168.2.7220 2.0.0 Ready to start TLS

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:1
                                                Start time:11:48:06
                                                Start date:03/07/2024
                                                Path:C:\Users\user\Desktop\SOA-Al Daleel.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\SOA-Al Daleel.exe"
                                                Imagebase:0x980000
                                                File size:959'488 bytes
                                                MD5 hash:487DE74E533BEC62AD60B71ED4990B14
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1351009324.00000000041BF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.1351009324.00000000041BF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:4
                                                Start time:11:48:07
                                                Start date:03/07/2024
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeXxnIpy.exe"
                                                Imagebase:0x710000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:5
                                                Start time:11:48:07
                                                Start date:03/07/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:6
                                                Start time:11:48:07
                                                Start date:03/07/2024
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2314.tmp"
                                                Imagebase:0x200000
                                                File size:187'904 bytes
                                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:7
                                                Start time:11:48:07
                                                Start date:03/07/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:8
                                                Start time:11:48:08
                                                Start date:03/07/2024
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                Imagebase:0x9d0000
                                                File size:262'432 bytes
                                                MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:9
                                                Start time:11:48:08
                                                Start date:03/07/2024
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                Imagebase:0x70000
                                                File size:262'432 bytes
                                                MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:10
                                                Start time:11:48:08
                                                Start date:03/07/2024
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                Imagebase:0xb70000
                                                File size:262'432 bytes
                                                MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.1366722684.0000000003020000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.1363137995.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.1363137995.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.1366722684.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.1366722684.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:true

                                                Target ID:11
                                                Start time:11:48:09
                                                Start date:03/07/2024
                                                Path:C:\Users\user\AppData\Roaming\eeXxnIpy.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\AppData\Roaming\eeXxnIpy.exe
                                                Imagebase:0xf70000
                                                File size:959'488 bytes
                                                MD5 hash:487DE74E533BEC62AD60B71ED4990B14
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1398049009.0000000004450000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1398049009.0000000004450000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Antivirus matches:
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 29%, ReversingLabs
                                                Reputation:low
                                                Has exited:true

                                                Target ID:12
                                                Start time:11:48:09
                                                Start date:03/07/2024
                                                Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                Imagebase:0x7ff7fb730000
                                                File size:496'640 bytes
                                                MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:13
                                                Start time:11:48:11
                                                Start date:03/07/2024
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeXxnIpy" /XML "C:\Users\user\AppData\Local\Temp\tmp2F78.tmp"
                                                Imagebase:0x200000
                                                File size:187'904 bytes
                                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:14
                                                Start time:11:48:11
                                                Start date:03/07/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:15
                                                Start time:11:48:11
                                                Start date:03/07/2024
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                Imagebase:0x850000
                                                File size:262'432 bytes
                                                MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.2566283854.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.2566283854.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.2566283854.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:12.4%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:326
                                                  Total number of Limit Nodes:10
                                                  execution_graph 45230 1602801 45232 16026a6 45230->45232 45231 1602a28 45232->45231 45236 16052c8 45232->45236 45241 160532e 45232->45241 45247 16052ba 45232->45247 45237 16052e2 45236->45237 45252 1605640 45237->45252 45279 1605632 45237->45279 45238 16052ea 45238->45232 45242 1605331 45241->45242 45243 16052bc 45241->45243 45245 1605640 12 API calls 45243->45245 45246 1605632 12 API calls 45243->45246 45244 16052ea 45244->45232 45245->45244 45246->45244 45248 16052e2 45247->45248 45250 1605640 12 API calls 45248->45250 45251 1605632 12 API calls 45248->45251 45249 16052ea 45249->45232 45250->45249 45251->45249 45253 1605655 45252->45253 45268 1605667 45253->45268 45306 1605e24 45253->45306 45310 1605d1f 45253->45310 45315 1605c9f 45253->45315 45320 1605eda 45253->45320 45325 160628e 45253->45325 45329 1605b4e 45253->45329 45333 1605b8d 45253->45333 45338 1605a08 45253->45338 45346 16058c8 45253->45346 45350 16059c8 45253->45350 45359 1606007 45253->45359 45373 1605d03 45253->45373 45377 1605fc3 45253->45377 45391 1605dbc 45253->45391 45398 16058f8 45253->45398 45402 1605f34 45253->45402 45408 16060b1 45253->45408 45412 1605730 45253->45412 45417 160586f 45253->45417 45422 1605969 45253->45422 45426 1605b27 45253->45426 45440 1605e66 45253->45440 45449 1605c26 45253->45449 45455 1606025 45253->45455 45268->45238 45280 1605640 45279->45280 45281 1605e24 2 API calls 45280->45281 45282 1606025 2 API calls 45280->45282 45283 1605c26 2 API calls 45280->45283 45284 1605e66 4 API calls 45280->45284 45285 1605b27 6 API calls 45280->45285 45286 1605969 2 API calls 45280->45286 45287 160586f 2 API calls 45280->45287 45288 1605730 2 API calls 45280->45288 45289 16060b1 2 API calls 45280->45289 45290 1605f34 2 API calls 45280->45290 45291 16058f8 2 API calls 45280->45291 45292 1605dbc 2 API calls 45280->45292 45293 1605fc3 6 API calls 45280->45293 45294 1605d03 2 API calls 45280->45294 45295 1606007 6 API calls 45280->45295 45296 16059c8 4 API calls 45280->45296 45297 16058c8 2 API calls 45280->45297 45298 1605a08 4 API calls 45280->45298 45299 1605b8d 2 API calls 45280->45299 45300 1605b4e 2 API calls 45280->45300 45301 160628e 2 API calls 45280->45301 45302 1605eda 2 API calls 45280->45302 45303 1605667 45280->45303 45304 1605c9f 2 API calls 45280->45304 45305 1605d1f 2 API calls 45280->45305 45281->45303 45282->45303 45283->45303 45284->45303 45285->45303 45286->45303 45287->45303 45288->45303 45289->45303 45290->45303 45291->45303 45292->45303 45293->45303 45294->45303 45295->45303 45296->45303 45297->45303 45298->45303 45299->45303 45300->45303 45301->45303 45302->45303 45303->45238 45304->45303 45305->45303 45307 1605e25 45306->45307 45459 1601cf0 45307->45459 45463 1601cf8 45307->45463 45311 1605d25 45310->45311 45467 1601c01 45311->45467 45471 1601c08 45311->45471 45312 1605d57 45316 1605ca5 45315->45316 45475 1601586 45316->45475 45479 1601588 45316->45479 45317 1605ccb 45317->45268 45321 1605ee7 45320->45321 45323 1601c01 WriteProcessMemory 45321->45323 45324 1601c08 WriteProcessMemory 45321->45324 45322 16060d9 45323->45322 45324->45322 45483 1601b48 45325->45483 45487 1601b41 45325->45487 45326 16062ac 45330 1605b77 45329->45330 45331 1601cf0 ReadProcessMemory 45330->45331 45332 1601cf8 ReadProcessMemory 45330->45332 45331->45330 45332->45330 45334 1605bb8 45333->45334 45336 1601c01 WriteProcessMemory 45334->45336 45337 1601c08 WriteProcessMemory 45334->45337 45335 1605bc0 45336->45335 45337->45335 45339 1605cb6 45338->45339 45341 16058d1 45338->45341 45342 1601586 ResumeThread 45339->45342 45343 1601588 ResumeThread 45339->45343 45340 1605ccb 45340->45268 45344 1601cf0 ReadProcessMemory 45341->45344 45345 1601cf8 ReadProcessMemory 45341->45345 45342->45340 45343->45340 45344->45341 45345->45341 45347 16058d1 45346->45347 45348 1601cf0 ReadProcessMemory 45347->45348 45349 1601cf8 ReadProcessMemory 45347->45349 45348->45347 45349->45347 45351 16059e2 45350->45351 45352 1605cb6 45351->45352 45354 16058d1 45351->45354 45357 1601586 ResumeThread 45352->45357 45358 1601588 ResumeThread 45352->45358 45353 1605ccb 45353->45268 45355 1601cf0 ReadProcessMemory 45354->45355 45356 1601cf8 ReadProcessMemory 45354->45356 45355->45354 45356->45354 45357->45353 45358->45353 45361 1605b27 45359->45361 45360 1605fe0 45491 1601638 45360->45491 45495 1601630 45360->45495 45361->45360 45363 16059c7 45361->45363 45362 16061c6 45364 1605cb6 45363->45364 45365 16058d1 45363->45365 45367 1601586 ResumeThread 45364->45367 45368 1601588 ResumeThread 45364->45368 45369 1601cf0 ReadProcessMemory 45365->45369 45370 1601cf8 ReadProcessMemory 45365->45370 45366 1605ccb 45366->45268 45367->45366 45368->45366 45369->45365 45370->45365 45374 1605d7b 45373->45374 45375 1601cf0 ReadProcessMemory 45374->45375 45376 1601cf8 ReadProcessMemory 45374->45376 45375->45374 45376->45374 45378 1605fd2 45377->45378 45379 1605fe0 45378->45379 45381 16059c7 45378->45381 45387 1601630 Wow64SetThreadContext 45379->45387 45388 1601638 Wow64SetThreadContext 45379->45388 45380 16061c6 45382 1605cb6 45381->45382 45384 16058d1 45381->45384 45385 1601586 ResumeThread 45382->45385 45386 1601588 ResumeThread 45382->45386 45383 1605ccb 45383->45268 45389 1601cf0 ReadProcessMemory 45384->45389 45390 1601cf8 ReadProcessMemory 45384->45390 45385->45383 45386->45383 45387->45380 45388->45380 45389->45384 45390->45384 45392 1605e34 45391->45392 45393 1605e25 45392->45393 45394 1601cf0 ReadProcessMemory 45392->45394 45395 1601cf8 ReadProcessMemory 45392->45395 45396 1601cf0 ReadProcessMemory 45393->45396 45397 1601cf8 ReadProcessMemory 45393->45397 45394->45393 45395->45393 45396->45393 45397->45393 45399 1605910 45398->45399 45400 1601cf0 ReadProcessMemory 45399->45400 45401 1601cf8 ReadProcessMemory 45399->45401 45400->45399 45401->45399 45404 1605d36 45402->45404 45403 1606135 45403->45268 45404->45403 45406 1601c01 WriteProcessMemory 45404->45406 45407 1601c08 WriteProcessMemory 45404->45407 45405 1605d57 45406->45405 45407->45405 45409 16060d9 45408->45409 45410 1601c01 WriteProcessMemory 45408->45410 45411 1601c08 WriteProcessMemory 45408->45411 45410->45409 45411->45409 45413 160573e 45412->45413 45499 1602290 45413->45499 45503 1602284 45413->45503 45418 1605875 45417->45418 45419 16058a9 45418->45419 45420 1602290 CreateProcessA 45418->45420 45421 1602284 CreateProcessA 45418->45421 45420->45419 45421->45419 45423 16058d1 45422->45423 45423->45422 45424 1601cf0 ReadProcessMemory 45423->45424 45425 1601cf8 ReadProcessMemory 45423->45425 45424->45423 45425->45423 45427 1605b3c 45426->45427 45428 1605fe0 45427->45428 45430 16059c7 45427->45430 45438 1601630 Wow64SetThreadContext 45428->45438 45439 1601638 Wow64SetThreadContext 45428->45439 45429 16061c6 45431 1605cb6 45430->45431 45433 16058d1 45430->45433 45436 1601586 ResumeThread 45431->45436 45437 1601588 ResumeThread 45431->45437 45432 1605ccb 45432->45268 45434 1601cf0 ReadProcessMemory 45433->45434 45435 1601cf8 ReadProcessMemory 45433->45435 45434->45433 45435->45433 45436->45432 45437->45432 45438->45429 45439->45429 45441 1605e73 45440->45441 45444 16058f7 45440->45444 45442 1605f6f 45441->45442 45441->45444 45445 1601630 Wow64SetThreadContext 45442->45445 45446 1601638 Wow64SetThreadContext 45442->45446 45443 1605f8a 45447 1601cf0 ReadProcessMemory 45444->45447 45448 1601cf8 ReadProcessMemory 45444->45448 45445->45443 45446->45443 45447->45444 45448->45444 45450 1605bb8 45449->45450 45451 1605c2e 45449->45451 45453 1601c01 WriteProcessMemory 45450->45453 45454 1601c08 WriteProcessMemory 45450->45454 45452 1605bc0 45453->45452 45454->45452 45456 16058d1 45455->45456 45457 1601cf0 ReadProcessMemory 45456->45457 45458 1601cf8 ReadProcessMemory 45456->45458 45457->45456 45458->45456 45461 1601ce2 45459->45461 45460 1601d68 ReadProcessMemory 45462 1601d87 45460->45462 45461->45459 45461->45460 45462->45307 45465 1601ce2 ReadProcessMemory 45463->45465 45466 1601d87 45465->45466 45466->45307 45468 1601c07 WriteProcessMemory 45467->45468 45470 1601ca7 45468->45470 45470->45312 45472 1601c50 WriteProcessMemory 45471->45472 45474 1601ca7 45472->45474 45474->45312 45476 16015c8 ResumeThread 45475->45476 45478 16015f9 45476->45478 45478->45317 45480 16015c8 ResumeThread 45479->45480 45482 16015f9 45480->45482 45482->45317 45484 1601b88 VirtualAllocEx 45483->45484 45486 1601bc5 45484->45486 45486->45326 45488 1601b88 VirtualAllocEx 45487->45488 45490 1601bc5 45488->45490 45490->45326 45492 160167d Wow64SetThreadContext 45491->45492 45494 16016c5 45492->45494 45494->45362 45496 1601637 Wow64SetThreadContext 45495->45496 45498 16016c5 45496->45498 45498->45362 45500 1602319 CreateProcessA 45499->45500 45502 16024db 45500->45502 45504 1602319 CreateProcessA 45503->45504 45506 16024db 45504->45506 45113 136d680 DuplicateHandle 45114 136d716 45113->45114 45507 136ff40 45508 1365cec 3 API calls 45507->45508 45509 136ff6e 45508->45509 45115 16065d8 45116 16065fe 45115->45116 45117 1606763 45115->45117 45116->45117 45119 1601fd4 45116->45119 45120 1606858 PostMessageW 45119->45120 45122 16068c4 45120->45122 45122->45116 45103 136d438 45104 136d47e GetCurrentProcess 45103->45104 45106 136d4d0 GetCurrentThread 45104->45106 45107 136d4c9 45104->45107 45108 136d506 45106->45108 45109 136d50d GetCurrentProcess 45106->45109 45107->45106 45108->45109 45110 136d543 45109->45110 45111 136d56b GetCurrentThreadId 45110->45111 45112 136d59c 45111->45112 45123 1364668 45124 136467a 45123->45124 45125 1364686 45124->45125 45129 1364779 45124->45129 45134 1364218 45125->45134 45127 13646a5 45130 136479d 45129->45130 45138 1364878 45130->45138 45142 1364888 45130->45142 45135 1364223 45134->45135 45150 1365c6c 45135->45150 45137 1367048 45137->45127 45140 13648af 45138->45140 45139 136498c 45140->45139 45146 13644e0 45140->45146 45144 13648af 45142->45144 45143 136498c 45143->45143 45144->45143 45145 13644e0 CreateActCtxA 45144->45145 45145->45143 45147 1365918 CreateActCtxA 45146->45147 45149 13659db 45147->45149 45151 1365c77 45150->45151 45154 1365c8c 45151->45154 45153 13670ed 45153->45137 45155 1365c97 45154->45155 45158 1365cbc 45155->45158 45157 13671c2 45157->45153 45159 1365cc7 45158->45159 45162 1365cec 45159->45162 45161 13672c5 45161->45157 45163 1365cf7 45162->45163 45165 13685cb 45163->45165 45168 136ac78 45163->45168 45164 1368609 45164->45161 45165->45164 45172 136cd60 45165->45172 45177 136acb0 45168->45177 45181 136aca0 45168->45181 45169 136ac8e 45169->45165 45173 136cd65 45172->45173 45174 136cdb5 45173->45174 45214 136cf20 45173->45214 45218 136cf10 45173->45218 45174->45164 45186 136ad97 45177->45186 45194 136ada8 45177->45194 45178 136acbf 45178->45169 45182 136acb0 45181->45182 45184 136ad97 2 API calls 45182->45184 45185 136ada8 2 API calls 45182->45185 45183 136acbf 45183->45169 45184->45183 45185->45183 45187 136adb9 45186->45187 45188 136addc 45186->45188 45187->45188 45202 136b040 45187->45202 45206 136b031 45187->45206 45188->45178 45189 136add4 45189->45188 45190 136afe0 GetModuleHandleW 45189->45190 45191 136b00d 45190->45191 45191->45178 45195 136adb9 45194->45195 45196 136addc 45194->45196 45195->45196 45200 136b040 LoadLibraryExW 45195->45200 45201 136b031 LoadLibraryExW 45195->45201 45196->45178 45197 136add4 45197->45196 45198 136afe0 GetModuleHandleW 45197->45198 45199 136b00d 45198->45199 45199->45178 45200->45197 45201->45197 45203 136b054 45202->45203 45205 136b079 45203->45205 45210 136a168 45203->45210 45205->45189 45207 136b054 45206->45207 45208 136b079 45207->45208 45209 136a168 LoadLibraryExW 45207->45209 45208->45189 45209->45208 45211 136b220 LoadLibraryExW 45210->45211 45213 136b299 45211->45213 45213->45205 45215 136cf2d 45214->45215 45216 136cf67 45215->45216 45222 136b780 45215->45222 45216->45174 45219 136cf2d 45218->45219 45220 136cf67 45219->45220 45221 136b780 3 API calls 45219->45221 45220->45174 45221->45220 45223 136b78b 45222->45223 45225 136dc78 45223->45225 45226 136d084 45223->45226 45225->45225 45227 136d08f 45226->45227 45228 1365cec 3 API calls 45227->45228 45229 136dce7 45228->45229 45229->45225

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 294 7483d50-7483d79 379 7483d79 call 7484190 294->379 380 7483d79 call 7484183 294->380 297 7483d7f-7483dda call 74839ec 306 7483ddd-7483df2 297->306 308 7483df4 306->308 309 7483df9-7483e0e 308->309 310 7483e59-7483ea5 309->310 311 7483e10 309->311 315 7483ee0 310->315 319 7483ea7 310->319 311->308 311->310 312 7483f28-7483f3c 311->312 313 7483eca-7483ede 311->313 314 7483f4c 311->314 311->315 316 7483e22-7483e3d 311->316 317 7484062-7484065 311->317 318 7483f05 311->318 311->319 320 748409b-7484111 311->320 321 7483f7c-7483fcd 311->321 322 7483f3e 311->322 323 7483e3f-7483e41 311->323 324 7484130-7484137 311->324 325 7483e17-7483e19 311->325 329 7483f0a-7483f1f 312->329 328 7483eac-7483ec1 313->328 327 7483f51-7483f66 314->327 315->318 316->309 375 7484068 call 7486448 317->375 376 7484068 call 7486438 317->376 318->329 319->328 377 7484113 call 7488c78 320->377 378 7484113 call 7488c61 320->378 357 7483fcf-7483fd5 321->357 358 7483fe5-7484037 321->358 322->314 331 7483e4a 323->331 332 7483e43-7483e48 323->332 325->306 330 7483e1b-7483e20 325->330 327->324 334 7483f6c 327->334 328->315 337 7483ec3 328->337 329->322 338 7483f21 329->338 330->309 341 7483e4f-7483e57 331->341 332->341 333 748406e-7484075 381 748407a call 7487f18 333->381 382 748407a call 7487f28 333->382 383 748407a call 74880d8 333->383 384 748407a call 748726c 333->384 385 748407a call 748728c 333->385 386 748407a call 74872ac 333->386 387 748407a call 7488120 333->387 334->314 334->317 334->320 334->321 334->324 337->312 337->313 337->314 337->315 337->317 337->318 337->319 337->320 337->321 337->322 337->324 338->312 338->314 338->317 338->318 338->320 338->321 338->322 338->324 341->309 344 7484080 348 7484088-7484096 344->348 348->327 359 7483fd9-7483fdb 357->359 360 7483fd7 357->360 371 7484039-748403f 358->371 372 748404f-748405d 358->372 359->358 360->358 367 7484119 369 7484120-748412b 367->369 369->327 373 7484041 371->373 374 7484043-7484045 371->374 372->327 373->372 374->372 375->333 376->333 377->367 378->367 379->297 380->297 381->344 382->344 383->344 384->344 385->344 386->344 387->344
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: !Y3E$Teq$Teq$$q$$q$$q$$q
                                                  • API String ID: 0-510187712
                                                  • Opcode ID: a0e4e3825407017d65afd66d911dde85e1330e27da624e53479f50866cd8cf89
                                                  • Instruction ID: 95cbd7ef01b4614791947cbe046371a7d065058885b89d0b3290f66defe6946b
                                                  • Opcode Fuzzy Hash: a0e4e3825407017d65afd66d911dde85e1330e27da624e53479f50866cd8cf89
                                                  • Instruction Fuzzy Hash: AAA18374B102098FDB54AF79D8557AE7AF3BBC8B00F25846AE906DB394DE75DC018740

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 433 7483d43-7483d4e 434 7483d50-7483d54 433->434 435 7483d55-7483d79 433->435 434->435 517 7483d79 call 7484190 435->517 518 7483d79 call 7484183 435->518 437 7483d7f-7483dda call 74839ec 446 7483ddd-7483df2 437->446 448 7483df4 446->448 449 7483df9-7483e0e 448->449 450 7483e59-7483ea5 449->450 451 7483e10 449->451 455 7483ee0 450->455 459 7483ea7 450->459 451->448 451->450 452 7483f28-7483f3c 451->452 453 7483eca-7483ede 451->453 454 7483f4c 451->454 451->455 456 7483e22-7483e3d 451->456 457 7484062-7484065 451->457 458 7483f05 451->458 451->459 460 748409b-7484111 451->460 461 7483f7c-7483fcd 451->461 462 7483f3e 451->462 463 7483e3f-7483e41 451->463 464 7484130-7484137 451->464 465 7483e17-7483e19 451->465 469 7483f0a-7483f1f 452->469 468 7483eac-7483ec1 453->468 467 7483f51-7483f66 454->467 455->458 456->449 526 7484068 call 7486448 457->526 527 7484068 call 7486438 457->527 458->469 459->468 515 7484113 call 7488c78 460->515 516 7484113 call 7488c61 460->516 497 7483fcf-7483fd5 461->497 498 7483fe5-7484037 461->498 462->454 471 7483e4a 463->471 472 7483e43-7483e48 463->472 465->446 470 7483e1b-7483e20 465->470 467->464 474 7483f6c 467->474 468->455 477 7483ec3 468->477 469->462 478 7483f21 469->478 470->449 481 7483e4f-7483e57 471->481 472->481 473 748406e-7484075 519 748407a call 7487f18 473->519 520 748407a call 7487f28 473->520 521 748407a call 74880d8 473->521 522 748407a call 748726c 473->522 523 748407a call 748728c 473->523 524 748407a call 74872ac 473->524 525 748407a call 7488120 473->525 474->454 474->457 474->460 474->461 474->464 477->452 477->453 477->454 477->455 477->457 477->458 477->459 477->460 477->461 477->462 477->464 478->452 478->454 478->457 478->458 478->460 478->461 478->462 478->464 481->449 484 7484080 488 7484088-7484096 484->488 488->467 499 7483fd9-7483fdb 497->499 500 7483fd7 497->500 511 7484039-748403f 498->511 512 748404f-748405d 498->512 499->498 500->498 507 7484119 509 7484120-748412b 507->509 509->467 513 7484041 511->513 514 7484043-7484045 511->514 512->467 513->512 514->512 515->507 516->507 517->437 518->437 519->484 520->484 521->484 522->484 523->484 524->484 525->484 526->473 527->473
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Teq$Teq$$q$$q
                                                  • API String ID: 0-3867074480
                                                  • Opcode ID: 498335cc315804496863703e6c249ffb8b2f088060edecb8d922432f83838dbb
                                                  • Instruction ID: 52c7dfd29766083d2321698b1c25a19422f3ff65122b445e534c32cbc5ccac0a
                                                  • Opcode Fuzzy Hash: 498335cc315804496863703e6c249ffb8b2f088060edecb8d922432f83838dbb
                                                  • Instruction Fuzzy Hash: 7DA18374B102098FDB54AF79D855BAE7AF3BF88B01F25846AE906DB394DE71DC018740

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 757 313f6ce-313f6d4 758 313f6d7-313f6e0 757->758 758->758 759 313f6e2-313f716 758->759 760 313f718-313f71c 759->760 761 313f71d-313f743 759->761 760->761 763 313f74a 761->763 764 313f74f-313f764 763->764 765 313f883-313f8cc 764->765 766 313f76a 764->766 791 313f8ce call 74808b8 765->791 792 313f8ce call 7480da9 765->792 793 313f8ce call 7480849 765->793 794 313f8ce call 748081c 765->794 795 313f8ce call 748088d 765->795 796 313f8ce call 74807c0 765->796 797 313f8ce call 74808d0 765->797 798 313f8ce call 74807b3 765->798 799 313f8ce call 7480867 765->799 800 313f8ce call 7480877 765->800 766->763 766->765 767 313f833-313f850 766->767 768 313f823-313f82e 766->768 769 313f771-313f775 766->769 770 313f7f0-313f809 766->770 771 313f855-313f86d call 313fbc8 766->771 772 313f785-313f7b3 766->772 773 313f7b5-313f7c1 766->773 774 313f7d9-313f7eb 766->774 775 313f80e-313f81e 766->775 767->764 768->764 776 313f777-313f77c 769->776 777 313f77e 769->777 770->764 786 313f873-313f87e 771->786 772->764 787 313f7c9-313f7d4 773->787 774->764 775->764 780 313f783 776->780 777->780 780->764 786->764 787->764 790 313f8d4-313f8dd 791->790 792->790 793->790 794->790 795->790 796->790 797->790 798->790 799->790 800->790
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1350169079.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_3130000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Teq$Teq
                                                  • API String ID: 0-2938103587
                                                  • Opcode ID: f2b696612498d6da2b8f0998bc791c08de5f966602c2225d003ec916054e41d1
                                                  • Instruction ID: 45b5c3f18915caf5b546249057375bb230827384166182fa56050d4c70067cd0
                                                  • Opcode Fuzzy Hash: f2b696612498d6da2b8f0998bc791c08de5f966602c2225d003ec916054e41d1
                                                  • Instruction Fuzzy Hash: F951D335F101158FDB08DB68C895AAEBBB6FF8D300F1540AAE502EB354DB35DD068B91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 802 7483ee3-7483f03 804 7483f3e 802->804 805 7483f05 802->805 806 7483f4c 804->806 807 7483f0a-7483f1f 805->807 808 7483f51-7483f66 806->808 807->804 809 7483f21 807->809 810 7483f6c 808->810 811 7484130-7484137 808->811 809->804 809->805 809->806 809->811 812 7483f28-7483f3c 809->812 813 748409b-7484111 809->813 814 7483f7c-7483fcd 809->814 815 7484062-7484065 809->815 810->806 810->811 810->813 810->814 810->815 812->807 855 7484113 call 7488c78 813->855 856 7484113 call 7488c61 813->856 830 7483fcf-7483fd5 814->830 831 7483fe5-7484037 814->831 857 7484068 call 7486448 815->857 858 7484068 call 7486438 815->858 816 748406e-7484075 848 748407a call 7487f18 816->848 849 748407a call 7487f28 816->849 850 748407a call 74880d8 816->850 851 748407a call 748726c 816->851 852 748407a call 748728c 816->852 853 748407a call 74872ac 816->853 854 748407a call 7488120 816->854 820 7484080 823 7484088-7484096 820->823 823->808 832 7483fd9-7483fdb 830->832 833 7483fd7 830->833 844 7484039-748403f 831->844 845 748404f-748405d 831->845 832->831 833->831 840 7484119 842 7484120-748412b 840->842 842->808 846 7484041 844->846 847 7484043-7484045 844->847 845->808 846->845 847->845 848->820 849->820 850->820 851->820 852->820 853->820 854->820 855->840 856->840 857->816 858->816
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q$$q
                                                  • API String ID: 0-3126353813
                                                  • Opcode ID: abfc4554bb2a5aafd3f34ca122c59182904a3602bbaffa5c02e39372a9023a73
                                                  • Instruction ID: 72b1a3c9478bed1a37dbbbbe74420575c59666dbdf6cd2d117562517eefe5be9
                                                  • Opcode Fuzzy Hash: abfc4554bb2a5aafd3f34ca122c59182904a3602bbaffa5c02e39372a9023a73
                                                  • Instruction Fuzzy Hash: 4A518374B102099FDB54AF74D855BAE7AB2FFC8B01F24846AF9069B395CE75DC018B80

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 960 313f718-313f743 963 313f74a 960->963 964 313f74f-313f764 963->964 965 313f883-313f8cc 964->965 966 313f76a 964->966 992 313f8ce call 74808b8 965->992 993 313f8ce call 7480da9 965->993 994 313f8ce call 7480849 965->994 995 313f8ce call 748081c 965->995 996 313f8ce call 748088d 965->996 997 313f8ce call 74807c0 965->997 998 313f8ce call 74808d0 965->998 999 313f8ce call 74807b3 965->999 1000 313f8ce call 7480867 965->1000 1001 313f8ce call 7480877 965->1001 966->963 966->965 967 313f833-313f850 966->967 968 313f823-313f82e 966->968 969 313f771-313f775 966->969 970 313f7f0-313f809 966->970 971 313f855-313f86d call 313fbc8 966->971 972 313f785-313f7b3 966->972 973 313f7b5-313f7c1 966->973 974 313f7d9-313f7eb 966->974 975 313f80e-313f81e 966->975 967->964 968->964 976 313f777-313f77c 969->976 977 313f77e 969->977 970->964 986 313f873-313f87e 971->986 972->964 987 313f7c9-313f7d4 973->987 974->964 975->964 980 313f783 976->980 977->980 980->964 986->964 987->964 990 313f8d4-313f8dd 992->990 993->990 994->990 995->990 996->990 997->990 998->990 999->990 1000->990 1001->990
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1350169079.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_3130000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Teq$Teq
                                                  • API String ID: 0-2938103587
                                                  • Opcode ID: 3d0c447e794675e6b6b2fccd0e3331526e0a96f56556653554971e0ef83ba4cc
                                                  • Instruction ID: 900d3dfd808976bdb36835ffa120221d0878c2890d05c1475d893e6c950110b7
                                                  • Opcode Fuzzy Hash: 3d0c447e794675e6b6b2fccd0e3331526e0a96f56556653554971e0ef83ba4cc
                                                  • Instruction Fuzzy Hash: 2541E475F101158FDB08DBA9C8556BEBBB6FB8D300F15406AE506EB354CB308D428B91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ~H@
                                                  • API String ID: 0-3968150030
                                                  • Opcode ID: 39016aa1a003efdc52a98fd17f2bd625db33530f6588f463450aacea23e6d6f7
                                                  • Instruction ID: 4cd866c23fed00c197dd4b84c502c7679f88ea4a1d7e9a69edc554ba01b8ec0e
                                                  • Opcode Fuzzy Hash: 39016aa1a003efdc52a98fd17f2bd625db33530f6588f463450aacea23e6d6f7
                                                  • Instruction Fuzzy Hash: 27C136B0B14218CBCBA4CB69C5905AEFBF6EFC5210B1A896FD446DB356C630EC42CB45
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1350169079.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_3130000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6cd4efde627c8dcc313b266d630d8edb1d7d20331e4bf998f0eaa51554b5f052
                                                  • Instruction ID: b9667f394e1121c6828066b306f8deab6629a04330d8b952b5513fa8be81735a
                                                  • Opcode Fuzzy Hash: 6cd4efde627c8dcc313b266d630d8edb1d7d20331e4bf998f0eaa51554b5f052
                                                  • Instruction Fuzzy Hash: FD12B675D0471A8FCB14DF68C880AD9F7B1BF89300F15C6AAD459AB215EB70AAC5CF90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1350169079.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_3130000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a091e07c3eb2a1ed1efd4e50f21cf3cdee0450ea7ecfd772804a6efc91b929fe
                                                  • Instruction ID: c838c44f86035008ddccab79d144f7ed62bc97d8844fa444102b3b46560dbe1d
                                                  • Opcode Fuzzy Hash: a091e07c3eb2a1ed1efd4e50f21cf3cdee0450ea7ecfd772804a6efc91b929fe
                                                  • Instruction Fuzzy Hash: F812B675D0471A8FCB15DF68C880AD9F7B1BF49300F15C6AAD859AB211EB70AAC5CF90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dfdeeb0aa4bf219855a6d55cb937f81a61394fb4cccba3069b3ad8ac1507d721
                                                  • Instruction ID: 72e224eb444ce8722ce121a6a5ee2b20e4a17399e490b909a909617b80de76ba
                                                  • Opcode Fuzzy Hash: dfdeeb0aa4bf219855a6d55cb937f81a61394fb4cccba3069b3ad8ac1507d721
                                                  • Instruction Fuzzy Hash: 0961CEB122424DCFC789DF28C9808AD7BB6BB86340F52885BD916EB261D730ED478B45
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2d424d07ea488b32abed3901d6120ca7f83dd19e3652e52c56aec8a3e7ee10df
                                                  • Instruction ID: 1eddf3344c0fd91ca0dd56194f9edd8a25ca1d304ca4e69ff05ef9108b043e4d
                                                  • Opcode Fuzzy Hash: 2d424d07ea488b32abed3901d6120ca7f83dd19e3652e52c56aec8a3e7ee10df
                                                  • Instruction Fuzzy Hash: 8261F1B122415DCFC789DF28CA805AD7BB6BB86340F52886BD916EB291D730ED43CB45
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 749da2d4e1a8574864083fb4cf6167ea43456a939f93315dc5bdc71b26e43faa
                                                  • Instruction ID: 104fb3ad780695c2cbd779940083f6778ffc58f79b04a82fcaaa075216fc9dcc
                                                  • Opcode Fuzzy Hash: 749da2d4e1a8574864083fb4cf6167ea43456a939f93315dc5bdc71b26e43faa
                                                  • Instruction Fuzzy Hash: 5B41A671B1411DDFC785EFE9C9518EEFBB6EF89210F30442BE605EB250D63289428B85
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1350169079.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_3130000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e0c69ce1a2e3b12c1f7ae82a73d33c89761798c887be464fa44bcbda2843726a
                                                  • Instruction ID: ba5040b25015f54d8753ab02a73a5f990fa550f04f34b55da03b62184e290db7
                                                  • Opcode Fuzzy Hash: e0c69ce1a2e3b12c1f7ae82a73d33c89761798c887be464fa44bcbda2843726a
                                                  • Instruction Fuzzy Hash: 0741B775E042158FC708CFA9D5919BEFBF6EB8D200F168067E806E7251C775CD528B51
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bd2b89a1f33a5f2a6518d998046739bd1c3e596ad22cceca7c21b7f3fc1023e9
                                                  • Instruction ID: bd852c5c0a8cbba2f2de1ba24d6558572276bfc5f333bb6ad3df3439b04d1294
                                                  • Opcode Fuzzy Hash: bd2b89a1f33a5f2a6518d998046739bd1c3e596ad22cceca7c21b7f3fc1023e9
                                                  • Instruction Fuzzy Hash: C641A675A1411DDBC785AFE9C9518EEFBB6EF89210F70442BE609EB250C6318D428B85
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 663487efb59faa31b9bd9c3cf9a5b1feeac537cd11f306a724c6a8f9553a0842
                                                  • Instruction ID: 184f4a10252057ad914752a25b2080e1dc98ddad163cd0fae799396c5ef9e961
                                                  • Opcode Fuzzy Hash: 663487efb59faa31b9bd9c3cf9a5b1feeac537cd11f306a724c6a8f9553a0842
                                                  • Instruction Fuzzy Hash: 17E04F2885E2498FC716DA60AD641F27FB8DF1B140F042599884AA6192EA20851A9A15
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 63ffaca53a1f46b352827c36001cfe88a0869f30cf320a5815d43e3c330a6748
                                                  • Instruction ID: 3ccc42cc3ac564e924da611eadbc6ffc000d6876b71ae4897eba48fdf57b1c83
                                                  • Opcode Fuzzy Hash: 63ffaca53a1f46b352827c36001cfe88a0869f30cf320a5815d43e3c330a6748
                                                  • Instruction Fuzzy Hash: 2FE0862484D244CFC61ADE609D541F27FBCDF1B140F047489884F57142D96085179E15
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dd183ce6ec73fc0fbecbeeeca40219ed23f1ec1cf314750fa591f3977f6145f1
                                                  • Instruction ID: 4ac28887c980b774e23bb4c2266481b803a618f78b9eb6cc0cab92a2ab2679a7
                                                  • Opcode Fuzzy Hash: dd183ce6ec73fc0fbecbeeeca40219ed23f1ec1cf314750fa591f3977f6145f1
                                                  • Instruction Fuzzy Hash: 19E04F3884E249DFC70ACF20DC546B6BFF89B0B310F04A45AC80BA72D2DE30995ADE05

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 388 136d429-136d4c7 GetCurrentProcess 393 136d4d0-136d504 GetCurrentThread 388->393 394 136d4c9-136d4cf 388->394 395 136d506-136d50c 393->395 396 136d50d-136d541 GetCurrentProcess 393->396 394->393 395->396 398 136d543-136d549 396->398 399 136d54a-136d565 call 136d608 396->399 398->399 401 136d56b-136d59a GetCurrentThreadId 399->401 403 136d5a3-136d605 401->403 404 136d59c-136d5a2 401->404 404->403
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 0136D4B6
                                                  • GetCurrentThread.KERNEL32 ref: 0136D4F3
                                                  • GetCurrentProcess.KERNEL32 ref: 0136D530
                                                  • GetCurrentThreadId.KERNEL32 ref: 0136D589
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349290994.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1360000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: ea40ffc4cace7b47e9cb39c60ae8ae617449563dec1ec9754badf3bdd94ab90e
                                                  • Instruction ID: 28e9e2be340d12718c54af9755867fe1b4752cd5d7eea528c9aedf4b8844f734
                                                  • Opcode Fuzzy Hash: ea40ffc4cace7b47e9cb39c60ae8ae617449563dec1ec9754badf3bdd94ab90e
                                                  • Instruction Fuzzy Hash: FE5178B0E00309CFEB14DFAAD548BAEBBF5EF88304F208059E519A7290DB746945CF65

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 411 136d438-136d4c7 GetCurrentProcess 415 136d4d0-136d504 GetCurrentThread 411->415 416 136d4c9-136d4cf 411->416 417 136d506-136d50c 415->417 418 136d50d-136d541 GetCurrentProcess 415->418 416->415 417->418 420 136d543-136d549 418->420 421 136d54a-136d565 call 136d608 418->421 420->421 423 136d56b-136d59a GetCurrentThreadId 421->423 425 136d5a3-136d605 423->425 426 136d59c-136d5a2 423->426 426->425
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 0136D4B6
                                                  • GetCurrentThread.KERNEL32 ref: 0136D4F3
                                                  • GetCurrentProcess.KERNEL32 ref: 0136D530
                                                  • GetCurrentThreadId.KERNEL32 ref: 0136D589
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349290994.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1360000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 1de5434329dde126fcc4bce1ccb63aff8a9737a1fee69452e4b50806d68ebe7b
                                                  • Instruction ID: ef86bc63a7d0330175562a3a49a0c9822a14b17687c0e68c690c13f577c7288a
                                                  • Opcode Fuzzy Hash: 1de5434329dde126fcc4bce1ccb63aff8a9737a1fee69452e4b50806d68ebe7b
                                                  • Instruction Fuzzy Hash: A75166B0E00309CFDB14DFAAD548B9EBBF5EF88304F208459E519A7250DB74A945CF65

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 859 7483f41-7483f49 861 7483f4c 859->861 862 7483f51-7483f66 861->862 863 7483f6c 862->863 864 7484130-7484137 862->864 863->861 863->864 865 748409b-7484111 863->865 866 7483f7c-7483fcd 863->866 867 7484062-7484065 863->867 908 7484113 call 7488c78 865->908 909 7484113 call 7488c61 865->909 881 7483fcf-7483fd5 866->881 882 7483fe5-7484037 866->882 899 7484068 call 7486448 867->899 900 7484068 call 7486438 867->900 868 748406e-7484075 901 748407a call 7487f18 868->901 902 748407a call 7487f28 868->902 903 748407a call 74880d8 868->903 904 748407a call 748726c 868->904 905 748407a call 748728c 868->905 906 748407a call 74872ac 868->906 907 748407a call 7488120 868->907 871 7484080 874 7484088-7484096 871->874 874->862 883 7483fd9-7483fdb 881->883 884 7483fd7 881->884 895 7484039-748403f 882->895 896 748404f-748405d 882->896 883->882 884->882 891 7484119 893 7484120-748412b 891->893 893->862 897 7484041 895->897 898 7484043-7484045 895->898 896->862 897->896 898->896 899->868 900->868 901->871 902->871 903->871 904->871 905->871 906->871 907->871 908->891 909->891
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q$$q
                                                  • API String ID: 0-3126353813
                                                  • Opcode ID: 83b7b17fc69b49dbb98dd2f99d133f6661b5766777346b994c8a034bd5097920
                                                  • Instruction ID: d118574bc0893e40867db54a70e6b372c1e1aa8f5ba9d9f34f3ae5ee183a4d7f
                                                  • Opcode Fuzzy Hash: 83b7b17fc69b49dbb98dd2f99d133f6661b5766777346b994c8a034bd5097920
                                                  • Instruction Fuzzy Hash: 97518034B003099FDB54AF74D855BAE7AB3BFC8B01F24842AE906AB395DE31DC018B50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 910 7483f7b 911 7483f7c-7483fcd 910->911 917 7483fcf-7483fd5 911->917 918 7483fe5-7484037 911->918 919 7483fd9-7483fdb 917->919 920 7483fd7 917->920 926 7484039-748403f 918->926 927 748404f-748405d 918->927 919->918 920->918 928 7484041 926->928 929 7484043-7484045 926->929 930 7483f51-7483f66 927->930 928->927 929->927 931 7483f6c 930->931 932 7484130-7484137 930->932 931->911 931->932 933 748409b-7484111 931->933 934 7483f4c 931->934 935 7484062-7484065 931->935 956 7484113 call 7488c78 933->956 957 7484113 call 7488c61 933->957 934->930 958 7484068 call 7486448 935->958 959 7484068 call 7486438 935->959 936 748406e-7484075 949 748407a call 7487f18 936->949 950 748407a call 7487f28 936->950 951 748407a call 74880d8 936->951 952 748407a call 748726c 936->952 953 748407a call 748728c 936->953 954 748407a call 74872ac 936->954 955 748407a call 7488120 936->955 938 7484080 940 7484088-7484096 938->940 940->930 947 7484119 948 7484120-748412b 947->948 948->930 949->938 950->938 951->938 952->938 953->938 954->938 955->938 956->947 957->947 958->936 959->936
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q$$q
                                                  • API String ID: 0-3126353813
                                                  • Opcode ID: 99531fbc1d859eeb3aee71c2e5e0244fe32e4b52293fe21cb33a394360b4b1a6
                                                  • Instruction ID: a13ae1fa164dc3d88a0c5aaf4aada4a99f955a2d580bb02e95108427ca54ada1
                                                  • Opcode Fuzzy Hash: 99531fbc1d859eeb3aee71c2e5e0244fe32e4b52293fe21cb33a394360b4b1a6
                                                  • Instruction Fuzzy Hash: 7E419134B003099FDB54AF74D855BAE7AB3BFC8B01F24846AE906AB395CE31DC018B50
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 016024C6
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 7b13e48cffe7280a6ec3dc2413308315ee38c4375814532b1b24bbba001ab45e
                                                  • Instruction ID: 6124fe9cc86667cceb7cf9917b1ff32a74b074d25b03e506ece42e4bd02d4b7c
                                                  • Opcode Fuzzy Hash: 7b13e48cffe7280a6ec3dc2413308315ee38c4375814532b1b24bbba001ab45e
                                                  • Instruction Fuzzy Hash: 96A15B71D007198FEB29CF68CC547EEBBB2BF48310F1581A9D809A7280DB759985CF91
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 016024C6
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: d59bddd345b10962c5c43838910d2141e9a537dae3b1dd0f8a77eb7fdf56dc2e
                                                  • Instruction ID: c433126bfc10a3ae4f98173d2ac94012791eecf4477538c631271eff9322e332
                                                  • Opcode Fuzzy Hash: d59bddd345b10962c5c43838910d2141e9a537dae3b1dd0f8a77eb7fdf56dc2e
                                                  • Instruction Fuzzy Hash: C7916C71D007198FEB2ACF68CC5479EBBB2BF48310F1481A9D809A7284DB759985CF91
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0136AFFE
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349290994.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1360000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 64570100ab3e9e7e0a49a48714ca09f538d0d429ea86402fd3d03cd411b82bcc
                                                  • Instruction ID: 012a9b72c2f8b340c86b3f4b06a88d5a1fa28555392bcba81ae35f523c3d9162
                                                  • Opcode Fuzzy Hash: 64570100ab3e9e7e0a49a48714ca09f538d0d429ea86402fd3d03cd411b82bcc
                                                  • Instruction Fuzzy Hash: B9813970A00B058FD724DF2AD45475ABBF5FF88208F00892DD58AEBA54D775E846CF91
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 013659C9
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349290994.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1360000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: ef77b96b14a25f5e0df887389a81d0a77afa62df9190b2882d1a1cb893563ead
                                                  • Instruction ID: 8ad4c97ecd2235929400349206e3a4b92dbda5259dc4e768e23713bfe218187b
                                                  • Opcode Fuzzy Hash: ef77b96b14a25f5e0df887389a81d0a77afa62df9190b2882d1a1cb893563ead
                                                  • Instruction Fuzzy Hash: BA412171C00729CBEB24CFAAC885BCEBBF5BF48304F20816AD508AB254DB756946CF50
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 013659C9
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349290994.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1360000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: cc4bcfbcaf7caf1198f8de41963e84db6130b0a0535f28dafae932836619d266
                                                  • Instruction ID: 8eece0a310d6a99cbc39f433574ad51323da15c1addd47bbe28cc6348dd9d99c
                                                  • Opcode Fuzzy Hash: cc4bcfbcaf7caf1198f8de41963e84db6130b0a0535f28dafae932836619d266
                                                  • Instruction Fuzzy Hash: 4E410571C0071DCBEB24DFA9C84478EBBF5BF49304F208169D509AB255DB756946CF90
                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 01601D78
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: ebd88f2759a30952f4fdd116b138a40e272b57d4abaf2a4ae9da97a4f4398f02
                                                  • Instruction ID: edfa3a41013da2d531933a253f48a5f3a00d5c9ca6667de7cd3932905d9003f4
                                                  • Opcode Fuzzy Hash: ebd88f2759a30952f4fdd116b138a40e272b57d4abaf2a4ae9da97a4f4398f02
                                                  • Instruction Fuzzy Hash: B1218572D003498FCB15DFA9C880BEEBBF5FF49320F14842AE958A3291C7399901CB60
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 01601C98
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: a5b7a7ed716b4341e5bad96e0dbdd228709ecedca1e7778399311ac749966c35
                                                  • Instruction ID: 55d3a4388b0b37ed3f6e38b0b4dcc894cc6907b014e978b03c2cc60ca008c8b4
                                                  • Opcode Fuzzy Hash: a5b7a7ed716b4341e5bad96e0dbdd228709ecedca1e7778399311ac749966c35
                                                  • Instruction Fuzzy Hash: 0A312671D003099FDB14CFA9C885BEEBBF5FF48310F10852AE919A7280D7799941DBA0
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 01601C98
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: 5895ff3ab2090c4a34807f318f6b80aa1e90f1917123efa414b6fc16711f0e14
                                                  • Instruction ID: 17fc65a2e7b521a922a64cc6defb2d06678008b5d7b29ed0c28fc480bbe27c53
                                                  • Opcode Fuzzy Hash: 5895ff3ab2090c4a34807f318f6b80aa1e90f1917123efa414b6fc16711f0e14
                                                  • Instruction Fuzzy Hash: 0D212771D003099FDB14DFAAC885BEEBBF5FF48310F508429E919A7280C7799941CBA4
                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 016016B6
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: 7b5f613f017c86c2f1514932d37ede544676702f559f347818c898734d184c46
                                                  • Instruction ID: ab5a9bfca3d4c52ebab8df41297cd02ab6bf9b18a06146cdefdb900fd5d2249b
                                                  • Opcode Fuzzy Hash: 7b5f613f017c86c2f1514932d37ede544676702f559f347818c898734d184c46
                                                  • Instruction Fuzzy Hash: 03213671D103098FDB24DFA9C885BEEBBF4EB49310F14842AD559A7280CB789945CFA0
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0136D707
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349290994.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1360000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: d1e67439f700918c14b28e82bb6238a02d3f9a506aa9184d5319797c422a56a9
                                                  • Instruction ID: 187658d2be7995e9e370f25e1757bae8aae540b7fd9fe6eea2bb7901db0554d6
                                                  • Opcode Fuzzy Hash: d1e67439f700918c14b28e82bb6238a02d3f9a506aa9184d5319797c422a56a9
                                                  • Instruction Fuzzy Hash: E52105B5D002489FDB10CF9AD884ADEBFF9EB48310F14802AE914A3350D378A945CF61
                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 01601D78
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 8e7258cf505990e5e4a63133a686f88a35cbef71e476b35720ba06a10a26a9c9
                                                  • Instruction ID: 7a9d7373e1d4066a21c687d270c312384cf288f56fece3e814cd5e55c58636a7
                                                  • Opcode Fuzzy Hash: 8e7258cf505990e5e4a63133a686f88a35cbef71e476b35720ba06a10a26a9c9
                                                  • Instruction Fuzzy Hash: 58211471C003499FDB14DFAAC881BEEBBF5FF48310F54842AE919A7280C7799901DBA5
                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 016016B6
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: 7086a85143f7db00dbe3748b0e43a119665282bef1a1a16c5fb5e92c9fa1494e
                                                  • Instruction ID: dfd9768bb8f1b511dca135a78feaf5c9ed10aaeda06b0aba1a7d0523aa31ab23
                                                  • Opcode Fuzzy Hash: 7086a85143f7db00dbe3748b0e43a119665282bef1a1a16c5fb5e92c9fa1494e
                                                  • Instruction Fuzzy Hash: 88213471D003098FDB14DFAAC885BAEBBF4EF48320F54842AD519A7380CB789945CFA4
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0136D707
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349290994.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1360000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 520b21d9d1400526ed6134757c701e91b58d0b91631fe48b8a12f01a6fe7cdb6
                                                  • Instruction ID: d96995c27e708659efc825aabb953a9cf01998a05d9a338bd565908d7984d4d5
                                                  • Opcode Fuzzy Hash: 520b21d9d1400526ed6134757c701e91b58d0b91631fe48b8a12f01a6fe7cdb6
                                                  • Instruction Fuzzy Hash: 0E21E4B5D002489FDB10CF9AD884ADEFFF8EB48310F14841AE954A3350D379A944CF65
                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 01601BB6
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: ba7dce6b2c579de6c1f905339661f2ec550ed3a76a31a39b77532b5bc832a8b1
                                                  • Instruction ID: 4cc3188b6ada5ce68a366733a663f92290c422e9e324dbe04b73c5c7169372bd
                                                  • Opcode Fuzzy Hash: ba7dce6b2c579de6c1f905339661f2ec550ed3a76a31a39b77532b5bc832a8b1
                                                  • Instruction Fuzzy Hash: 912113759003098FDB24DFA9C844BEEBBF5EF88320F14842AE555A7250C7759901CB90
                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0136B079,00000800,00000000,00000000), ref: 0136B28A
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349290994.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1360000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: c0740f3bffff34a74cdacfd3aa97229eddf23763d0ebe2056ba1345b52c326a8
                                                  • Instruction ID: 96fb5dade237dd72b6743f01d8e5577d661069cd2352b82483d3383a62bbf4ea
                                                  • Opcode Fuzzy Hash: c0740f3bffff34a74cdacfd3aa97229eddf23763d0ebe2056ba1345b52c326a8
                                                  • Instruction Fuzzy Hash: C51112B6D003098FDB20DF9AD484B9EFBF8EB48314F14842AE919A7200C375A945CFA5
                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0136B079,00000800,00000000,00000000), ref: 0136B28A
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349290994.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1360000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 1f320f650cb4afebbd02288e3e2f2acf58cdf40c1d68be53981678126208b6d9
                                                  • Instruction ID: 422ee78bcd22de9ba61e46946944691990f64710a0388a91650590efa863db5e
                                                  • Opcode Fuzzy Hash: 1f320f650cb4afebbd02288e3e2f2acf58cdf40c1d68be53981678126208b6d9
                                                  • Instruction Fuzzy Hash: F61112B6D002498FDB24DFAAC844BDEFBF8EB88310F14842AD919A7210C375A545CFA5
                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 01601BB6
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 5625d08bc12ead64c4007bcd2708632aab56e68945ab4ca2bb72178912634c62
                                                  • Instruction ID: 2a2063604d1b39e15f24b8cf6530f28c8b5914d8454b60d0d43a2d86d2dadba9
                                                  • Opcode Fuzzy Hash: 5625d08bc12ead64c4007bcd2708632aab56e68945ab4ca2bb72178912634c62
                                                  • Instruction Fuzzy Hash: FE1114758003499FDB24DFAAC845BDFBBF5EB48320F148819E519A7250CB759941CBA0
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 53a22e2e72b27e8624fcb5b876bbdca2c8a5856b46fcd02a862a11b1e0f0f836
                                                  • Instruction ID: 5357a41a401ccb653d929c2768f9e0bd3c1b758dc56e71a3da41e95cbd888e07
                                                  • Opcode Fuzzy Hash: 53a22e2e72b27e8624fcb5b876bbdca2c8a5856b46fcd02a862a11b1e0f0f836
                                                  • Instruction Fuzzy Hash: CB110471D003498FDB24DFAAC8457EFBBF5AB88324F24842AD519A7240CB759941CF94
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 5157bb3917e7392739e3b06a4b7f521f02c64508248e84db295f548fc0d6d4f4
                                                  • Instruction ID: df3eb5c4d83ac5e0a33984201f65290b07d034ff5760d869c6c4842380ab50b2
                                                  • Opcode Fuzzy Hash: 5157bb3917e7392739e3b06a4b7f521f02c64508248e84db295f548fc0d6d4f4
                                                  • Instruction Fuzzy Hash: B1112871D003498FDB24DFAAC84579FFBF5EB48320F248419D519A7240CB75A941CF94
                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 016068B5
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: ef7c698e369fde7eecb7c833e5c3175d1a78e0ea72797b5233d09eaca48dac70
                                                  • Instruction ID: b91661d6031726947a1606c793465dc42e520d17ab4af55d2f07ddaadad4558a
                                                  • Opcode Fuzzy Hash: ef7c698e369fde7eecb7c833e5c3175d1a78e0ea72797b5233d09eaca48dac70
                                                  • Instruction Fuzzy Hash: CA1113B5C003498FDB20CF99C845BDFBBF4EB48320F24841AD414A3250C375A944CFA1
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0136AFFE
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349290994.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1360000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 94393eb600487b6ec76d8f7f9e81a025189108ae11af39875e420fb04f953f0e
                                                  • Instruction ID: 8ca3eab6d39ed7c18c754bd8ba5aab6f108b1226b088edc885d34a7cd25555f7
                                                  • Opcode Fuzzy Hash: 94393eb600487b6ec76d8f7f9e81a025189108ae11af39875e420fb04f953f0e
                                                  • Instruction Fuzzy Hash: DE110FB5C002498FDB20DF9AC844B9EFBF8EB88324F10842AD529A7254C379A545CFA1
                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 016068B5
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: f2ca9a9b9d60c393f209c7959d4c7be8afaf34a391b402e6ccf86118c01bacb4
                                                  • Instruction ID: d1e3961d699b000bcc1ecab1edede83e729c18f64c4df2b7d8978e1fcc70c3e9
                                                  • Opcode Fuzzy Hash: f2ca9a9b9d60c393f209c7959d4c7be8afaf34a391b402e6ccf86118c01bacb4
                                                  • Instruction Fuzzy Hash: B111F5B58003499FDB10DF9AC845BDFBBF8EB48320F108419E515A7740C375A954CFA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Hq
                                                  • API String ID: 0-1594803414
                                                  • Opcode ID: 3268ad402601d9c0ca632535aa6f1f458ed5a86bd930e4c8d226577854ffb744
                                                  • Instruction ID: 68e5fb4de1408ec0ae6dcb79f00e6d0574bcbeb2f2f79707d6d1c4b9a04c4f6e
                                                  • Opcode Fuzzy Hash: 3268ad402601d9c0ca632535aa6f1f458ed5a86bd930e4c8d226577854ffb744
                                                  • Instruction Fuzzy Hash: 46916C74A002498FCB05DFA8C8909EEBBF5EF89704B14C06AE909EB351E735DD06CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Teq
                                                  • API String ID: 0-1098410595
                                                  • Opcode ID: 3b9d61dac99bb7c11a80c8e2462480c0dcb6e4bdc44373c93c6ac0de41549043
                                                  • Instruction ID: 680d30c7ca816a27ca45143e897ddfca0adadd68465b8f748e372bf302c407da
                                                  • Opcode Fuzzy Hash: 3b9d61dac99bb7c11a80c8e2462480c0dcb6e4bdc44373c93c6ac0de41549043
                                                  • Instruction Fuzzy Hash: E451E071B0020A8FCB54EB7998445BFBBB6EFC8324715852AE419DB391DB309C0587A1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Teq
                                                  • API String ID: 0-1098410595
                                                  • Opcode ID: 1b52d110150c5ce46dc0d01343d5b8f8f223d361f25fb43cbb7c1c27dd9d3707
                                                  • Instruction ID: 1813b10fbfe510fe7077f1391fa01941a8b2b530e3883376f8df5378f17cbf12
                                                  • Opcode Fuzzy Hash: 1b52d110150c5ce46dc0d01343d5b8f8f223d361f25fb43cbb7c1c27dd9d3707
                                                  • Instruction Fuzzy Hash: 3531F8B4E1420C8FDB44DFAAC8556EEBBB6FF8A300F14942AD419AB354DB705806CF40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'q
                                                  • API String ID: 0-1807707664
                                                  • Opcode ID: 7bbef30ebfc3344b0aed794d6a3816d76901120dc024b963726c52e540921c88
                                                  • Instruction ID: 2462cbf33a341d0ccc5d77260fa62a563d827e240123d19a5569ffc6e54249aa
                                                  • Opcode Fuzzy Hash: 7bbef30ebfc3344b0aed794d6a3816d76901120dc024b963726c52e540921c88
                                                  • Instruction Fuzzy Hash: 602192357102268BD714EBA9D840BAFB7EAFFC8B14F10812AD908DB355DAB19C0687D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Teq
                                                  • API String ID: 0-1098410595
                                                  • Opcode ID: 4c17697b09922d3f40b1aa4a4e275c6add33c44ed8c72fad0bc08b543f5f0674
                                                  • Instruction ID: 8e8a0fcf78d541e67d2e0945b99d99282b718f3347d60d251e4d78003a7042e8
                                                  • Opcode Fuzzy Hash: 4c17697b09922d3f40b1aa4a4e275c6add33c44ed8c72fad0bc08b543f5f0674
                                                  • Instruction Fuzzy Hash: 4D111F71B002198BCBA4EBB998117FFBBB6AB89311F14446AC554E7344EB318D11CB91
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c8acb96b0130e60b57869c6d44bbff49ec51b9ac56daeb9d53d498c7c111dc03
                                                  • Instruction ID: 8593d540d28111c2868ad8b61dcb3d7db75532d22fe1ff7082443e48d7be780a
                                                  • Opcode Fuzzy Hash: c8acb96b0130e60b57869c6d44bbff49ec51b9ac56daeb9d53d498c7c111dc03
                                                  • Instruction Fuzzy Hash: 65B1AC75614B048FC309EB38D454ADEBBE2FF89300B5585AED45A8F361DB30E94ACB91
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 135dc410b0ff50e0736bc408ade559db467b6081fb4c75014f6981b83b19574a
                                                  • Instruction ID: 56858cb9c3a9926d0de91f2648d8c272ab5890f306668ab96658d98cbb7328a3
                                                  • Opcode Fuzzy Hash: 135dc410b0ff50e0736bc408ade559db467b6081fb4c75014f6981b83b19574a
                                                  • Instruction Fuzzy Hash: BEA17B74614B048FC319EB38D454ADE7BE2FF89300B5585AED45A8F361EB30AD4ACB91
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fc5efd605aa4010eba88c0bc1b652636f1dbfaf48905ef5d662794a2ef9dab7b
                                                  • Instruction ID: 3071a22cbe43233fcb1a0bcf0bc751f91221478cf2429407cd5cf79046facb8d
                                                  • Opcode Fuzzy Hash: fc5efd605aa4010eba88c0bc1b652636f1dbfaf48905ef5d662794a2ef9dab7b
                                                  • Instruction Fuzzy Hash: 46916A34614B048FC319EB38D454ADEBBE2FF89300B5485AED45A8F361DB30AD4ACB91
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b2aa3434310ce0da6388be54a197cd3c117065f2be6d3ba0e265952e195c43d5
                                                  • Instruction ID: bbe0bc2b068ee53ef307bc513bf1fffa47c2cdb17e12d2b7d4df6601c907a927
                                                  • Opcode Fuzzy Hash: b2aa3434310ce0da6388be54a197cd3c117065f2be6d3ba0e265952e195c43d5
                                                  • Instruction Fuzzy Hash: 82812974610B048FC759EB38C454A9EBBE6FFC9301B50856DE45A8B360EF31AD4ACB91
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 054e10abff6d548ad6a420fc71f5bceaee953ec27c8bc81c15b571774fe15f04
                                                  • Instruction ID: 4de1d351dd206619d168c2b209b2391098f1ad718eebf30015e62d143486e9fa
                                                  • Opcode Fuzzy Hash: 054e10abff6d548ad6a420fc71f5bceaee953ec27c8bc81c15b571774fe15f04
                                                  • Instruction Fuzzy Hash: 5851DFB4909389DFC346DF69E554A99BFF0AF8A200B2A80D6D484CB3B3CB359D15D712
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fdadabdd11bc1c2d40a46983d315be34da3bb28504301883d445e080c5764788
                                                  • Instruction ID: d78d2d7e0ef92bc096513494c93ad51bdaa7df583dda4dbfc85e87986f11c734
                                                  • Opcode Fuzzy Hash: fdadabdd11bc1c2d40a46983d315be34da3bb28504301883d445e080c5764788
                                                  • Instruction Fuzzy Hash: 2341F7F4E182098FDB44EFAAC4406FEBBF6EB8E310F14D46AD419A6355DB344942CB58
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a13a353d4c04c0050209990c912aad97f96914b1bbd7d09bb283b333442525f1
                                                  • Instruction ID: f7931d34d70f07f581073166fe1b68d3ecedb6aae7357587f1c03ab2242eb026
                                                  • Opcode Fuzzy Hash: a13a353d4c04c0050209990c912aad97f96914b1bbd7d09bb283b333442525f1
                                                  • Instruction Fuzzy Hash: A441E5B4D2525EDFCB80EFA8E4848FEBBB4FB4E210F019856E516A7311D7309811CB64
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a280141acfcb63e0e3f40944e884e98eec586a03de63deca1736f4361620dddb
                                                  • Instruction ID: 45ea7534ec29d344cb69a4ce324007dcbd2f7d5cb9f098d305e34d00c9c951a4
                                                  • Opcode Fuzzy Hash: a280141acfcb63e0e3f40944e884e98eec586a03de63deca1736f4361620dddb
                                                  • Instruction Fuzzy Hash: 8D41AFB4E1421D9FCB40EFA8D5809EEBBF5BF49300F648916E419EB345D730A982CB50
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c9169bba42c39716501fc333907f6146cb114a9e1fa2a04b9c4b627edc4722d1
                                                  • Instruction ID: f1cf43bc82315349473299cded55e1adaf121b6f84d94d9103cc3e3196ce3ba3
                                                  • Opcode Fuzzy Hash: c9169bba42c39716501fc333907f6146cb114a9e1fa2a04b9c4b627edc4722d1
                                                  • Instruction Fuzzy Hash: FA41C5B4D2525EDFCB80EFA8E4848FEBBB4FB4E210F419856E516A7311D7309811CB64
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2f7ec6b6133abe60cf5de092e4ae7a6e30a91fd6ddd61d190f82dba81aa1d514
                                                  • Instruction ID: 04efd1ceac4beef285d88789176f58adc9509fe63ab88e6435c7ccc927af8c69
                                                  • Opcode Fuzzy Hash: 2f7ec6b6133abe60cf5de092e4ae7a6e30a91fd6ddd61d190f82dba81aa1d514
                                                  • Instruction Fuzzy Hash: 673107B1A1834CAFDB46FBB4CC549AE7FB8DF42214B6444DBE404CB392EA309D459762
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 883494e8c603299c2c8da03b5d0dee30a37f90dabe5481a567f6cea01e5672f7
                                                  • Instruction ID: ee48c7255fb505ae358a3fe4d949875d5e3bc861eaf2def9816a94bbdc029682
                                                  • Opcode Fuzzy Hash: 883494e8c603299c2c8da03b5d0dee30a37f90dabe5481a567f6cea01e5672f7
                                                  • Instruction Fuzzy Hash: DB418AB4E1121DDFCB45DFA9D884AEEFBB2BB0A300F509426E81AF7210DB349951DB14
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9f075373932b197e2f1ee05d3b6585a1ba16e96eada0ad0cf61fd48eb8686b6b
                                                  • Instruction ID: f4b77f9949ce7f65d44f28045efa06c69c81bce134247b966815cfde9a56f066
                                                  • Opcode Fuzzy Hash: 9f075373932b197e2f1ee05d3b6585a1ba16e96eada0ad0cf61fd48eb8686b6b
                                                  • Instruction Fuzzy Hash: EB41C4B4D2525EDFCB80EFA8E4848FDBBB4FB4E241F01985AE516A7251DB309911CB24
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4b9fac461f7e9b2ff6b612dc6dbbca9a4280b85979b5d29f50f745d5ec16c2e5
                                                  • Instruction ID: 0eca57a1d712685695686bcb41dfcb3392ff71ce996fbf5eaeac74e111e1c65f
                                                  • Opcode Fuzzy Hash: 4b9fac461f7e9b2ff6b612dc6dbbca9a4280b85979b5d29f50f745d5ec16c2e5
                                                  • Instruction Fuzzy Hash: 2231F8A1B142158FDB5D7BB958342AF259BEFC5250794482FEA06DB3D0DD28CC4383AB
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4a13ec127d34305620e6c85e76fa8979ce9bd4ce93683de0f0461f5b661e81c6
                                                  • Instruction ID: 4aa74c9b87eb3a278f2227ef5945fdca060fe9fa0db76592735fd3090cfb222e
                                                  • Opcode Fuzzy Hash: 4a13ec127d34305620e6c85e76fa8979ce9bd4ce93683de0f0461f5b661e81c6
                                                  • Instruction Fuzzy Hash: 2A316AB1900209AFCF10EFAAD844ADEBFF9EB48310F50852AE415A7210C735A941CFA5
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e7720e2d8d08e55158afd0b0b528a5537608f48dec50ed7d26fdeefa90c32172
                                                  • Instruction ID: 7f3c03679540b09844f95da2a3ad90abe1b811564920dfd01eb260b340e16725
                                                  • Opcode Fuzzy Hash: e7720e2d8d08e55158afd0b0b528a5537608f48dec50ed7d26fdeefa90c32172
                                                  • Instruction Fuzzy Hash: A1319075A002098FDB05EF64C880AEE7BF6EF49704F1580AAE905AB361DB35ED05CB50
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 693c68d054962f037796983e68e847e882c68a772f5c71422750bc60ddd65d8a
                                                  • Instruction ID: f6bb59cf66b2f839632487346c1693b2664a8957c6abe1f3d2a1fed86df7a20e
                                                  • Opcode Fuzzy Hash: 693c68d054962f037796983e68e847e882c68a772f5c71422750bc60ddd65d8a
                                                  • Instruction Fuzzy Hash: 1A31DAB4E2424DDFCB40EFA8D4859EDFBB5EB4A340F109816D816AB315E7309956CF50
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3456968fd2533bfb6ecdb2e575f76786dee8184dcf56285cb6a8ecc2111df5af
                                                  • Instruction ID: 7af7555796a205bc8c4ed664cf9ca8acd7f2406941e6fdcd24a53c768181efdf
                                                  • Opcode Fuzzy Hash: 3456968fd2533bfb6ecdb2e575f76786dee8184dcf56285cb6a8ecc2111df5af
                                                  • Instruction Fuzzy Hash: 9521AFB270478D17D3299739CC0455FBFEAEFC6A5570DC06FD049CB211DA20D8028390
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1348631137.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_108d000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 572bef47423057f7a2bd20451d57b8659d1a2b4c4e0e7bef43368302e6c7581d
                                                  • Instruction ID: ba38bcbd05a65d4ccc947734a5d5737dd324a9b04349d8198bd078547dc91301
                                                  • Opcode Fuzzy Hash: 572bef47423057f7a2bd20451d57b8659d1a2b4c4e0e7bef43368302e6c7581d
                                                  • Instruction Fuzzy Hash: 5D21D671508240DFDB15EF54D9C0F2ABFA5FB84318F24C6AAD9850B296C336D456CBB2
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1348631137.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_108d000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d583799936164e9bd425c4441d4138403cb3f8b5326fe393235098b50ac7b2e2
                                                  • Instruction ID: 6febea3514e1e200ad96aaa074228a771e3bf55b492c2a23ca89df33620e3450
                                                  • Opcode Fuzzy Hash: d583799936164e9bd425c4441d4138403cb3f8b5326fe393235098b50ac7b2e2
                                                  • Instruction Fuzzy Hash: BE214B71508204DFDB05EF48D9C0B56BFA5FB94324F20C2ADD9890F296C736E446CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349039854.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_129d000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b6a249a3bb2c33ee79f6889b143116038de46eacea2664cf0d6d021cccf4fba3
                                                  • Instruction ID: 2ee02e226035370800026f12803df7680f0be8254547d40067a69da70f4f7d72
                                                  • Opcode Fuzzy Hash: b6a249a3bb2c33ee79f6889b143116038de46eacea2664cf0d6d021cccf4fba3
                                                  • Instruction Fuzzy Hash: 7A213071614308DFDF14DF68D884B16BB61EB84314F20C56DD90A0B282C33AD807DA62
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349039854.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_129d000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 014f8589962d5b9e9e8f001a573cb403b4b4d6cef5deff998492d99a29839ccc
                                                  • Instruction ID: 9191db5a94ebbb8ce4acdf4e636abdb926bb220fc818aadf340755094a60730b
                                                  • Opcode Fuzzy Hash: 014f8589962d5b9e9e8f001a573cb403b4b4d6cef5deff998492d99a29839ccc
                                                  • Instruction Fuzzy Hash: E5213775A14308DFDF05DF98D9C0B15BB61FB84324F20C5ADD9094B287C376D806DA61
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2711db0e6ac9db2bc769ca0bbf1e8bbcc0feeb92bdabfb6f1079e4319e3f61fe
                                                  • Instruction ID: 234eb0b97f7bac9a9ee6130e40dbbe508cc24e69c84361ffaace2269dfec6b26
                                                  • Opcode Fuzzy Hash: 2711db0e6ac9db2bc769ca0bbf1e8bbcc0feeb92bdabfb6f1079e4319e3f61fe
                                                  • Instruction Fuzzy Hash: B4216A75A007159FC320DF65D880ABBBBF9FF89750B00856DE919DB320E774A906CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 88ae1faa6a018738202429100371cf1591d8bb657d7941df0f0345f638bed0aa
                                                  • Instruction ID: 0682d33d7ad804da68211b2c9e00fd1b676fb87d7efc63dfe7350fca2bc286c1
                                                  • Opcode Fuzzy Hash: 88ae1faa6a018738202429100371cf1591d8bb657d7941df0f0345f638bed0aa
                                                  • Instruction Fuzzy Hash: CF31DFB0C1131C9BDB60DF99D588BCEBBF5EB08314F24842AE408AB341C7B55845CBA5
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a4f5d8f2b345a6c04d1360527b18fb3a19f40ede2850fecc9afb34428bbb4822
                                                  • Instruction ID: 4740e4079bf5f285564327a775a7f171cc27ceee34c5e5052e15a92b1260d212
                                                  • Opcode Fuzzy Hash: a4f5d8f2b345a6c04d1360527b18fb3a19f40ede2850fecc9afb34428bbb4822
                                                  • Instruction Fuzzy Hash: EA31DFB0C1131C9BDB60EF99C588BCEBBF4EB08314F24842AE408AB281C7B55845CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 41a561716149f603bd53dd6111826d293edc1d8dbf5d854880f942b007369372
                                                  • Instruction ID: ec384dc82cfb652021d7738a01ededc4d8cfcedc2b1a7895ffdef117b4038c66
                                                  • Opcode Fuzzy Hash: 41a561716149f603bd53dd6111826d293edc1d8dbf5d854880f942b007369372
                                                  • Instruction Fuzzy Hash: 79215875A007159BC320DF65C8809BBB7F9FFC8710B00852DE9199B320E770AD05C7A1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 474ea2c304e59df3a332c655c91db4bd2761fd9e001662b9447b80b678854b99
                                                  • Instruction ID: 095ed481ac9d01d742605b0d472a377c893371fef77e9e6d52ff8e635ebecb95
                                                  • Opcode Fuzzy Hash: 474ea2c304e59df3a332c655c91db4bd2761fd9e001662b9447b80b678854b99
                                                  • Instruction Fuzzy Hash: B621F6B1A001199FE794EF5AC444BEFBBF5FB88364F25812AE514CB391CB708904CB91
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f1f874661a287d3b891996f9cf486d6ae106c27d77e66ac87f3e502b23482c31
                                                  • Instruction ID: 051b76b6ac05b71de1e4f2f1e656612382d002f51c8934cd2637a70e1d53355e
                                                  • Opcode Fuzzy Hash: f1f874661a287d3b891996f9cf486d6ae106c27d77e66ac87f3e502b23482c31
                                                  • Instruction Fuzzy Hash: 1911C4B2E0030A9F9B91EF7998404FFBBBAEBC5650715852AE464D7341EF30D9058761
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dd83eacf59695479f75fc8e2c82cb10565dd5baf337835fd1dd540e6481b7d4f
                                                  • Instruction ID: cf7c07c1b534c6fde9f22225287f7d3a7d2048f64ccafb76a4f542db51b5d090
                                                  • Opcode Fuzzy Hash: dd83eacf59695479f75fc8e2c82cb10565dd5baf337835fd1dd540e6481b7d4f
                                                  • Instruction Fuzzy Hash: 772193B4A10A08DFD744DF5AE685999BBF1FF8C310B6280D5E5489B365DB31EE20EB04
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 31741a92ae4b05264a7d4fdad084f9ed6fd7ec79281cd5248dca649b55487217
                                                  • Instruction ID: a5b421b87579c212047d90d325cf9112046efd4c15413124e60622fa4ca3bb08
                                                  • Opcode Fuzzy Hash: 31741a92ae4b05264a7d4fdad084f9ed6fd7ec79281cd5248dca649b55487217
                                                  • Instruction Fuzzy Hash: 9E2195F4D14209DFCB84DF99C181AEEBBF5EB4A300F60945AD819A7315D7709A41CF51
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1348631137.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_108d000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                  • Instruction ID: 9cc88669dddb413e2b48acaf05259e3e0f87ea6d2bc3f07d2d86aff096283b0e
                                                  • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                  • Instruction Fuzzy Hash: 0011E176504240DFCB06DF48D5C0B56BFB2FB84324F24C2A9D8890B297C33AE45ACBA1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1348631137.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_108d000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                  • Instruction ID: 92c7ad7aa2ab6c85779e2674afceffc2d3c112f0ef51da67623a2642ec882e81
                                                  • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                  • Instruction Fuzzy Hash: 5111B176504280DFCB16DF54D5C4B16BFB2FB84324F24C6AAD8890B697C336D456CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 23f39a63f5a52a46ef3dd63028d482d3957da10f904ba1724a72f7492f0f86ee
                                                  • Instruction ID: 32950416e1c664c90dbaa30d8ad9cf85a2efab57acaab63aed4909b894107f2a
                                                  • Opcode Fuzzy Hash: 23f39a63f5a52a46ef3dd63028d482d3957da10f904ba1724a72f7492f0f86ee
                                                  • Instruction Fuzzy Hash: 872106B5C0034D9FCB20DF9AC844ADEBBF8FB48310F50841AE919A7210C375A945CFA1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349039854.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_129d000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                  • Instruction ID: 75c4af719fceafb765acf5431c7400cb386c997789168aa8a34cab3cde99df52
                                                  • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                  • Instruction Fuzzy Hash: 8411BB75904284DFDB06CF58C6C0B15BBA2FB84324F24C6ADD9494B297C33AD40ACB61
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349039854.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_129d000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                  • Instruction ID: e629a68674127133de755b2fdbd0faff866ca3ebcfb832e395b6ba132d5ff9e0
                                                  • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                  • Instruction Fuzzy Hash: A311BB75504284CFDB16CF68D5C4B15BBA2FB84324F24C6AED9494B696C33AD40ACBA2
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e7a41aea8eb3fc609fb0963cd22c25d65af5866fb3cf10aa433391b0dd8f5bff
                                                  • Instruction ID: 355033a55e72d6b164e27e2ef7206710405e737e5a6017484769960cc4b073d7
                                                  • Opcode Fuzzy Hash: e7a41aea8eb3fc609fb0963cd22c25d65af5866fb3cf10aa433391b0dd8f5bff
                                                  • Instruction Fuzzy Hash: 69F044F131031E5B87A2751E8C909EF6B5EDAD15A0799032FED09C3392DE10CC4282B6
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8f5da4babf7788e2ef6932bf81b70bbd333a31d7a4059d5bc700d33f3fd7585c
                                                  • Instruction ID: 4eec8001d33b908d64b6a96b407085cc5f6f9827273160bdab68772d2bfe0f0b
                                                  • Opcode Fuzzy Hash: 8f5da4babf7788e2ef6932bf81b70bbd333a31d7a4059d5bc700d33f3fd7585c
                                                  • Instruction Fuzzy Hash: 4C1121B0D15218DFD748DF6AD4809EEBBBABF8A301F00D46AE40997310DB305941CB60
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1a83d5604c533c1119a598d91f733629e122f0165ca0a77ff29c1f45fb4a204e
                                                  • Instruction ID: 8779f491072ee1f09bcfd52ef0dbd64e05a85d12ca871bcfd016f24310236bb7
                                                  • Opcode Fuzzy Hash: 1a83d5604c533c1119a598d91f733629e122f0165ca0a77ff29c1f45fb4a204e
                                                  • Instruction Fuzzy Hash: 6211D3B4D0820CEFCB44EF99C5409EEBBF9FB49310F54959A9459AB311D770AA42DB40
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9b5167847931e73c46b5077a330e75fa03bb172c48123abe664108af8a32fc14
                                                  • Instruction ID: d698a84435da02794b022c4e2c7d5108636e7e5858de6da6094e6d42ff231542
                                                  • Opcode Fuzzy Hash: 9b5167847931e73c46b5077a330e75fa03bb172c48123abe664108af8a32fc14
                                                  • Instruction Fuzzy Hash: FD01F5707083868FD781AA3DA8086AA7F97DBDA141F05457AE646C7792CE718C438781
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 137f8cc073d386d12593896f6f60cd63e2c94382a9474d9cc93c0fb6a646cde1
                                                  • Instruction ID: 061bc04853617ea406ba479d8b2c517d58304f931c6e60a8359cb6229da4aa7c
                                                  • Opcode Fuzzy Hash: 137f8cc073d386d12593896f6f60cd63e2c94382a9474d9cc93c0fb6a646cde1
                                                  • Instruction Fuzzy Hash: D5012C70691709CFD354DF18C845FA937A5AF86710F5680A6E2058F676D732E841CB01
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 718d7acc173f680619b388dcae0ee32bd28183da58b5131a2091ebc7d1ed5d9a
                                                  • Instruction ID: 5ed25a61a4dbd560b84960ba5cb324cce5950b6abde7e5e78910f3c904a0515c
                                                  • Opcode Fuzzy Hash: 718d7acc173f680619b388dcae0ee32bd28183da58b5131a2091ebc7d1ed5d9a
                                                  • Instruction Fuzzy Hash: D3019EB0755349CFE3559B29C805B5A3BA9AF8A300F9980E7E115CF3B6CB21DC01CB02
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8b15246421618497b82654c865b39d9f247f818ee246811777718ae522c6e5d9
                                                  • Instruction ID: 49126759180db7c018c187c3524d581d45275dd382aa09a7e38f9c1ce8ec047c
                                                  • Opcode Fuzzy Hash: 8b15246421618497b82654c865b39d9f247f818ee246811777718ae522c6e5d9
                                                  • Instruction Fuzzy Hash: C411E5B1D006589BEB18CFABC8447DEFAF7AFC9300F14C46A9409B6264DB7009468FA0
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1348631137.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_108d000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e7fdaef44f3a1f182d2823de2b2b6307947cc4b995d728c2c23de918d77cd089
                                                  • Instruction ID: 86b91c60ccec3f63013be91f7191999229b311af0e338dbae5a253b818a92585
                                                  • Opcode Fuzzy Hash: e7fdaef44f3a1f182d2823de2b2b6307947cc4b995d728c2c23de918d77cd089
                                                  • Instruction Fuzzy Hash: 3801F73100C3809AE7607A55CC84B2AFFD8EF41231F18C66AEDC80A2C2D3389844CBB2
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 79e7e340bb4998e3c62fa51707b30fd8d0410c8ceabd347652a8b34a497dd8db
                                                  • Instruction ID: 2e272750b214b31d6b8ec893c0c87552fe4c8efc782a53780683e3f50738c6eb
                                                  • Opcode Fuzzy Hash: 79e7e340bb4998e3c62fa51707b30fd8d0410c8ceabd347652a8b34a497dd8db
                                                  • Instruction Fuzzy Hash: 29017C35A20718CBCB189A25D85949EBBBBFF88765B00852EE50683360DF71A915DB90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ab010fd34365fa5634ebdd66aeddb3b5894924d8b08291186a4c31f65a5760a1
                                                  • Instruction ID: cb4a4b0c6d08015348b4b61052e9e2a971b4f3d7a775081cdac212c896bda0aa
                                                  • Opcode Fuzzy Hash: ab010fd34365fa5634ebdd66aeddb3b5894924d8b08291186a4c31f65a5760a1
                                                  • Instruction Fuzzy Hash: EB016DB190021EDFDB91EF95C4047EEBBB0FF48364F118526E514AB291D7708A44CBD2
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f831d7fd81aed940e07165726c815bbbb295b5ca73ea188cd25a6a8b413680be
                                                  • Instruction ID: 00350fc56ba597c335849cd9b66b50ad67dacef32fb79139b15ff2de3d296fb5
                                                  • Opcode Fuzzy Hash: f831d7fd81aed940e07165726c815bbbb295b5ca73ea188cd25a6a8b413680be
                                                  • Instruction Fuzzy Hash: DA01A430714306CFC681AA3DE94969A7BDBEBD9292F05853AE60AC7355DF70DC438790
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2f0ec9a0dd320b85891774cc4b79576ee30a6a001ff224a198b990b5d75ba918
                                                  • Instruction ID: ee8ff8332b55d02b702d9cfb250d9634504a3c3c2d10bcf6c385e05cf727cf61
                                                  • Opcode Fuzzy Hash: 2f0ec9a0dd320b85891774cc4b79576ee30a6a001ff224a198b990b5d75ba918
                                                  • Instruction Fuzzy Hash: 9701EC74E1510CEFC744EBA4C585AADBBF9AB8E304F15C495D5499B352DB30DE02EB40
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5418bd8d42645dd1f00e66ee048ada85130ba574e1de0bd12d4e79a6f2888804
                                                  • Instruction ID: 97f1f38bad811bb3c6bcc6cef48d46263a5f2f2066c4dadf194715f2bcb567f6
                                                  • Opcode Fuzzy Hash: 5418bd8d42645dd1f00e66ee048ada85130ba574e1de0bd12d4e79a6f2888804
                                                  • Instruction Fuzzy Hash: 59F0ADB0A2C20CDBE744EB55C0A09FDBBBDAB4B300F0099D2E5095A291D7309A02DB70
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1348631137.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_108d000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9e0297c633315af891ea13cf34411dee68809b2a76b13e4bb4012bd56bf32b80
                                                  • Instruction ID: a964dc42e025483b22b883b616902b167faf4a242b55c3b1738502529864e590
                                                  • Opcode Fuzzy Hash: 9e0297c633315af891ea13cf34411dee68809b2a76b13e4bb4012bd56bf32b80
                                                  • Instruction Fuzzy Hash: AEF0C8310083409EE7509A09CC84B66FFE8EF40635F18C55AED480B2C7C3755844CB71
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5f67a9bd64479f14f823161e3a41dfe979c73a944af2199579fcbed88de8291e
                                                  • Instruction ID: 5fbea05330ac9a408c80bcb2c429ac85b970e771d800bf48959d05ea920260c4
                                                  • Opcode Fuzzy Hash: 5f67a9bd64479f14f823161e3a41dfe979c73a944af2199579fcbed88de8291e
                                                  • Instruction Fuzzy Hash: 64F0E971A102195FDB58593588151EFBAEBDBC9750F04813BE411933A4DEB05D159580
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4fcfd663a0594558520f38e843e01cbca285219dec6fbcc74cc175c44dfe1c3d
                                                  • Instruction ID: e02510aa224bdb6adb61960f4a1ec83e64b1d299d26b3daaaac9c2f0b419166c
                                                  • Opcode Fuzzy Hash: 4fcfd663a0594558520f38e843e01cbca285219dec6fbcc74cc175c44dfe1c3d
                                                  • Instruction Fuzzy Hash: F1F0E4717502185F8B546B7D942459F37EBDFC86513554477EA06C7315DD30CC028396
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 97d85b839644d87dcc68ff5b50822acdef80752ba2e746eb124cbd6c5a5af872
                                                  • Instruction ID: 9ffef9c0ad51ca7ffcdefc0bb0c1bf9db34ffec1852ac426604bfb7b3f269130
                                                  • Opcode Fuzzy Hash: 97d85b839644d87dcc68ff5b50822acdef80752ba2e746eb124cbd6c5a5af872
                                                  • Instruction Fuzzy Hash: DE01ECB080021DDFDB55DF55C4047EEBAF5AF44364F21852AE524AA291D7748A40CBD1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5444b386b98dba308cd1ace65be0aa35bbdaa9e8a1302c34dbf99ce76e8b2a35
                                                  • Instruction ID: 06f06216c2a914c75c786004cc11433708485d7fc3b805825be193fb88cd57f8
                                                  • Opcode Fuzzy Hash: 5444b386b98dba308cd1ace65be0aa35bbdaa9e8a1302c34dbf99ce76e8b2a35
                                                  • Instruction Fuzzy Hash: 25F027B179071D47C368CA2B980446FBBDFEBC5691709C83FE10AC7220EA30D9474690
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4b0af3ce90dc810b4147e56113dd673cb40e751b94059dde256a4ce236e48553
                                                  • Instruction ID: 8ecbbebdfea59523fcb71c0088d9bba8e248443633767ed3f5333f0d625b6be6
                                                  • Opcode Fuzzy Hash: 4b0af3ce90dc810b4147e56113dd673cb40e751b94059dde256a4ce236e48553
                                                  • Instruction Fuzzy Hash: 22F0B471A0820CAFDF45DFA9DC508DE7FAEDF49214B1481ABE408D7222DA3099508754
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b90ec6e9934c9ad786241fa950333c18b92a373689e58484f44e1114f265e93d
                                                  • Instruction ID: 65af631c6d229d7ae98abde1b37f94c4dccdc162ce649ddb8b0be797c4923c5a
                                                  • Opcode Fuzzy Hash: b90ec6e9934c9ad786241fa950333c18b92a373689e58484f44e1114f265e93d
                                                  • Instruction Fuzzy Hash: 98F0C4B4E05298EFCF52CFA8D84198CFBB4AF09200F24055AE546A7352E7315912DF11
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d409f4d013277319fd66231de215d8691add704b6d7a0f7e2e4304e0c7ab4f73
                                                  • Instruction ID: dc8fe0fa23c82839abfd2cef3993942eae96f85fd50cb2ab350354b6a0e6fd91
                                                  • Opcode Fuzzy Hash: d409f4d013277319fd66231de215d8691add704b6d7a0f7e2e4304e0c7ab4f73
                                                  • Instruction Fuzzy Hash: 57F054F0A1E21DCFD790EA5589C05FC777A9B4B200F00E9A7910A97125DAB0194ACB01
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e0ca9a4c4ac8a6ee93f7347280801891c148d69cf65e4ec8e920b435164d0a39
                                                  • Instruction ID: 2b6be7aba9d0a3b53789c8056adaf85c20deac3460013d4a3c1db07408ce47a0
                                                  • Opcode Fuzzy Hash: e0ca9a4c4ac8a6ee93f7347280801891c148d69cf65e4ec8e920b435164d0a39
                                                  • Instruction Fuzzy Hash: 39E022717102154FC380ABAAD849A8E7BE5DB88A117648075F609CB394DE30DC028BA0
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0052e0ee7df22b4aa061eb636d22c7ef5da59f3390bf9d9ccfd1c21de3b5237c
                                                  • Instruction ID: 17a6279cd371b90673d45a0a92bfb25abf6ccb20c7fa6a45f0a3427fd31542c3
                                                  • Opcode Fuzzy Hash: 0052e0ee7df22b4aa061eb636d22c7ef5da59f3390bf9d9ccfd1c21de3b5237c
                                                  • Instruction Fuzzy Hash: 82E08631B00A1417D618676B9804A6BBBDEEFC9B20714C06DE45997744CD60AC0186D4
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: af45d93cf5d5096d6797e8c8c30c53f67f31c7b6cda9ac0b8ff7beb15d2b1c3f
                                                  • Instruction ID: f3a7b6f62ccf4067f36e492a296c9c044f9726cfe5cf6b4dc85041b08845cbe3
                                                  • Opcode Fuzzy Hash: af45d93cf5d5096d6797e8c8c30c53f67f31c7b6cda9ac0b8ff7beb15d2b1c3f
                                                  • Instruction Fuzzy Hash: 7FE0DFF2C0812D9B8B61AAE988048EFFF38DB0A610F224553E50062201E2B30A16CBC1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 309f5f7671dda755dd1913c5e75fe53dfaeb606ded26f1afc950f103dfdced5a
                                                  • Instruction ID: bb44c01b834021900296c19590e11428643050bff9e52dd6770ee5553c8da9ba
                                                  • Opcode Fuzzy Hash: 309f5f7671dda755dd1913c5e75fe53dfaeb606ded26f1afc950f103dfdced5a
                                                  • Instruction Fuzzy Hash: 05F03974D0020CEFCB54EFA8D40468DBBF5EB99310F00C0AAE959A7350EB345A55EF81
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d41007722694050aa50b026c773cbb093d11ac70e10d534cc88ca834a0077d8d
                                                  • Instruction ID: 9edad0d67e6f928845e1da668a4104883c031f3761933a7360f28f0c07706fb8
                                                  • Opcode Fuzzy Hash: d41007722694050aa50b026c773cbb093d11ac70e10d534cc88ca834a0077d8d
                                                  • Instruction Fuzzy Hash: 45E0C9F0B5631DCFDB90EA54C9C05FCB77AAB46204F109D97921AA6225DAB01E898B02
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 590e9c6e016ce3149bff6b41aaabefa5ffd32a25e6593411be48780936c46c61
                                                  • Instruction ID: 8bec2d52691590ae728c98bd3642bdfed275bbffd667670f16c571f32c855eb6
                                                  • Opcode Fuzzy Hash: 590e9c6e016ce3149bff6b41aaabefa5ffd32a25e6593411be48780936c46c61
                                                  • Instruction Fuzzy Hash: EAE0CD357103144F8340EB7AD40594637F9EBCCE21320C065FA09C7355DE30DC018B90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                                  • Instruction ID: 2c591220c1e4ecfbf15739fc1e16e89931b3693d81d001d8ce281d14d5c89c18
                                                  • Opcode Fuzzy Hash: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                                  • Instruction Fuzzy Hash: 3AD09EB2D0013D978B10AFE9DC054EFFF78EF05650F418126E915A7101D3715A21DBD1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d1c3ab01728e7aa78bada01479a5197aff8520746f047bab3e2b47ccb3a9bedc
                                                  • Instruction ID: 3555be26ad702f71f604a68c36aae054d76638d5357757274897bc57fe496c4a
                                                  • Opcode Fuzzy Hash: d1c3ab01728e7aa78bada01479a5197aff8520746f047bab3e2b47ccb3a9bedc
                                                  • Instruction Fuzzy Hash: 9DD05E710543889FD3855F60A81C2B53FB0EB03321F0A4196E4498E4B1C77A898CEB15
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1690efc359ff2b8743e03f3b41e18a6ca190aa15dc420aa8dc1f6be6b9c3c662
                                                  • Instruction ID: c2b4f08d739c84e79af54b4f50f5c98a31c1878e13150275fa0eeeed90b88103
                                                  • Opcode Fuzzy Hash: 1690efc359ff2b8743e03f3b41e18a6ca190aa15dc420aa8dc1f6be6b9c3c662
                                                  • Instruction Fuzzy Hash: D4D0127701E7C05EEB53A771840488AFF707A6396430A81DBD4A59F073955094299726
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9d2ec576b05238a71e2738c5d3b94001b264c525ebb7a03561a8deacc93647d8
                                                  • Instruction ID: 01651f4381cee2386ff01b6bf798e0d75c8e6347585ef053bad2cb0cf839f385
                                                  • Opcode Fuzzy Hash: 9d2ec576b05238a71e2738c5d3b94001b264c525ebb7a03561a8deacc93647d8
                                                  • Instruction Fuzzy Hash: 7CC08C710007088BD6142B94B80D3293BACAB03306F808161E10E894A08FA44844EA55
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 907c96f2e6b5d6acd6241d298d21ac19a4fd58c882494cca3adeffdd51a894af
                                                  • Instruction ID: 345b4d2c07964ea84ccb384c40ccc0c5091fdf6f5fa40d4b05bc0673f1517146
                                                  • Opcode Fuzzy Hash: 907c96f2e6b5d6acd6241d298d21ac19a4fd58c882494cca3adeffdd51a894af
                                                  • Instruction Fuzzy Hash: 42D0EAB4D28209CFCB44DF94D5556EDBBB5AB4A302F208516E41AA2244CB74AE539F40
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e491e05b79b9fb181f3393ff16e546a714a219bedfaee80f3d50ee07be1e8454
                                                  • Instruction ID: a6e242d297c7a8d789d7e61dff821e7d0db1cc2340f2881f24604bd429e13f1a
                                                  • Opcode Fuzzy Hash: e491e05b79b9fb181f3393ff16e546a714a219bedfaee80f3d50ee07be1e8454
                                                  • Instruction Fuzzy Hash: C8B092A51A4208A2909632A648D0AAE6810ABB2701B908C1B7705040808930442AA61B
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 779164a7b2dedd7522fafff441a29d74bcc2fe950ed818dd0a994c25ee1fdccf
                                                  • Instruction ID: b1ff40f8fe7420cb6c6d7849d83ee2fe96c69704dd1ab3d609848d555c3d1fa6
                                                  • Opcode Fuzzy Hash: 779164a7b2dedd7522fafff441a29d74bcc2fe950ed818dd0a994c25ee1fdccf
                                                  • Instruction Fuzzy Hash: 1FC08C70220204CFCB05CB50C1084AE7BB2FF0820A7204418E40212620C731EC02CF00
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 17d308b2dc13525d62059b2b21f2cd8e28ee327a9d62f650d650082569fcd99a
                                                  • Instruction ID: 49cdda43ac2dc4358cd21dc2e0f44b3f7c00b87c11b5e5c7d224b5533f08d942
                                                  • Opcode Fuzzy Hash: 17d308b2dc13525d62059b2b21f2cd8e28ee327a9d62f650d650082569fcd99a
                                                  • Instruction Fuzzy Hash: 17C09B34D30338CBC344E771D941C9C6796FA46600B004D3540155A0E6CB547D4B9541
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d721aaa53471fa5f9c083b7f41220b53b6a6c46c542a097cec803d63907137fe
                                                  • Instruction ID: e67bb179cbb8627e55727cc9a2e279f511959a4075b03128e1a3cb88952924f4
                                                  • Opcode Fuzzy Hash: d721aaa53471fa5f9c083b7f41220b53b6a6c46c542a097cec803d63907137fe
                                                  • Instruction Fuzzy Hash: 6FA0024795455133DB44295594913550790AB62644FE85050C41491245D41982455563
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PHq$PHq
                                                  • API String ID: 0-1274609152
                                                  • Opcode ID: 8a47063f617a7144d8c7a20e4166f4c43028526fa7b90d320df2edca47c61a01
                                                  • Instruction ID: b7487770c3c8e428a2f4f0633cafd0e029f0785d7d76592f5d551e939ad2aa26
                                                  • Opcode Fuzzy Hash: 8a47063f617a7144d8c7a20e4166f4c43028526fa7b90d320df2edca47c61a01
                                                  • Instruction Fuzzy Hash: 72D1C835B00604CFDB19DF69C998AAAB7F5BF4C701F2580A9E505AB3A1DB31AD41CF60
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Hq$T(z
                                                  • API String ID: 0-2798379001
                                                  • Opcode ID: c0e48e745615c042be4cc9ed23d536636f14d284194ba79daa8489783741a873
                                                  • Instruction ID: 544260c13cdd6897aa2c9d7bf146f2713d23bae0fd67a68da0fee0d3e08a5dee
                                                  • Opcode Fuzzy Hash: c0e48e745615c042be4cc9ed23d536636f14d284194ba79daa8489783741a873
                                                  • Instruction Fuzzy Hash: D3411A71F34209CBDB88EBB489516EF77BBFBC5600F94882BD501AB284CA308D468752
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: T(z
                                                  • API String ID: 0-3184255237
                                                  • Opcode ID: 1b06c87f296f41af539b8588fced16e92ad1087dfeed2bf739a39c8987d2e970
                                                  • Instruction ID: d11e84d4dbcc06eb2ff2c6dd56150419429e7384fcb63fa4868b2e4c9cdaab2e
                                                  • Opcode Fuzzy Hash: 1b06c87f296f41af539b8588fced16e92ad1087dfeed2bf739a39c8987d2e970
                                                  • Instruction Fuzzy Hash: 80413071F3420DCBDB98AAB58D516FFB6BBEBC9610F94882BD501BB384C9308D428751
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: T(z
                                                  • API String ID: 0-3184255237
                                                  • Opcode ID: 7019fcda9af302ccda83193bb74264d47b3abf98e3006f2238f27b70661bab18
                                                  • Instruction ID: e273c47492371c967489ae48df794463b9d67e9dcb767e018ef143b32e74b300
                                                  • Opcode Fuzzy Hash: 7019fcda9af302ccda83193bb74264d47b3abf98e3006f2238f27b70661bab18
                                                  • Instruction Fuzzy Hash: CF311271F34209CBDB98AAB58D516EFB6BBEBC9610F94C82BD501BB344C9308D428751
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ax^
                                                  • API String ID: 0-994873808
                                                  • Opcode ID: 5b4ef1d85eef60db9026aa5a4b279e5c77ca6341ea4c66aa4b0987c6ed2a2427
                                                  • Instruction ID: 5044207a8a2d72410954fc3ca0d66260a215364e342c9dcaff05119f382deb15
                                                  • Opcode Fuzzy Hash: 5b4ef1d85eef60db9026aa5a4b279e5c77ca6341ea4c66aa4b0987c6ed2a2427
                                                  • Instruction Fuzzy Hash: BD41D4B5F6420E8FCB80DF99C8959AEFBF5BB89600F198527D405EB351C274D902CBA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ax^
                                                  • API String ID: 0-994873808
                                                  • Opcode ID: 7e0f7698b5fc9d0a9186e712c88894d713cc032d3c06b078a3fb9a9a5bca8016
                                                  • Instruction ID: 71a1aa29046134b30e62bd0a548a21e67151f7b0fa459623eb977f67a5a68b29
                                                  • Opcode Fuzzy Hash: 7e0f7698b5fc9d0a9186e712c88894d713cc032d3c06b078a3fb9a9a5bca8016
                                                  • Instruction Fuzzy Hash: 8B41A3B5F6420E9FCB80DF99C8819AEF7F5BB89600F198527D505EB350D2B4D9028BA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: T(z
                                                  • API String ID: 0-3184255237
                                                  • Opcode ID: 9e3e6ac388b8050ab96493895824f81177de323515b681fc676a1d38f93fb54d
                                                  • Instruction ID: 11bd94e5dcad5f958d874da58b05f280568f0862cfc7a976ef615bd483cad158
                                                  • Opcode Fuzzy Hash: 9e3e6ac388b8050ab96493895824f81177de323515b681fc676a1d38f93fb54d
                                                  • Instruction Fuzzy Hash: DC310C75F35209CBDBD4AAB489516FF76BBEBC9600F94882BD542BB284CA308D428751
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: T(z
                                                  • API String ID: 0-3184255237
                                                  • Opcode ID: 404c3a49ac78aeb01d2708a0cf9939952775d7232cd2c1c95a1b7425f9379a5c
                                                  • Instruction ID: a2f1497babdb66cdc7648465563bb658678b63478556ca1e772bdcebc44d5fcf
                                                  • Opcode Fuzzy Hash: 404c3a49ac78aeb01d2708a0cf9939952775d7232cd2c1c95a1b7425f9379a5c
                                                  • Instruction Fuzzy Hash: C0310E71F35209CBDB94AAB449516FF76BBEBC9610F94882BD502BE284C930CD428751
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2c4d2d29da4e4acf1c075cbe1c66bcbd391f577da5ea4efcbeaf8dc5429a58a8
                                                  • Instruction ID: eea2608795ffdb900971ee95f3aa9a28d67e2eb7212ab9dfe2236ff56a4cf240
                                                  • Opcode Fuzzy Hash: 2c4d2d29da4e4acf1c075cbe1c66bcbd391f577da5ea4efcbeaf8dc5429a58a8
                                                  • Instruction Fuzzy Hash: 2FC1BC317012418FEB2ADB79C850B6BB7FAAF88604F14846DD286DB3D4DB35E902CB51
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 610a16e815f91ce608968822806c42b2e1d53c0a81017cb5309ae23e09089678
                                                  • Instruction ID: a2674015d21818c26f13ce70e50a383208d4e216a5fe68754faed0c532b69103
                                                  • Opcode Fuzzy Hash: 610a16e815f91ce608968822806c42b2e1d53c0a81017cb5309ae23e09089678
                                                  • Instruction Fuzzy Hash: CBE1C674E002198FDB15DFA9C980AAEBBF2FF89304F248169D554AB395D734AD42CF60
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f14fcd31db98b02ecef865d05245ae69e2e2e94638eff314fb46976bf4a050f2
                                                  • Instruction ID: 5592f9d0c2cfa3463d8109d481a6e8ae6f432556c3b0d34e29f2b550ee36fe37
                                                  • Opcode Fuzzy Hash: f14fcd31db98b02ecef865d05245ae69e2e2e94638eff314fb46976bf4a050f2
                                                  • Instruction Fuzzy Hash: C1E1D9B4E002198FDB54EFA9C580AAEBBB6FF89304F24815AD414AB355D734AD46CF60
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b6831d0889424392f86959aee1a79d418b819d8ea472d0c8345a11a56b66170e
                                                  • Instruction ID: 3efc4203c7a8dca24b06bad3ab6fb67d4e1533218d28337a2048ff08f50400d9
                                                  • Opcode Fuzzy Hash: b6831d0889424392f86959aee1a79d418b819d8ea472d0c8345a11a56b66170e
                                                  • Instruction Fuzzy Hash: B7E1D9B4E00219CFDB14EFA9C580AAEBBB6FF89304F24815AD414AB355D735AD46CF60
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 34c34b92db4e4f26b2fd4816d09718aa2e6d3eca57c7e066b9b988e8a86b837c
                                                  • Instruction ID: 35b3a4b54d50c0f0a503fb429b3d53b4219e951c159f2ae0b56ff092c1335995
                                                  • Opcode Fuzzy Hash: 34c34b92db4e4f26b2fd4816d09718aa2e6d3eca57c7e066b9b988e8a86b837c
                                                  • Instruction Fuzzy Hash: 93E1C7B4E00219CFDB14DFA9C580AAEBBB6FF89304F24816AD454AB355D735AD42CF60
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d98800141abf104cf61b40687b64ec300b57490b6710b73301c99b0e74e568ae
                                                  • Instruction ID: 0588a9b3028d77f07d12586ed2ceb394ed35f8bcd9d60efea7a05df1b7b06f2a
                                                  • Opcode Fuzzy Hash: d98800141abf104cf61b40687b64ec300b57490b6710b73301c99b0e74e568ae
                                                  • Instruction Fuzzy Hash: 8FE1E9B4E002198FDB14EFA9C580AAEFBB6FF89304F24815AD415AB355D734AD46CF60
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e63ddb937a24ae085a6cd8225e52ddd30e9799a666ccedf299207e3efb3b188b
                                                  • Instruction ID: 128559e2cf128f5e4b941d33bc9053460fc6f61695114e2e7f4a6a79118100ad
                                                  • Opcode Fuzzy Hash: e63ddb937a24ae085a6cd8225e52ddd30e9799a666ccedf299207e3efb3b188b
                                                  • Instruction Fuzzy Hash: 17D1E835C2075ACACB10EF65D990AD9F771FFA5200F50C79AE4497B210EB74AAC9CB81
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349290994.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1360000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: df06edd2722c517a48914229f128bff3c48a7f01383ed70f736d6d1d880f58c8
                                                  • Instruction ID: e16b8b048fbaa1989273cbe3776c838a1c5aa3910bcf279c31ef6f3e68571a0c
                                                  • Opcode Fuzzy Hash: df06edd2722c517a48914229f128bff3c48a7f01383ed70f736d6d1d880f58c8
                                                  • Instruction Fuzzy Hash: D6A1B336E00209CFCF15DFB8D85459EBBBAFF85304B15C16AE902AB269DB31D915CB40
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0b4aa96d5535a7919d7557f2635906623ac523de2d05ff2658c0d59bc725b845
                                                  • Instruction ID: 81abd9cd8a1f248fbbfe6a4a4886aa49aa603c833d043e46492d728d7e620995
                                                  • Opcode Fuzzy Hash: 0b4aa96d5535a7919d7557f2635906623ac523de2d05ff2658c0d59bc725b845
                                                  • Instruction Fuzzy Hash: 5FD1D835C2075ACACB10EFA5D990AD9F771FFA5200F50C79AE4497B210EB746AC9CB81
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1349535372.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1600000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b48ef79e9a671c13ebe8db1d9111191bc9ce35ffd7d2ff22294b3351c1a42bd2
                                                  • Instruction ID: 77aace54dc5eda0b0383614efad2c290e2a2ac826a463f1d667c7f0510e38bfd
                                                  • Opcode Fuzzy Hash: b48ef79e9a671c13ebe8db1d9111191bc9ce35ffd7d2ff22294b3351c1a42bd2
                                                  • Instruction Fuzzy Hash: 31510A70E002198FDB19DFA9C9815AEBBF2FF8A314F248169D418AB355D7319E42CF61
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2b10387710ee7f93c67bfad07990c68cbbce97dc1655c70040542ad991fe4db5
                                                  • Instruction ID: cda7d8b27c3475c755946902796c15d89f98e22f005278ea093fad9c4cbe226f
                                                  • Opcode Fuzzy Hash: 2b10387710ee7f93c67bfad07990c68cbbce97dc1655c70040542ad991fe4db5
                                                  • Instruction Fuzzy Hash: EC41C07171060DCFC750CA6DC885A9ABBF6EF86350F04882FE05ACBA64D234E942CF01
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1353231932.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7480000_SOA-Al Daleel.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bdcb2dc065279de532788a1e482fe385b8a7e8d321bd2964ebb3c2cc1823e3ca
                                                  • Instruction ID: ece6fb50fa33dee26d74223716f9cc2652113f0d34a411c6e69befba1dee7f06
                                                  • Opcode Fuzzy Hash: bdcb2dc065279de532788a1e482fe385b8a7e8d321bd2964ebb3c2cc1823e3ca
                                                  • Instruction Fuzzy Hash: 8241B17171060ACFC750DB6DC885A9ABBF6EB86350F44882FE05ACB660D234E942CF01

                                                  Execution Graph

                                                  Execution Coverage:11.9%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:3
                                                  Total number of Limit Nodes:0
                                                  execution_graph 26380 63ae259 26381 63ae2a6 GlobalMemoryStatusEx 26380->26381 26382 63ae2d6 26381->26382
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 32e0e4d9b5056eb968a9a5bbbb18fbaa9f66cd43560d65239fcf7b6a0e6b272f
                                                  • Instruction ID: 2f9a8e55001da6f6c4816055b58627552359beb83dca9b0d21621b238ba5507b
                                                  • Opcode Fuzzy Hash: 32e0e4d9b5056eb968a9a5bbbb18fbaa9f66cd43560d65239fcf7b6a0e6b272f
                                                  • Instruction Fuzzy Hash: DD632C31C10B198ADB51EF68C8846ADF7B1FF99300F15C79AE45877221EB70AAD5CB81
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ca2c8f707e3bf8e9dcaeb5b9c2537ded5999681256485eaeda6b79aeb4c04086
                                                  • Instruction ID: 3209257a294facdc513e4b6b2c5ca59a5872d17ad3e35a80b0d9b04d018a5cb1
                                                  • Opcode Fuzzy Hash: ca2c8f707e3bf8e9dcaeb5b9c2537ded5999681256485eaeda6b79aeb4c04086
                                                  • Instruction Fuzzy Hash: BE23FC31D10B198ADB11EF68C8846ADF7B1FF99300F55C79AE458B7221EB70AAC5CB41
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9b31b65b94e54a4c4d092f35576302ce6d2479713f75d1a0135769f22cd309f2
                                                  • Instruction ID: 4d434194711675be76f9862d5f79cf899ecbc503768e193c26da755489ed9f73
                                                  • Opcode Fuzzy Hash: 9b31b65b94e54a4c4d092f35576302ce6d2479713f75d1a0135769f22cd309f2
                                                  • Instruction Fuzzy Hash: B0328C74A002058FDB14DF68D584BAEBBF2FF88315F24856AE909EB3A5DA34DC45CB50
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 476d5f6471f9416cca388f39608fe3375022e1f7d13fc4138bceb563f7032901
                                                  • Instruction ID: 2182e6248b2d9468c017be16914fe753b14a2bfb99900da95656432210c1481a
                                                  • Opcode Fuzzy Hash: 476d5f6471f9416cca388f39608fe3375022e1f7d13fc4138bceb563f7032901
                                                  • Instruction Fuzzy Hash: 60B13270E002098FDF14CFA9D9897DEBBF2AF48315F18852AD415E73A4EB759846CB81
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8b547fa2ea8758e89571e4fe0a383605e1c10de1d01f426b51ec380ccc1bc989
                                                  • Instruction ID: 56a762819f574dcfaace9cd77a30bae7bb04b989c7fe47c50528636dde8e701d
                                                  • Opcode Fuzzy Hash: 8b547fa2ea8758e89571e4fe0a383605e1c10de1d01f426b51ec380ccc1bc989
                                                  • Instruction Fuzzy Hash: E4916E70E002098FDF15CFA9C9997AEBBF2BF48315F18812AE414E7364DB749845CB81

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2412 14e6ed8-14e6f42 call 14e6c40 2421 14e6f5e-14e6f8c 2412->2421 2422 14e6f44-14e6f5d call 14e6774 2412->2422 2426 14e6f8e-14e6f91 2421->2426 2428 14e6fcd-14e6fd0 2426->2428 2429 14e6f93-14e6fc8 2426->2429 2430 14e6fe4-14e6fe7 2428->2430 2431 14e6fd2-14e6fd9 2428->2431 2429->2428 2434 14e701a-14e701d 2430->2434 2435 14e6fe9-14e6ffd 2430->2435 2432 14e6fdf 2431->2432 2433 14e70eb-14e70f1 2431->2433 2432->2430 2436 14e701f call 14e790b 2434->2436 2437 14e702d-14e702f 2434->2437 2441 14e6fff-14e7001 2435->2441 2442 14e7003 2435->2442 2443 14e7025-14e7028 2436->2443 2439 14e7036-14e7039 2437->2439 2440 14e7031 2437->2440 2439->2426 2444 14e703f-14e704e 2439->2444 2440->2439 2445 14e7006-14e7015 2441->2445 2442->2445 2443->2437 2447 14e7078-14e708d 2444->2447 2448 14e7050-14e7053 2444->2448 2445->2434 2447->2433 2451 14e705b-14e7076 2448->2451 2451->2447 2451->2448
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LRq$LRq
                                                  • API String ID: 0-3710822783
                                                  • Opcode ID: 1c87eaa27d5e0289bfe68607d0c80075e232770214339b2aca4e13ff96dc5777
                                                  • Instruction ID: 067d06d65faf01110de81def8c42e86f1b7083e90a8eda4b429f1cd9330b161a
                                                  • Opcode Fuzzy Hash: 1c87eaa27d5e0289bfe68607d0c80075e232770214339b2aca4e13ff96dc5777
                                                  • Instruction Fuzzy Hash: F1519E70E002159FDB15DB69C4146AEBBF2FF8A311F10856BE405EB261DB719C46CB80

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2835 63ad56c-63ae29e 2837 63ae2a6-63ae2d4 GlobalMemoryStatusEx 2835->2837 2838 63ae2dd-63ae305 2837->2838 2839 63ae2d6-63ae2dc 2837->2839 2839->2838
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNELBASE(00000010), ref: 063AE2C7
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1370748288.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_63a0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 83f6f22ccd5a69e110d7ec60b0bc40d748dcaa0514a6fc44bf75999acbb2d853
                                                  • Instruction ID: cbbd9f4d653618cd1e2a351efc2338ee87c3298ce33a9793017436c871b7c6f7
                                                  • Opcode Fuzzy Hash: 83f6f22ccd5a69e110d7ec60b0bc40d748dcaa0514a6fc44bf75999acbb2d853
                                                  • Instruction Fuzzy Hash: 381103B1C0065A9BDB20DF9AC445BDEFBF4EB48320F10862AD918A7240D778A945CFE5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2842 63ae259-63ae2d4 GlobalMemoryStatusEx 2844 63ae2dd-63ae305 2842->2844 2845 63ae2d6-63ae2dc 2842->2845 2845->2844
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNELBASE(00000010), ref: 063AE2C7
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1370748288.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_63a0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 8d10103feecc49b38f2a90b204b5f4aba029059624b1d565782edce698b0a6d6
                                                  • Instruction ID: 681f5b7e6a95c39493c5092abc37a30ddded45e9b057cb86ec2f557a28e8ecbd
                                                  • Opcode Fuzzy Hash: 8d10103feecc49b38f2a90b204b5f4aba029059624b1d565782edce698b0a6d6
                                                  • Instruction Fuzzy Hash: D01114B1C0065A9BDB10DF9AC944BDEFBF4AF48310F15812AD818B7240D378A945CFA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PHq
                                                  • API String ID: 0-3820536768
                                                  • Opcode ID: 3a487201a6717aaac5049eb0997eb00640505db846fb662779072621da7dc123
                                                  • Instruction ID: c97013b0717acc14f983f9a9b004a0fe8d3555d4de0b101d457804fc61f06940
                                                  • Opcode Fuzzy Hash: 3a487201a6717aaac5049eb0997eb00640505db846fb662779072621da7dc123
                                                  • Instruction Fuzzy Hash: 6631FE70B002058FDB29AF39D15866F7BE2AF89611B24447ED402DB3A9DF39DC0AC791
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PHq
                                                  • API String ID: 0-3820536768
                                                  • Opcode ID: 7686ab9befd6af702e6033364205504a31cc22441a47dfb363f900f8cf03af8f
                                                  • Instruction ID: 574d69d98c4c7b7eda92ad40463423954a1aec03f951c2b1a4e54c11b5e148f9
                                                  • Opcode Fuzzy Hash: 7686ab9befd6af702e6033364205504a31cc22441a47dfb363f900f8cf03af8f
                                                  • Instruction Fuzzy Hash: 1F31BC70B002058FDB29AF39D45866F7BE2AF89601B24447AD406DB3A9DE35DC4AC791
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LRq
                                                  • API String ID: 0-3187445251
                                                  • Opcode ID: c83511b3f89afbb99d9755c7ea5d03580d490f576fac83939edcaa8e75e7ea03
                                                  • Instruction ID: f332549554dfdec90a1bd93ec0c5521d6e0efbbf7d8eeadb563d298cbcbb0281
                                                  • Opcode Fuzzy Hash: c83511b3f89afbb99d9755c7ea5d03580d490f576fac83939edcaa8e75e7ea03
                                                  • Instruction Fuzzy Hash: 88315C74E002099BDB15CF69D45479EBBF2FF85362F10852BE816EB360EB719946CB80
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LRq
                                                  • API String ID: 0-3187445251
                                                  • Opcode ID: 384771f942288edf45f9a158cd862984e2eec1072bd70fc0f84a843d6bd67b48
                                                  • Instruction ID: fa3f4a885bb8b0e5c30517d7d65f281dfbdf8d5123f0ad0e3ef34ae8e8f01f97
                                                  • Opcode Fuzzy Hash: 384771f942288edf45f9a158cd862984e2eec1072bd70fc0f84a843d6bd67b48
                                                  • Instruction Fuzzy Hash: 5A2121306083955FC302AB399424BAE3FF6EF8A610B0544EFD045CB2AAEE369C45C791
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9c8218dd26c0352cd4fcadb5701a654ec55a66129463d36a35e49b3c851785a5
                                                  • Instruction ID: 9170da2e8b31ed2659f2b34e46c2c06601a8b4479a76bfbb9acb750d37093c05
                                                  • Opcode Fuzzy Hash: 9c8218dd26c0352cd4fcadb5701a654ec55a66129463d36a35e49b3c851785a5
                                                  • Instruction Fuzzy Hash: 96125C30B052169BDB26AB7CE46862D32A3FB86652B10492AD005CF379CF75EC4BD7C1
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b9bcc5e9d8398407c83917925e579af3cf32584a39cef6c5e93fd335e86a588c
                                                  • Instruction ID: fcb6a40911f0a5a87e01f90063254f079f50699e50d367c4ac4692a97c8d1886
                                                  • Opcode Fuzzy Hash: b9bcc5e9d8398407c83917925e579af3cf32584a39cef6c5e93fd335e86a588c
                                                  • Instruction Fuzzy Hash: 90B14270E002098FDF20CFA9D9897DEBBF1AF48315F18852AD815E7364EB759846CB91
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e112d10a5e53edc99940b7bb0e349828ce49c5d9e88dde721dadb0911f1a6bd3
                                                  • Instruction ID: ba55988ca28e1ffed05433ae9b697ba0a345a9856d057c3a5eeafa6f6e7d5feb
                                                  • Opcode Fuzzy Hash: e112d10a5e53edc99940b7bb0e349828ce49c5d9e88dde721dadb0911f1a6bd3
                                                  • Instruction Fuzzy Hash: B6918F34A002149FDB15DF68D588AADBBF2FF88315F14856AE906E73A5DB34DC46CB40
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 859807fadc755cb73b8495cbd0b7a5d5cbc5107317ac65b0e336fa8a0bce0239
                                                  • Instruction ID: 0ce1af4bfebd00c81bb3da1bff5998ecdff133afea3339a343f967db5f2e4b40
                                                  • Opcode Fuzzy Hash: 859807fadc755cb73b8495cbd0b7a5d5cbc5107317ac65b0e336fa8a0bce0239
                                                  • Instruction Fuzzy Hash: 35914B70E002498FDF21CFA9D98979EBBF2BF58315F18812AE414E7364DB749846CB91
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ab8c7c0ea227051a5866a13e244c1a5f902b76673bcb2895ef6f16d0951dcb76
                                                  • Instruction ID: cfd14ea0e7397727c973b448f9cffafec420e9f52dbd1ee4dc45cb627bbb687d
                                                  • Opcode Fuzzy Hash: ab8c7c0ea227051a5866a13e244c1a5f902b76673bcb2895ef6f16d0951dcb76
                                                  • Instruction Fuzzy Hash: 8F715570D003499FEB25DFA9C488BDEBFF5BF08314F14812AE455AB260DBB59846CB90
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8e1dc62c86eb761c8dc4af476f6e25477ce59641fa2ed88d044fad08d8c980fb
                                                  • Instruction ID: 12c4a6cb030b6e7d9b8648cec2b4b2b71dad9efc7c02b94fcba076c28c54fde6
                                                  • Opcode Fuzzy Hash: 8e1dc62c86eb761c8dc4af476f6e25477ce59641fa2ed88d044fad08d8c980fb
                                                  • Instruction Fuzzy Hash: EB512470D102188FDB18CFA9C889BDEBBF1BF58311F15812AD819AB3A1D7759845CF94
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e09f2d303425ef21c21d6a7c2f42dcaf38be856e3aee8dd8b7b4fe9abf1e4ccd
                                                  • Instruction ID: 140cea1c8b063fe2a07f89aa179df44b2922b651b68c2840519a4a4bf0028474
                                                  • Opcode Fuzzy Hash: e09f2d303425ef21c21d6a7c2f42dcaf38be856e3aee8dd8b7b4fe9abf1e4ccd
                                                  • Instruction Fuzzy Hash: 04512470D002188FDB18CFA9C849B9EBBF1BF58311F55811AE819BB3A1D775A841CF95
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 12344d9c258305a5df0c8862d77f7770f7f11db763c7ca5799791c681cec982b
                                                  • Instruction ID: b0747b2050e5022bd554734bbe918f8f8dbf67f96894269ad1124bc78c3b2ebc
                                                  • Opcode Fuzzy Hash: 12344d9c258305a5df0c8862d77f7770f7f11db763c7ca5799791c681cec982b
                                                  • Instruction Fuzzy Hash: DE51CB3550325E9FD726FB38F9A8A483F63B7513053188979D1008B67EDA70692BCBD2
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a94e1f5049651d70fa9278979be31e2bd3ad78e26d39d0b9f637fb35a9583c4e
                                                  • Instruction ID: 0a195f760db16fcfd48818b46b9e22bbc8fad1636a96679347d4f7c50a369975
                                                  • Opcode Fuzzy Hash: a94e1f5049651d70fa9278979be31e2bd3ad78e26d39d0b9f637fb35a9583c4e
                                                  • Instruction Fuzzy Hash: 2C416F34A1061A9BDB19CF69D49869EBBF2BF89301F10C55AE805EB355DF31EC46CB40
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e4a62386991f42995e6e9c2d292e146a214e9e1de39938ba0baa3f6974e4725f
                                                  • Instruction ID: f857d009606a6082586985f33126f27f05c6efc76f09e15ac4cef6ee7db9226d
                                                  • Opcode Fuzzy Hash: e4a62386991f42995e6e9c2d292e146a214e9e1de39938ba0baa3f6974e4725f
                                                  • Instruction Fuzzy Hash: DB318331E002159BDB19CF69D45869EFBF2EF89314F10852AE815EB391DB71DC42C750
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4d9bc586e05db2a693741cd50c6e974bb1ee1a113e431f4da357868c480e5026
                                                  • Instruction ID: 491eed96c304051260193d1ad8afd423f730db56251872504db6a36bb86e2102
                                                  • Opcode Fuzzy Hash: 4d9bc586e05db2a693741cd50c6e974bb1ee1a113e431f4da357868c480e5026
                                                  • Instruction Fuzzy Hash: 0C41D1B0D003499FEB14DFA9C584ADEBBF5FF48310F14852AE419AB260DB759946CB90
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fa06590a9262addd28d2b4e7b037002f27bca34349805f56d26652b317e16f32
                                                  • Instruction ID: e101255ea4d1cc7e92cda4f0a3e20677c3bd753f738962d6ffcb055b5ebab6d5
                                                  • Opcode Fuzzy Hash: fa06590a9262addd28d2b4e7b037002f27bca34349805f56d26652b317e16f32
                                                  • Instruction Fuzzy Hash: C9314134E106199BCB19CFA9D49469EB7F2BF89300F10851AE815EB354DF71AC46CB40
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 424ce42ceb0666d6729eef77cab9d98cbe02f2e73e7e4bfbe70e259b6a14ac51
                                                  • Instruction ID: 9e0592c5fea547d2f65a173110c74601ebbbc2c34590beb4718a1b56d4ec3f5e
                                                  • Opcode Fuzzy Hash: 424ce42ceb0666d6729eef77cab9d98cbe02f2e73e7e4bfbe70e259b6a14ac51
                                                  • Instruction Fuzzy Hash: 8E41D1B0D0034D9FEB14DFA9C484ADEBBF5FF48310F14812AE819AB250DB759946CB90
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c6f1ccd58c752719f72f825054db4162964e5d63abe94349c0d241ddf32f2b8c
                                                  • Instruction ID: 15818957fbbc6065452651de66bd62e9c3ed963c90cbde227538f91ed127a064
                                                  • Opcode Fuzzy Hash: c6f1ccd58c752719f72f825054db4162964e5d63abe94349c0d241ddf32f2b8c
                                                  • Instruction Fuzzy Hash: 8831F634A412018FEB32673CE49C76E3BE5EB4671AF14087BD516CB37AD634884AC792
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9ecc8628cfdf945652e4e8f2233ff91eec99503b2626ebfb5d845db7733bacb3
                                                  • Instruction ID: 8fe4ed54fcc066b79feee31b139e96f258d6c72cb3d37fc2f8b1a6e687c24278
                                                  • Opcode Fuzzy Hash: 9ecc8628cfdf945652e4e8f2233ff91eec99503b2626ebfb5d845db7733bacb3
                                                  • Instruction Fuzzy Hash: EF317F31E0021A9BDF09CFA8D59469EBBB2FF89304F14851AE805EB395DB719846CB90
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5ade348e4d0ac8970cc7a8341f3b38b63f33de7da2b21d88a5ffb6df147c7e77
                                                  • Instruction ID: 8648df809ace675d1db6f892ed2fc5f829050fb2df0eb6a4abeeb983d7473856
                                                  • Opcode Fuzzy Hash: 5ade348e4d0ac8970cc7a8341f3b38b63f33de7da2b21d88a5ffb6df147c7e77
                                                  • Instruction Fuzzy Hash: 1E21A6389412154FDB22EB3CE45CB6A3BA6EB41716F140667D106CB27ED730D8568BD2
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 91a5284a0b3e809f4b315b7e73ebcec28722979c942a7cc3f64edace276ddfb8
                                                  • Instruction ID: f6dab8d3f43fd2ec8fb5b64d6f5c7b5610a318bb447d9ac7081d2c389e97b78f
                                                  • Opcode Fuzzy Hash: 91a5284a0b3e809f4b315b7e73ebcec28722979c942a7cc3f64edace276ddfb8
                                                  • Instruction Fuzzy Hash: 21217330E0021A9BDF09CFA9D49469EFBB2FF89304F14C51AE805EB395DB719842CB90
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 595e0ad883b48a3b421bbc6147d81982016ec8e8509475e443272e50027b1aa0
                                                  • Instruction ID: e885877a6dc6d800d1c9f830c8e9cfc04f8fffe91e7b2bdcd6e73cf57316d1c7
                                                  • Opcode Fuzzy Hash: 595e0ad883b48a3b421bbc6147d81982016ec8e8509475e443272e50027b1aa0
                                                  • Instruction Fuzzy Hash: AC21B171B403159FDB21AB7DA80C6AB7BE5FB89B12B110976D506CB319EA30C851C7C0
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a038c950deaae7b8bf02d0ff05cb015a5976447ef49e848e67da8fe84b351ccc
                                                  • Instruction ID: 4f9693a0a9945d7c4907af91e5d9ca68b01c790678ecd0dd571ae93094a0ad2f
                                                  • Opcode Fuzzy Hash: a038c950deaae7b8bf02d0ff05cb015a5976447ef49e848e67da8fe84b351ccc
                                                  • Instruction Fuzzy Hash: 6B214C70B40205CFEB65EB78C5587AE7BF2AF49606F10046ED106EB3A1EB369D41CB61
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a9cf341d8f2c29024099d0d9342723535f93467b184ae18df34449bd7fa32124
                                                  • Instruction ID: 3eb1b0e6f43506e1ea20dd9b78e03bb3755c97e307706c5495abe8bb3b9873f1
                                                  • Opcode Fuzzy Hash: a9cf341d8f2c29024099d0d9342723535f93467b184ae18df34449bd7fa32124
                                                  • Instruction Fuzzy Hash: 49214874740204CFCB64EF78D56CAAE7BF2EF49205B1104AAE406EB365DB769C01CBA0
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1638509c7e095131d4abc9151d883f189b6ccc1aa1adc0f603fcbd9588b3e1b9
                                                  • Instruction ID: 9e6fc4248af1352144d1231cfb615886483668063792ae2d74daaada9d8dd7cf
                                                  • Opcode Fuzzy Hash: 1638509c7e095131d4abc9151d883f189b6ccc1aa1adc0f603fcbd9588b3e1b9
                                                  • Instruction Fuzzy Hash: B6218E31B102458FEB14DB69C958BAE7BF6BF88715F24806AE505EB3A0DAB1DC40C790
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3ab97149a1fc9359c3d40eec9899fea95c20cebeec4f58941adf2c8534838e94
                                                  • Instruction ID: 4e488141c54e34b463cb2a3fbbf6b5de507643570350ba4a42f5f491edc8e1ed
                                                  • Opcode Fuzzy Hash: 3ab97149a1fc9359c3d40eec9899fea95c20cebeec4f58941adf2c8534838e94
                                                  • Instruction Fuzzy Hash: DA215330E002199BDF19CFA9D458A9EFBF2AF89304F10891AE815BB390EB70DD41CB50
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f50924a577e34c9b3affc2a891ac3506266815ca540d365a6e60ed177bab0256
                                                  • Instruction ID: cf2e65d618d956e850b6e9c3a35dcc9fd1ecafca915348b3d6b2bd2032b4659f
                                                  • Opcode Fuzzy Hash: f50924a577e34c9b3affc2a891ac3506266815ca540d365a6e60ed177bab0256
                                                  • Instruction Fuzzy Hash: 1A213D30B40209CFDB64EB78C5587AE7BF2AF49606F20046AD506EB361DF369D41CBA1
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1085a54b2225f6163d829291f3dab7e1be874a2c91d8d8f7e623502243520ea7
                                                  • Instruction ID: 176a84350d2b29e57d9e20f28ac889731debbaee66dbc076c139bd5be86e366f
                                                  • Opcode Fuzzy Hash: 1085a54b2225f6163d829291f3dab7e1be874a2c91d8d8f7e623502243520ea7
                                                  • Instruction Fuzzy Hash: 8F2162386412054FDB22EB3CE89CB1E3796E741716F104622D106CB36EDA30E8558BD2
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 109e839da169d7c5036f8e9cdb839ae347773073576bef5ca1b91afb16f90d37
                                                  • Instruction ID: a3e655b4e160c761f6318dcd69f3cd96302cd4324cc17b9a9109326b2a0e8bcf
                                                  • Opcode Fuzzy Hash: 109e839da169d7c5036f8e9cdb839ae347773073576bef5ca1b91afb16f90d37
                                                  • Instruction Fuzzy Hash: 6811B131B403169BCF22EFB884581AE7BF5EF59622B14447BD805D7311E676D8428B90
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5e5706371dbda28116dc0cf3dfff43a5d961f69a942fe482c817f7ac3770fe5d
                                                  • Instruction ID: c5fcb17df763b40aab36b83d1cd893ac89f7fd4eeb60ec0a7aa0c42433ba73bc
                                                  • Opcode Fuzzy Hash: 5e5706371dbda28116dc0cf3dfff43a5d961f69a942fe482c817f7ac3770fe5d
                                                  • Instruction Fuzzy Hash: AE212874700205CFCB64EB78D56CAAE7BF2AF89605B11046AE506EB3A5DB369D01CB90
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 289b6a664ed40d5e9ce855aba14db83f5cf49538238d52eaadb6a7f5def56ec5
                                                  • Instruction ID: fcefce0deb0a548b8d7ea05c7a8729ae5b04befbc27e8edc27d87d59464dfbcd
                                                  • Opcode Fuzzy Hash: 289b6a664ed40d5e9ce855aba14db83f5cf49538238d52eaadb6a7f5def56ec5
                                                  • Instruction Fuzzy Hash: C811C434B012059BEF265A7CD45836A37E1FB86216F10497BE066CF366DAB5CC468BC2
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f6f1bf5494bab470adbed02100c7d116ea3a504c0e3109910399c2d39e7290ce
                                                  • Instruction ID: 17edf619523efc4ec64f01c2693ef769523fe0c061a6eb20b8b62bc1c8064320
                                                  • Opcode Fuzzy Hash: f6f1bf5494bab470adbed02100c7d116ea3a504c0e3109910399c2d39e7290ce
                                                  • Instruction Fuzzy Hash: 3C11E734B002099BEF256A7DD45C72A32D5FB85216F10493BE026CF366DAB1DC868BC1
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 016677ce6aa609be722dc02e710dab0fac6382f3b6c752b54fabc65c914927b6
                                                  • Instruction ID: baa415b1f0703dcfff4e30a780a805552c6c70fed875627c11e67e6dbb616233
                                                  • Opcode Fuzzy Hash: 016677ce6aa609be722dc02e710dab0fac6382f3b6c752b54fabc65c914927b6
                                                  • Instruction Fuzzy Hash: 5F018C31F012268BCF21EFBD88585AEBBF5EB58612B24057BD805E7311E775E8428B91
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5cb893d85856f39787db777819b3f8af1d22fdc6cdcee8e5983a58073c77bdca
                                                  • Instruction ID: 9534fb10b7fdcbfe4e438ef3e9091a14e1daac5b823bc455b1aa2d025c31a1f8
                                                  • Opcode Fuzzy Hash: 5cb893d85856f39787db777819b3f8af1d22fdc6cdcee8e5983a58073c77bdca
                                                  • Instruction Fuzzy Hash: 0E01B530A002048BDB14EF55E88478EBBA5FF94311F54C265C8085F39AEB70E906C7A1
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5cce7bce6194a8832951f711f82b760db4e1dc46683141c8f8c7889e7720a6e4
                                                  • Instruction ID: d2f92263b56c77cdc86e0692a868cac128930dad57000deb9bcbb703e8347a0f
                                                  • Opcode Fuzzy Hash: 5cce7bce6194a8832951f711f82b760db4e1dc46683141c8f8c7889e7720a6e4
                                                  • Instruction Fuzzy Hash: B0018F789112199FDF05EFB5E95479D7BB2AB41200F2086AAC104AB15DEA31AE1ACB42
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7555ae6f314b5e043e87262d904717154e31715832ab11779f1973dd48f2c65f
                                                  • Instruction ID: 0a365ec58cc77efd963d51fb3aab261b7221cb83d9fe61e1440cf34f2608b328
                                                  • Opcode Fuzzy Hash: 7555ae6f314b5e043e87262d904717154e31715832ab11779f1973dd48f2c65f
                                                  • Instruction Fuzzy Hash: 3FF0C935B402089FC714DB78D568B6D77B2FF88316F514469E506DB3A8DB31AD46CB80
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.1365853839.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_14e0000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dd9fcc0c62b18390082d9e252894acc94eda128b9d404f49598e42b7bd34ee17
                                                  • Instruction ID: e9272a9b7c3e2cf0af51778631c445ace5371983ea6829e9fd9510f50f82c522
                                                  • Opcode Fuzzy Hash: dd9fcc0c62b18390082d9e252894acc94eda128b9d404f49598e42b7bd34ee17
                                                  • Instruction Fuzzy Hash: 5DF0317891121D9FDF05FFB5F954A9DBBB2AB44300F5086A9C104AB25CEA317E16CB82

                                                  Execution Graph

                                                  Execution Coverage:11.2%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:289
                                                  Total number of Limit Nodes:9
                                                  execution_graph 32523 5465770 32524 54658fb 32523->32524 32526 5465796 32523->32526 32526->32524 32527 5461fa0 32526->32527 32528 54659f0 PostMessageW 32527->32528 32529 5465a5c 32528->32529 32529->32526 32227 5462801 32229 54626a6 32227->32229 32228 5462a28 32229->32228 32233 5464586 32229->32233 32239 5464520 32229->32239 32244 5464510 32229->32244 32234 5464514 32233->32234 32236 5464589 32233->32236 32249 546488a 32234->32249 32275 5464898 32234->32275 32235 5464542 32235->32229 32236->32229 32240 546453a 32239->32240 32242 546488a 12 API calls 32240->32242 32243 5464898 12 API calls 32240->32243 32241 5464542 32241->32229 32242->32241 32243->32241 32245 546453a 32244->32245 32247 546488a 12 API calls 32245->32247 32248 5464898 12 API calls 32245->32248 32246 5464542 32246->32229 32247->32246 32248->32246 32250 5464896 32249->32250 32251 5464882 32249->32251 32252 54648bf 32250->32252 32300 5464de5 32250->32300 32304 5464ac7 32250->32304 32309 5464da6 32250->32309 32313 54654e6 32250->32313 32319 546521b 32250->32319 32333 546527d 32250->32333 32342 546507c 32250->32342 32346 546525f 32250->32346 32360 5464d7f 32250->32360 32374 54650be 32250->32374 32383 5464b50 32250->32383 32387 5465555 32250->32387 32391 5464f77 32250->32391 32396 5464ef7 32250->32396 32401 5465136 32250->32401 32406 5465309 32250->32406 32410 5464988 32250->32410 32415 546518c 32250->32415 32421 5464bc1 32250->32421 32430 5464b20 32250->32430 32439 5464c20 32250->32439 32448 5464c60 32250->32448 32251->32235 32252->32235 32276 54648ad 32275->32276 32277 54648bf 32276->32277 32278 54654e6 2 API calls 32276->32278 32279 5464da6 2 API calls 32276->32279 32280 5464ac7 2 API calls 32276->32280 32281 5464de5 2 API calls 32276->32281 32282 5464c60 4 API calls 32276->32282 32283 5464c20 4 API calls 32276->32283 32284 5464b20 4 API calls 32276->32284 32285 5464bc1 4 API calls 32276->32285 32286 546518c 2 API calls 32276->32286 32287 5464988 2 API calls 32276->32287 32288 5465309 2 API calls 32276->32288 32289 5465136 2 API calls 32276->32289 32290 5464ef7 2 API calls 32276->32290 32291 5464f77 2 API calls 32276->32291 32292 5465555 2 API calls 32276->32292 32293 5464b50 2 API calls 32276->32293 32294 54650be 4 API calls 32276->32294 32295 5464d7f 6 API calls 32276->32295 32296 546525f 6 API calls 32276->32296 32297 546507c 2 API calls 32276->32297 32298 546527d 4 API calls 32276->32298 32299 546521b 6 API calls 32276->32299 32277->32235 32278->32277 32279->32277 32280->32277 32281->32277 32282->32277 32283->32277 32284->32277 32285->32277 32286->32277 32287->32277 32288->32277 32289->32277 32290->32277 32291->32277 32292->32277 32293->32277 32294->32277 32295->32277 32296->32277 32297->32277 32298->32277 32299->32277 32457 5461c01 32300->32457 32461 5461c08 32300->32461 32301 5464e18 32305 5464acd 32304->32305 32306 5464b01 32305->32306 32465 5462290 32305->32465 32469 5462289 32305->32469 32310 5464dcf 32309->32310 32473 5461cf0 32310->32473 32477 5461cf8 32310->32477 32314 54654f4 32313->32314 32317 5461b41 VirtualAllocEx 32313->32317 32485 5461b48 32313->32485 32316 5461b48 VirtualAllocEx 32314->32316 32481 5461b41 32314->32481 32316->32314 32317->32314 32320 546522a 32319->32320 32321 5465238 32320->32321 32323 5464b29 32320->32323 32497 5461630 32321->32497 32501 5461638 32321->32501 32322 546541e 32324 5464f0e 32323->32324 32326 5464b3b 32323->32326 32489 5461581 32324->32489 32493 5461588 32324->32493 32325 5464f23 32325->32252 32327 5461cf0 ReadProcessMemory 32326->32327 32328 5461cf8 ReadProcessMemory 32326->32328 32327->32326 32328->32326 32334 5464b29 32333->32334 32335 5464b3b 32334->32335 32336 5464f0e 32334->32336 32338 5461cf0 ReadProcessMemory 32335->32338 32339 5461cf8 ReadProcessMemory 32335->32339 32340 5461581 ResumeThread 32336->32340 32341 5461588 ResumeThread 32336->32341 32337 5464f23 32337->32252 32338->32335 32339->32335 32340->32337 32341->32337 32343 546507d 32342->32343 32344 5461cf0 ReadProcessMemory 32343->32344 32345 5461cf8 ReadProcessMemory 32343->32345 32344->32343 32345->32343 32347 5464d7f 32346->32347 32348 5465238 32347->32348 32350 5464b29 32347->32350 32354 5461630 Wow64SetThreadContext 32348->32354 32355 5461638 Wow64SetThreadContext 32348->32355 32349 546541e 32351 5464f0e 32350->32351 32353 5464b3b 32350->32353 32356 5461581 ResumeThread 32351->32356 32357 5461588 ResumeThread 32351->32357 32352 5464f23 32352->32252 32358 5461cf0 ReadProcessMemory 32353->32358 32359 5461cf8 ReadProcessMemory 32353->32359 32354->32349 32355->32349 32356->32352 32357->32352 32358->32353 32359->32353 32361 5464d94 32360->32361 32362 5465238 32361->32362 32364 5464b29 32361->32364 32370 5461630 Wow64SetThreadContext 32362->32370 32371 5461638 Wow64SetThreadContext 32362->32371 32363 546541e 32365 5464f0e 32364->32365 32367 5464b3b 32364->32367 32372 5461581 ResumeThread 32365->32372 32373 5461588 ResumeThread 32365->32373 32366 5464f23 32366->32252 32368 5461cf0 ReadProcessMemory 32367->32368 32369 5461cf8 ReadProcessMemory 32367->32369 32368->32367 32369->32367 32370->32363 32371->32363 32372->32366 32373->32366 32375 54650cb 32374->32375 32378 5464b4f 32374->32378 32376 54651c7 32375->32376 32375->32378 32379 5461630 Wow64SetThreadContext 32376->32379 32380 5461638 Wow64SetThreadContext 32376->32380 32377 54651e2 32381 5461cf0 ReadProcessMemory 32378->32381 32382 5461cf8 ReadProcessMemory 32378->32382 32379->32377 32380->32377 32381->32378 32382->32378 32384 5464b68 32383->32384 32385 5461cf0 ReadProcessMemory 32384->32385 32386 5461cf8 ReadProcessMemory 32384->32386 32385->32384 32386->32384 32388 54654f4 32387->32388 32388->32387 32389 5461b41 VirtualAllocEx 32388->32389 32390 5461b48 VirtualAllocEx 32388->32390 32389->32388 32390->32388 32392 5464f7d 32391->32392 32394 5461c01 WriteProcessMemory 32392->32394 32395 5461c08 WriteProcessMemory 32392->32395 32393 5464faf 32394->32393 32395->32393 32397 5464efd 32396->32397 32399 5461581 ResumeThread 32397->32399 32400 5461588 ResumeThread 32397->32400 32398 5464f23 32398->32252 32399->32398 32400->32398 32402 546513f 32401->32402 32404 5461c01 WriteProcessMemory 32402->32404 32405 5461c08 WriteProcessMemory 32402->32405 32403 5465331 32404->32403 32405->32403 32407 5465331 32406->32407 32408 5461c01 WriteProcessMemory 32406->32408 32409 5461c08 WriteProcessMemory 32406->32409 32408->32407 32409->32407 32411 5464996 32410->32411 32413 5462290 CreateProcessA 32411->32413 32414 5462289 CreateProcessA 32411->32414 32412 5464b01 32413->32412 32414->32412 32416 5464f8e 32415->32416 32417 546538d 32416->32417 32419 5461c01 WriteProcessMemory 32416->32419 32420 5461c08 WriteProcessMemory 32416->32420 32417->32252 32418 5464faf 32419->32418 32420->32418 32422 5464b3b 32421->32422 32423 5464b29 32421->32423 32428 5461cf0 ReadProcessMemory 32422->32428 32429 5461cf8 ReadProcessMemory 32422->32429 32423->32422 32424 5464f0e 32423->32424 32426 5461581 ResumeThread 32424->32426 32427 5461588 ResumeThread 32424->32427 32425 5464f23 32425->32252 32426->32425 32427->32425 32428->32422 32429->32422 32431 5464b29 32430->32431 32432 5464b3b 32431->32432 32433 5464f0e 32431->32433 32435 5461cf0 ReadProcessMemory 32432->32435 32436 5461cf8 ReadProcessMemory 32432->32436 32437 5461581 ResumeThread 32433->32437 32438 5461588 ResumeThread 32433->32438 32434 5464f23 32434->32252 32435->32432 32436->32432 32437->32434 32438->32434 32442 5464b29 32439->32442 32440 5464f0e 32446 5461581 ResumeThread 32440->32446 32447 5461588 ResumeThread 32440->32447 32441 5464f23 32441->32252 32442->32439 32442->32440 32443 5464b3b 32442->32443 32444 5461cf0 ReadProcessMemory 32443->32444 32445 5461cf8 ReadProcessMemory 32443->32445 32444->32443 32445->32443 32446->32441 32447->32441 32449 5464f0e 32448->32449 32451 5464b29 32448->32451 32455 5461581 ResumeThread 32449->32455 32456 5461588 ResumeThread 32449->32456 32450 5464f23 32450->32252 32451->32449 32452 5464b3b 32451->32452 32453 5461cf0 ReadProcessMemory 32452->32453 32454 5461cf8 ReadProcessMemory 32452->32454 32453->32452 32454->32452 32455->32450 32456->32450 32458 5461c08 WriteProcessMemory 32457->32458 32460 5461ca7 32458->32460 32460->32301 32462 5461c50 WriteProcessMemory 32461->32462 32464 5461ca7 32462->32464 32464->32301 32466 5462319 CreateProcessA 32465->32466 32468 54624db 32466->32468 32470 5462290 CreateProcessA 32469->32470 32472 54624db 32470->32472 32474 5461cf8 ReadProcessMemory 32473->32474 32476 5461d87 32474->32476 32476->32310 32478 5461d43 ReadProcessMemory 32477->32478 32480 5461d87 32478->32480 32480->32310 32482 5461b48 VirtualAllocEx 32481->32482 32484 5461bc5 32482->32484 32484->32314 32486 5461b88 VirtualAllocEx 32485->32486 32488 5461bc5 32486->32488 32488->32314 32490 5461588 ResumeThread 32489->32490 32492 54615f9 32490->32492 32492->32325 32494 54615c8 ResumeThread 32493->32494 32496 54615f9 32494->32496 32496->32325 32498 5461637 Wow64SetThreadContext 32497->32498 32500 54616c5 32498->32500 32500->32322 32502 546167d Wow64SetThreadContext 32501->32502 32504 54616c5 32502->32504 32504->32322 32530 164d01c 32531 164d034 32530->32531 32532 164d08e 32531->32532 32537 58e1a98 32531->32537 32542 58e2818 32531->32542 32547 58e2808 32531->32547 32552 58e1aa8 32531->32552 32538 58e1aa8 32537->32538 32540 58e2808 2 API calls 32538->32540 32541 58e2818 2 API calls 32538->32541 32539 58e1aef 32539->32532 32540->32539 32541->32539 32544 58e2845 32542->32544 32543 58e2877 32544->32543 32557 58e2d88 32544->32557 32562 58e2da8 32544->32562 32548 58e2845 32547->32548 32549 58e2877 32548->32549 32550 58e2d88 2 API calls 32548->32550 32551 58e2da8 2 API calls 32548->32551 32550->32549 32551->32549 32553 58e1ace 32552->32553 32555 58e2808 2 API calls 32553->32555 32556 58e2818 2 API calls 32553->32556 32554 58e1aef 32554->32532 32555->32554 32556->32554 32558 58e2dbc 32557->32558 32567 58e2e50 32558->32567 32570 58e2e60 32558->32570 32559 58e2e48 32559->32543 32564 58e2dbc 32562->32564 32563 58e2e48 32563->32543 32565 58e2e50 2 API calls 32564->32565 32566 58e2e60 2 API calls 32564->32566 32565->32563 32566->32563 32568 58e2e71 32567->32568 32573 58e4021 32567->32573 32568->32559 32571 58e2e71 32570->32571 32572 58e4021 2 API calls 32570->32572 32571->32559 32572->32571 32577 58e4050 32573->32577 32581 58e4040 32573->32581 32574 58e403a 32574->32568 32578 58e4092 32577->32578 32580 58e4099 32577->32580 32579 58e40ea CallWindowProcW 32578->32579 32578->32580 32579->32580 32580->32574 32582 58e4050 32581->32582 32583 58e40ea CallWindowProcW 32582->32583 32584 58e4099 32582->32584 32583->32584 32584->32574 32505 58e09c0 32506 58e09eb 32505->32506 32507 58e0a9a 32506->32507 32509 58e1792 32506->32509 32510 58e175a 32509->32510 32511 58e179a 32509->32511 32510->32507 32511->32510 32511->32511 32515 58e18e5 32511->32515 32519 58e18f0 32511->32519 32516 58e18f0 CreateWindowExW 32515->32516 32518 58e1a14 32516->32518 32520 58e1958 CreateWindowExW 32519->32520 32522 58e1a14 32520->32522

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1265 5462289-5462325 1268 5462327-5462331 1265->1268 1269 546235e-546237e 1265->1269 1268->1269 1270 5462333-5462335 1268->1270 1276 54623b7-54623e6 1269->1276 1277 5462380-546238a 1269->1277 1271 5462337-5462341 1270->1271 1272 5462358-546235b 1270->1272 1274 5462345-5462354 1271->1274 1275 5462343 1271->1275 1272->1269 1274->1274 1278 5462356 1274->1278 1275->1274 1283 546241f-54624d9 CreateProcessA 1276->1283 1284 54623e8-54623f2 1276->1284 1277->1276 1279 546238c-546238e 1277->1279 1278->1272 1281 5462390-546239a 1279->1281 1282 54623b1-54623b4 1279->1282 1285 546239e-54623ad 1281->1285 1286 546239c 1281->1286 1282->1276 1297 54624e2-5462568 1283->1297 1298 54624db-54624e1 1283->1298 1284->1283 1287 54623f4-54623f6 1284->1287 1285->1285 1288 54623af 1285->1288 1286->1285 1289 54623f8-5462402 1287->1289 1290 5462419-546241c 1287->1290 1288->1282 1292 5462406-5462415 1289->1292 1293 5462404 1289->1293 1290->1283 1292->1292 1294 5462417 1292->1294 1293->1292 1294->1290 1308 546256a-546256e 1297->1308 1309 5462578-546257c 1297->1309 1298->1297 1308->1309 1310 5462570 1308->1310 1311 546257e-5462582 1309->1311 1312 546258c-5462590 1309->1312 1310->1309 1311->1312 1313 5462584 1311->1313 1314 5462592-5462596 1312->1314 1315 54625a0-54625a4 1312->1315 1313->1312 1314->1315 1316 5462598 1314->1316 1317 54625b6-54625bd 1315->1317 1318 54625a6-54625ac 1315->1318 1316->1315 1319 54625d4 1317->1319 1320 54625bf-54625ce 1317->1320 1318->1317 1322 54625d5 1319->1322 1320->1319 1322->1322
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 054624C6
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 6c43bd4d46e14b0edd930ad8b3a4941f3c078f0f2cb3bba91dd29968d77d87b4
                                                  • Instruction ID: 47054561cff5f0738b73a31dc5def546a9d52c44557e28bf221228664cec44ba
                                                  • Opcode Fuzzy Hash: 6c43bd4d46e14b0edd930ad8b3a4941f3c078f0f2cb3bba91dd29968d77d87b4
                                                  • Instruction Fuzzy Hash: 7B916E75D043199FDB24DF68C845BEEBBB2BF44310F1485AAD809A7240DBB49985CF92

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1323 5462290-5462325 1325 5462327-5462331 1323->1325 1326 546235e-546237e 1323->1326 1325->1326 1327 5462333-5462335 1325->1327 1333 54623b7-54623e6 1326->1333 1334 5462380-546238a 1326->1334 1328 5462337-5462341 1327->1328 1329 5462358-546235b 1327->1329 1331 5462345-5462354 1328->1331 1332 5462343 1328->1332 1329->1326 1331->1331 1335 5462356 1331->1335 1332->1331 1340 546241f-54624d9 CreateProcessA 1333->1340 1341 54623e8-54623f2 1333->1341 1334->1333 1336 546238c-546238e 1334->1336 1335->1329 1338 5462390-546239a 1336->1338 1339 54623b1-54623b4 1336->1339 1342 546239e-54623ad 1338->1342 1343 546239c 1338->1343 1339->1333 1354 54624e2-5462568 1340->1354 1355 54624db-54624e1 1340->1355 1341->1340 1344 54623f4-54623f6 1341->1344 1342->1342 1345 54623af 1342->1345 1343->1342 1346 54623f8-5462402 1344->1346 1347 5462419-546241c 1344->1347 1345->1339 1349 5462406-5462415 1346->1349 1350 5462404 1346->1350 1347->1340 1349->1349 1351 5462417 1349->1351 1350->1349 1351->1347 1365 546256a-546256e 1354->1365 1366 5462578-546257c 1354->1366 1355->1354 1365->1366 1367 5462570 1365->1367 1368 546257e-5462582 1366->1368 1369 546258c-5462590 1366->1369 1367->1366 1368->1369 1370 5462584 1368->1370 1371 5462592-5462596 1369->1371 1372 54625a0-54625a4 1369->1372 1370->1369 1371->1372 1373 5462598 1371->1373 1374 54625b6-54625bd 1372->1374 1375 54625a6-54625ac 1372->1375 1373->1372 1376 54625d4 1374->1376 1377 54625bf-54625ce 1374->1377 1375->1374 1379 54625d5 1376->1379 1377->1376 1379->1379
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 054624C6
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 4d1fba2ce2cff709975e73d9ea8ef9d6ca4f32329dda9c8a028e47b0143da2d8
                                                  • Instruction ID: b98dc096c6a682da879ba7414cdc98dfe561f69648ca01e1de9ecad47bc9b767
                                                  • Opcode Fuzzy Hash: 4d1fba2ce2cff709975e73d9ea8ef9d6ca4f32329dda9c8a028e47b0143da2d8
                                                  • Instruction Fuzzy Hash: 23916E75D04319DFDB24DF68C845BEEBBB2BF48310F1485AAD809A7240DBB49985CF92

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1380 58e18e5-58e1956 1382 58e1958-58e195e 1380->1382 1383 58e1961-58e1968 1380->1383 1382->1383 1384 58e196a-58e1970 1383->1384 1385 58e1973-58e1a12 CreateWindowExW 1383->1385 1384->1385 1387 58e1a1b-58e1a53 1385->1387 1388 58e1a14-58e1a1a 1385->1388 1392 58e1a55-58e1a58 1387->1392 1393 58e1a60 1387->1393 1388->1387 1392->1393 1394 58e1a61 1393->1394 1394->1394
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 058E1A02
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399856542.00000000058E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_58e0000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: a9d1ed37888c12c4f94247d171b24febead93171cccf8ad676452b5ddbd66312
                                                  • Instruction ID: 13ac85dce85db8fe05dbaf246dcd6c66d7c9bd4efb5a5a999f9517de571ca6ee
                                                  • Opcode Fuzzy Hash: a9d1ed37888c12c4f94247d171b24febead93171cccf8ad676452b5ddbd66312
                                                  • Instruction Fuzzy Hash: 5E51C0B1D00349DFDB14CFA9C885ADEFBB6BF49310F24812AE819AB210D7759945CF90

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1395 58e18f0-58e1956 1396 58e1958-58e195e 1395->1396 1397 58e1961-58e1968 1395->1397 1396->1397 1398 58e196a-58e1970 1397->1398 1399 58e1973-58e1a12 CreateWindowExW 1397->1399 1398->1399 1401 58e1a1b-58e1a53 1399->1401 1402 58e1a14-58e1a1a 1399->1402 1406 58e1a55-58e1a58 1401->1406 1407 58e1a60 1401->1407 1402->1401 1406->1407 1408 58e1a61 1407->1408 1408->1408
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 058E1A02
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399856542.00000000058E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_58e0000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: 7b3a97b05ec25bd013e5e298c484b09e81592d155a40cb9964f1c0af002f4b77
                                                  • Instruction ID: a486ddc40dc3cdce58c8c034d097dcd9ec4f0ef1ca361e7236cc35a79021f106
                                                  • Opcode Fuzzy Hash: 7b3a97b05ec25bd013e5e298c484b09e81592d155a40cb9964f1c0af002f4b77
                                                  • Instruction Fuzzy Hash: 2E41B0B1D00349DFDB14CF99C884ADEFBB6BF49310F64812AE819AB210D775A985CF90

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1409 58e4050-58e408c 1410 58e413c-58e415c 1409->1410 1411 58e4092-58e4097 1409->1411 1417 58e415f-58e416c 1410->1417 1412 58e40ea-58e4122 CallWindowProcW 1411->1412 1413 58e4099-58e40d0 1411->1413 1414 58e412b-58e413a 1412->1414 1415 58e4124-58e412a 1412->1415 1419 58e40d9-58e40e8 1413->1419 1420 58e40d2-58e40d8 1413->1420 1414->1417 1415->1414 1419->1417 1420->1419
                                                  APIs
                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 058E4111
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399856542.00000000058E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_58e0000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: CallProcWindow
                                                  • String ID:
                                                  • API String ID: 2714655100-0
                                                  • Opcode ID: fa78658d005cc8120f926ba59f71808741706c2e28ff3ded2e028f5edfab4da4
                                                  • Instruction ID: f0df4fadfd9c9c3a07900561b0515856e6a64c0a31ad447de80bae71e9449a69
                                                  • Opcode Fuzzy Hash: fa78658d005cc8120f926ba59f71808741706c2e28ff3ded2e028f5edfab4da4
                                                  • Instruction Fuzzy Hash: 38414BB8900309CFCB14DF99C848AAABBF6FF89314F25C458D519A7321D375A841CFA0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1423 5461c01-5461c56 1426 5461c66-5461ca5 WriteProcessMemory 1423->1426 1427 5461c58-5461c64 1423->1427 1429 5461ca7-5461cad 1426->1429 1430 5461cae-5461cde 1426->1430 1427->1426 1429->1430
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05461C98
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: 91c9913788c61dee7481232d18caf079c693b6e7e2172b840cc0cef210cd14aa
                                                  • Instruction ID: 12648c159959e314e96fc373944e7165d2bf031866f748350d53d45b0677640b
                                                  • Opcode Fuzzy Hash: 91c9913788c61dee7481232d18caf079c693b6e7e2172b840cc0cef210cd14aa
                                                  • Instruction Fuzzy Hash: 89214875D003499FDB10DFAAC885BEEBBF5FF48310F50842AE919A7240C7789941CBA5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1434 5461c08-5461c56 1436 5461c66-5461ca5 WriteProcessMemory 1434->1436 1437 5461c58-5461c64 1434->1437 1439 5461ca7-5461cad 1436->1439 1440 5461cae-5461cde 1436->1440 1437->1436 1439->1440
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05461C98
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: 6eae2789eee3fa017cf9350a1685f53c0a1eeaeb5fc64f0427ec18a02915c2cd
                                                  • Instruction ID: a10f14bbf5146c8bf9839be9e1fefddee513cc041050f83bb6b95965aa652675
                                                  • Opcode Fuzzy Hash: 6eae2789eee3fa017cf9350a1685f53c0a1eeaeb5fc64f0427ec18a02915c2cd
                                                  • Instruction Fuzzy Hash: B02125B5D003499FDB10DFAAC885BEEBBF5FF48310F50842AE919A7240C7789941CBA5
                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05461D78
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: cd27dc114c8854e39f923a5787cf529e6b5ee69155c61b1c2dbfab2d6aaae29a
                                                  • Instruction ID: 8e2c96bf2183dd130a6b860172c5b62b66d2b72b75f6cda6aaf1a30364a046de
                                                  • Opcode Fuzzy Hash: cd27dc114c8854e39f923a5787cf529e6b5ee69155c61b1c2dbfab2d6aaae29a
                                                  • Instruction Fuzzy Hash: 1A212571C003499FDB10DFAAC881BEEBBF5FF48310F54842AE919A3250C739A901CBA5
                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 054616B6
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: 4bd36cfbfee12725f3c4a9494b87c923f652adb51dc8472f3315da615aa6cb17
                                                  • Instruction ID: 22c465234421bd03f7d5c82500dab859474f2d51d2dc955b563515126b9548da
                                                  • Opcode Fuzzy Hash: 4bd36cfbfee12725f3c4a9494b87c923f652adb51dc8472f3315da615aa6cb17
                                                  • Instruction Fuzzy Hash: 492187B5C003098FDB10DFA9C4857EEBBF5AF48210F14842AD459A7241CB789941CFA1
                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05461D78
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 735722071bf67560d072c8c7a0dfa9ec20d188ad16fb8aaea06b72091b32106c
                                                  • Instruction ID: ff8ee41ee633ee59739891a8977b0875fd71c9f74652eef1587f98dc28cbcf14
                                                  • Opcode Fuzzy Hash: 735722071bf67560d072c8c7a0dfa9ec20d188ad16fb8aaea06b72091b32106c
                                                  • Instruction Fuzzy Hash: 04211471C003499FDB10DFAAC881BEEBBF5FF48310F54842AE919A7250C779A941CBA5
                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 054616B6
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: 418cd5ace3ea9ca5aef59655ecf808f0da8512658995d37cc815219f3a04e986
                                                  • Instruction ID: ae2dc9e6c5bd8749f8ab74a1502456d56d460f7cfdb6a348b88600bd982c22bf
                                                  • Opcode Fuzzy Hash: 418cd5ace3ea9ca5aef59655ecf808f0da8512658995d37cc815219f3a04e986
                                                  • Instruction Fuzzy Hash: 9A213475D003098FDB10DFAAC485BEEBBF5AF48220F54842AD419A7241CB78A945CFA5
                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05461BB6
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 877d8bdf53d9cac5a1b2078c0b2ef0bb401c68eb097cabfd3a626c3c3f9155fa
                                                  • Instruction ID: 9e02d44ca2de1dbd3c7aea591f3e0c9b965c7f7cd5bde51d255230d3160cdd63
                                                  • Opcode Fuzzy Hash: 877d8bdf53d9cac5a1b2078c0b2ef0bb401c68eb097cabfd3a626c3c3f9155fa
                                                  • Instruction Fuzzy Hash: 26118975C003498FDB20DFAAC844BDEBBF5EF48320F14841AE925A7240CB35A541CFA0
                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05461BB6
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 2be7296f7d89c03fec3fe262b14e3d257faa6451b96ca3db331bb05e315f137b
                                                  • Instruction ID: 129c6f17883da0946f41cfa4aefd298d6fe5eb0135ca5cf3a95e0b2aea99b5e0
                                                  • Opcode Fuzzy Hash: 2be7296f7d89c03fec3fe262b14e3d257faa6451b96ca3db331bb05e315f137b
                                                  • Instruction Fuzzy Hash: AD112675C003499FDB20DFAAC845BDEBBF5EF88320F14841AE529A7250CB75A941CFA1
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 7fb076ab98acbe7b872b255886e3509eb74e4460e181db4b5293991df57860cd
                                                  • Instruction ID: 32ae0a55ec0b5d1d76825455fc1cc3c18f1c537f6b66dde4f9f75ecfe83b9c1d
                                                  • Opcode Fuzzy Hash: 7fb076ab98acbe7b872b255886e3509eb74e4460e181db4b5293991df57860cd
                                                  • Instruction Fuzzy Hash: 91115875C003488FDB20DFAAC8457EEFBF5EB48220F24841AD519A7240CB75A941CF95
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 010ebbb6d47b3192dfd9e786bd7b60a079eec6ba7b1291f52864fa7d1db46d4a
                                                  • Instruction ID: 7e834fbb21212a4eb4a7d9478363c8a4b22c9a076bab58d31a67f8ada09c5d38
                                                  • Opcode Fuzzy Hash: 010ebbb6d47b3192dfd9e786bd7b60a079eec6ba7b1291f52864fa7d1db46d4a
                                                  • Instruction Fuzzy Hash: C8112575D003498FDB20DFAAC8457DEFBF5AB88220F24841AD519A7240CB79A941CFA5
                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 05465A4D
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: 5773efa7872b24bc24af06321eeeaf2663d50e1ed76bca34a20ddfaed74320b2
                                                  • Instruction ID: 082d24f124a4c21078776e31b9776ad7288f3dc4ca9011fdb4d42fe79a632154
                                                  • Opcode Fuzzy Hash: 5773efa7872b24bc24af06321eeeaf2663d50e1ed76bca34a20ddfaed74320b2
                                                  • Instruction Fuzzy Hash: FF11E0B58003499FDB20DF9AC885BDEBBF8EB48320F10841AE519A7241C375A944CFA5
                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 05465A4D
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1399637151.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_5460000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: dd7243cd87df0a95a2feab715b5d68f20e762cfe683cdf722a6ae51b7c34fcda
                                                  • Instruction ID: aa9ba1aa8506711a757e3cb0485a562af2725cd277492d721c544e13cfb79183
                                                  • Opcode Fuzzy Hash: dd7243cd87df0a95a2feab715b5d68f20e762cfe683cdf722a6ae51b7c34fcda
                                                  • Instruction Fuzzy Hash: B11103B98003499FDB10DF9AD885BDEFBF8EB48320F14841AE558A7700C375AA45CFA5
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1382092548.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_163d000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 672651c8d0601cc9a92f4cdc1ccf7735126d5a5560b481f76e2579b6a422cb40
                                                  • Instruction ID: 1ae1ef9898474d735b870a78792a632e16e1fed85f998c56b2b0566c80e0714d
                                                  • Opcode Fuzzy Hash: 672651c8d0601cc9a92f4cdc1ccf7735126d5a5560b481f76e2579b6a422cb40
                                                  • Instruction Fuzzy Hash: 2A21CFB2604240EFDB15DF54D9C0B26BF66FBC8328F64C569E9090A296C336D456CAA2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1382092548.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_163d000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 77b837649014baa8886fa4110121bb7d0f2f21f14f7a0eaa0624323421216254
                                                  • Instruction ID: 3f0c75c73eb6918f853b6b0b31094caaf52f5b21e3a665058777a22f98b955bd
                                                  • Opcode Fuzzy Hash: 77b837649014baa8886fa4110121bb7d0f2f21f14f7a0eaa0624323421216254
                                                  • Instruction Fuzzy Hash: FE21F171604204DFDB15DF54D9C0B5ABB65FBD8324F60C169E90A0B357C336E856CBA2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1382166709.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_164d000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ee7af6b978a29a436e010bcf22790feb58e28e995e835b9025cd1fb21badb2ad
                                                  • Instruction ID: 363932589aa7fac6891f685cf6832bfcef87411ed30cd89dc1f4a9a6c94e5206
                                                  • Opcode Fuzzy Hash: ee7af6b978a29a436e010bcf22790feb58e28e995e835b9025cd1fb21badb2ad
                                                  • Instruction Fuzzy Hash: D721F271A04200EFDB15DF94D9C4B26BBA5FB94324F20C6ADEA494B396C336D847CA61
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1382166709.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_164d000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 270fc7c807cfcb4bcfb54a57d141a6ffef8d376b5e2e1b60bc0a3e5b6c542147
                                                  • Instruction ID: 98d9830518701a9c69aa1b96e79df67415273a5b9907080dce381d684ad0107b
                                                  • Opcode Fuzzy Hash: 270fc7c807cfcb4bcfb54a57d141a6ffef8d376b5e2e1b60bc0a3e5b6c542147
                                                  • Instruction Fuzzy Hash: 3721F275A04300DFDB15DF94D9C4B16BB65EB94B14F20C5ADD84A4B386C33AD847CA62
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1382092548.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_163d000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                  • Instruction ID: 7f288e6d8e9a9af046c0aa29870d05936ec1d67b23db34e739b56fc914ea8ee3
                                                  • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                  • Instruction Fuzzy Hash: AB11B176504280DFCB16CF54D9C4B16BF72FB84324F24C6A9D8490B697C336D456CBA1
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1382092548.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_163d000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                  • Instruction ID: 51ae4b0cd909fe24c7b5fdfd27f5a4a7fabe4be39deaf8b5fd9be9d9e5e29895
                                                  • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                  • Instruction Fuzzy Hash: D611DCB6504280DFCB06CF54D9C0B56BF72FB84324F24C2A9D8490B257C33AE45ACBA2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1382166709.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_164d000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                  • Instruction ID: 7f684a1958e63487303f224c4642d12b49b6f3dbba5afc02f81cc982fbe9d429
                                                  • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                  • Instruction Fuzzy Hash: DF11BE75904280CFCB16CF54D9C4B15BB62FB44714F24C6ADD8494B796C33AD40ACB61
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1382166709.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_164d000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                  • Instruction ID: 9598c7b8b52cf0bfd92c681aeff0a8343b1656b251fce5f40f707d7410a27752
                                                  • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                  • Instruction Fuzzy Hash: C011BB75904280DFCB06DF54C9C4B16BBA2FB84324F24C6ADD9494B396C33AD40ACB61
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1382092548.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_163d000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3bcd261c9112641c89834c50127fe403ae9b7e1e52693862d1b44b3fad324e1a
                                                  • Instruction ID: c7a9b201e2a940fe90203c3946b9c254355dd3c72d1832d4361fcfe10c132f9f
                                                  • Opcode Fuzzy Hash: 3bcd261c9112641c89834c50127fe403ae9b7e1e52693862d1b44b3fad324e1a
                                                  • Instruction Fuzzy Hash: 220126714083809FE7224AA5CCC4B77FFA8DF81621F58C41AED080B387C338A841CAB2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.1382092548.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_163d000_eeXxnIpy.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 75215646e480dd84db2b28de546e01d58e0e63d56558691b79aa23f6b6ee4e37
                                                  • Instruction ID: 1fc25b9a9eaf7acdb8ff0818084d53cc941c3d79e1df96adbd9ed9b004d771f7
                                                  • Opcode Fuzzy Hash: 75215646e480dd84db2b28de546e01d58e0e63d56558691b79aa23f6b6ee4e37
                                                  • Instruction Fuzzy Hash: E0F06D71405384AEE7258A5ADC84B62FFA8EF91635F18C55AED084B387C379A844CAB1

                                                  Execution Graph

                                                  Execution Coverage:11.5%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:19
                                                  Total number of Limit Nodes:4
                                                  execution_graph 26861 1220848 26863 122084e 26861->26863 26862 122091b 26863->26862 26865 122137f 26863->26865 26866 1221383 26865->26866 26867 1221480 26866->26867 26869 1227090 26866->26869 26867->26863 26870 122709a 26869->26870 26871 12270b4 26870->26871 26874 5f4cf57 26870->26874 26879 5f4cf68 26870->26879 26871->26866 26876 5f4cf68 26874->26876 26875 5f4d192 26875->26871 26876->26875 26877 5f4d5c0 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 26876->26877 26878 5f4d578 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 26876->26878 26877->26876 26878->26876 26881 5f4cf7d 26879->26881 26880 5f4d192 26880->26871 26881->26880 26882 5f4d5c0 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 26881->26882 26883 5f4d578 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 26881->26883 26882->26881 26883->26881
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a29b8214e3de1fd2050200cfe4dea8d19b26331e8fc3969737df0dad82df6c4e
                                                  • Instruction ID: 1931b961fb2a30ecfa743700e16954421ffb8b77b9eb16ce65ebd8ec0ec4a487
                                                  • Opcode Fuzzy Hash: a29b8214e3de1fd2050200cfe4dea8d19b26331e8fc3969737df0dad82df6c4e
                                                  • Instruction Fuzzy Hash: 7653F731C10B1A9ADB51EF68C8805ADF7B1FF99300F15C79AE4597B121EB70AAD4CB81
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b09c97b397ab88bb3f5d1452689f25d31049c7406c73eec6792a361ea5a0c503
                                                  • Instruction ID: aefa98f360b5d979ddb1d9f053af2ab1ff66bd7db7deb7e666ba0b3953e3e76f
                                                  • Opcode Fuzzy Hash: b09c97b397ab88bb3f5d1452689f25d31049c7406c73eec6792a361ea5a0c503
                                                  • Instruction Fuzzy Hash: 91230D31D10B1A9EDB11EF68C8806ADF7B1FF99300F55C79AE458A7211EB70AAC5CB41
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f15bc176ee9ded7e47e9749ef917fb8ea073c00cecc0db99631947fffa7b92f2
                                                  • Instruction ID: d8545c1938c54bee041639284a12713354e76ef474671c338d763c165ea793b8
                                                  • Opcode Fuzzy Hash: f15bc176ee9ded7e47e9749ef917fb8ea073c00cecc0db99631947fffa7b92f2
                                                  • Instruction Fuzzy Hash: 4E327B34A102259FDF24DF68D580BADBBB2FB88314F248569E90ADB355DB71DC81CB50
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cc0dd74aa0dac490f9d2d52ba1d63e3aa7465ca1dd72acafa51980d66205a3d6
                                                  • Instruction ID: d36593efddf5110cc31a2ae52c889987efcaa94bf71e1aa3aa6cc1efc3217aae
                                                  • Opcode Fuzzy Hash: cc0dd74aa0dac490f9d2d52ba1d63e3aa7465ca1dd72acafa51980d66205a3d6
                                                  • Instruction Fuzzy Hash: 30B17E70E1026A9FDB24DFADD8817DDBFF2AF48314F148129D914E7294EB749881CB81
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3be3dfde1e0e45c1e71acf311d603f3f49ee8f8af086b847a45fa1e4af9cc7b4
                                                  • Instruction ID: 29db64d963673d77f8c2e9f5bb30d96dcabd1fcc721895bcaeda94a0c362f438
                                                  • Opcode Fuzzy Hash: 3be3dfde1e0e45c1e71acf311d603f3f49ee8f8af086b847a45fa1e4af9cc7b4
                                                  • Instruction Fuzzy Hash: 32917E70E1035AAFDB24DFA8D885BDDBFF2BF58304F248129E505A7254DB789885CB81

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2368 1226ed8-1226f42 call 1226c40 2377 1226f44-1226f5d call 122637c 2368->2377 2378 1226f5e-1226f8c 2368->2378 2382 1226f8e-1226f91 2378->2382 2384 1226f93-1226fc8 2382->2384 2385 1226fcd-1226fd0 2382->2385 2384->2385 2386 1226fd2-1226fd9 2385->2386 2387 1226fe4-1226fe7 2385->2387 2390 12270eb-12270f1 2386->2390 2391 1226fdf 2386->2391 2388 122701a-122701d 2387->2388 2389 1226fe9-1226ffd 2387->2389 2392 122701f call 122790b 2388->2392 2393 122702d-122702f 2388->2393 2398 1227003 2389->2398 2399 1226fff-1227001 2389->2399 2391->2387 2400 1227025-1227028 2392->2400 2395 1227031 2393->2395 2396 1227036-1227039 2393->2396 2395->2396 2396->2382 2397 122703f-122704e 2396->2397 2403 1227050-1227053 2397->2403 2404 1227078-122708d 2397->2404 2401 1227006-1227015 2398->2401 2399->2401 2400->2393 2401->2388 2407 122705b-1227076 2403->2407 2404->2390 2407->2403 2407->2404
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LRq$LRq
                                                  • API String ID: 0-3710822783
                                                  • Opcode ID: 316bf8c8b0358a956c0bffa22a9d6dc60daac0b3ac604fdb814377d6093ee698
                                                  • Instruction ID: 4b2a2825ebe676338cea2dcedd8d1de7b91f583b8682d7cda85ebd2f6624914f
                                                  • Opcode Fuzzy Hash: 316bf8c8b0358a956c0bffa22a9d6dc60daac0b3ac604fdb814377d6093ee698
                                                  • Instruction Fuzzy Hash: CC41C431E202259FDB15DFB8C4517AEBBB2FF89300F20846AE406EB291EB759D45CB40

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2789 5f4e188-5f4e193 2790 5f4e195-5f4e1bc call 5f4d560 2789->2790 2791 5f4e1bd-5f4e1dc call 5f4d56c 2789->2791 2797 5f4e1e2-5f4e226 2791->2797 2798 5f4e1de-5f4e1e1 2791->2798 2803 5f4e22d-5f4e22e 2797->2803 2804 5f4e228-5f4e22b 2797->2804 2805 5f4e235-5f4e241 2803->2805 2806 5f4e230 2803->2806 2804->2803 2808 5f4e247-5f4e2d4 GlobalMemoryStatusEx 2805->2808 2809 5f4e243-5f4e246 2805->2809 2806->2805 2812 5f4e2d6-5f4e2dc 2808->2812 2813 5f4e2dd-5f4e305 2808->2813 2812->2813
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2573657250.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_5f40000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f09f9eef51726b137091f11948af3f6d7b81f478f0096b632bdbf2a210acbf65
                                                  • Instruction ID: 4316f6fdd00955e3cdf18c378ef8932c32bdb02366356779083332b2e6fc63a5
                                                  • Opcode Fuzzy Hash: f09f9eef51726b137091f11948af3f6d7b81f478f0096b632bdbf2a210acbf65
                                                  • Instruction Fuzzy Hash: CE413272E143558FCB14DFA9D8007AEBFF5BF89210F14866AD509E7390DB389941CB91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2816 5f4d578 2817 5f4d57d-5f4d582 2816->2817 2818 5f4d584-5f4d586 2817->2818 2819 5f4d589-5f4d5a0 2817->2819 2818->2819 2821 5f4d5a2-5f4d5b8 2819->2821 2822 5f4d55d-5f4d55e 2819->2822 2823 5f4d563 2821->2823 2827 5f4d5ba-5f4d5df 2821->2827 2822->2823 2825 5f4d565-5f4d567 2823->2825 2826 5f4d56a-5f4d56f 2823->2826 2825->2826 2829 5f4d576 2826->2829 2830 5f4d571-5f4e29e 2826->2830 2832 5f4d5e1-5f4d5e4 2827->2832 2829->2816 2833 5f4e2a6-5f4e2d4 GlobalMemoryStatusEx 2830->2833 2834 5f4d5f4-5f4d5f7 2832->2834 2835 5f4d5e6-5f4d5f3 2832->2835 2836 5f4e2d6-5f4e2dc 2833->2836 2837 5f4e2dd-5f4e305 2833->2837 2838 5f4d60d-5f4d610 2834->2838 2839 5f4d5f9-5f4d5ff 2834->2839 2836->2837 2842 5f4d637-5f4d63a 2838->2842 2843 5f4d612-5f4d616 call 5f4d374 2838->2843 2840 5f4d601 2839->2840 2841 5f4d608 2839->2841 2840->2841 2840->2843 2847 5f4d719-5f4d71f 2840->2847 2848 5f4d67b-5f4d67d 2840->2848 2841->2838 2844 5f4d653-5f4d656 2842->2844 2845 5f4d63c-5f4d650 2842->2845 2851 5f4d61b-5f4d632 2843->2851 2854 5f4d676-5f4d679 2844->2854 2855 5f4d658-5f4d671 call 5f4d384 2844->2855 2845->2844 2852 5f4d747-5f4d74a 2847->2852 2853 5f4d721-5f4d73f 2847->2853 2893 5f4d67f call 5f4d828 2848->2893 2894 5f4d67f call 5f4d80b 2848->2894 2851->2842 2891 5f4d74c call 5f4e150 2852->2891 2892 5f4d74c call 5f4e141 2852->2892 2853->2852 2854->2848 2856 5f4d68d-5f4d690 2854->2856 2855->2854 2856->2835 2861 5f4d696-5f4d699 2856->2861 2857 5f4d685-5f4d68c 2859 5f4d752-5f4d7b9 2864 5f4d6a3-5f4d6a6 2861->2864 2865 5f4d69b-5f4d69e 2861->2865 2869 5f4d6ac-5f4d6b7 2864->2869 2870 5f4d7cf-5f4d7d1 2864->2870 2865->2864 2878 5f4d6f2-5f4d705 2869->2878 2879 5f4d6b9-5f4d6f0 2869->2879 2873 5f4d7d3 2870->2873 2874 5f4d7d8-5f4d7db 2870->2874 2873->2874 2874->2832 2875 5f4d7e1-5f4d7eb 2874->2875 2880 5f4d707-5f4d70b 2878->2880 2879->2880 2882 5f4d716 2880->2882 2883 5f4d70d 2880->2883 2882->2847 2883->2882 2891->2859 2892->2859 2893->2857 2894->2857
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2573657250.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_5f40000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 39b04933699ec1b9d42498e2838c94a4d17a8f4a8138a2b32d5f87aad68968bb
                                                  • Instruction ID: 0a995f016e0f84cb22745476aba4019b955d005eec4cba3843a5ab4496f89415
                                                  • Opcode Fuzzy Hash: 39b04933699ec1b9d42498e2838c94a4d17a8f4a8138a2b32d5f87aad68968bb
                                                  • Instruction Fuzzy Hash: CE41F272C183999FDB11DF69D8406DABFB4FF06224F04846AD404EB242E7785805CFE5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2895 5f4d56c-5f4e2d4 GlobalMemoryStatusEx 2898 5f4e2d6-5f4e2dc 2895->2898 2899 5f4e2dd-5f4e305 2895->2899 2898->2899
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,05F4E1DA), ref: 05F4E2C7
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2573657250.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_5f40000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 22a9e55b89bd4ca783d6d8256921bd70d5453c8f3a8ee30a788132cde7c4608e
                                                  • Instruction ID: 5712d54385619bf20305fbd7f15cf8a640f9b86992e9a6ee29d479cd88190f24
                                                  • Opcode Fuzzy Hash: 22a9e55b89bd4ca783d6d8256921bd70d5453c8f3a8ee30a788132cde7c4608e
                                                  • Instruction Fuzzy Hash: DC1117B1C106599BCB10DF9AC445BDEFBF4FF48320F10856AD918A7240D778A941CFA5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2902 5f4e259-5f4e29e 2904 5f4e2a6-5f4e2d4 GlobalMemoryStatusEx 2902->2904 2905 5f4e2d6-5f4e2dc 2904->2905 2906 5f4e2dd-5f4e305 2904->2906 2905->2906
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,05F4E1DA), ref: 05F4E2C7
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2573657250.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_5f40000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 74285670a2b2df5442ab49285f2dee0252d85830f835e19cb091dedc2011a816
                                                  • Instruction ID: 2a04eda7a29bcabc76b56d0ef499c1e85d8158fa98459953353e55c66f08203e
                                                  • Opcode Fuzzy Hash: 74285670a2b2df5442ab49285f2dee0252d85830f835e19cb091dedc2011a816
                                                  • Instruction Fuzzy Hash: 051103B1C1065A9BCB10DF9AC445BDEFBF4BF48320F14812AD918A7240D778A9418FA5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PHq
                                                  • API String ID: 0-3820536768
                                                  • Opcode ID: 114a5b2499d3ffd102b0be407aeb1e8227e2ffd011ae7f4ace7239b004bb4147
                                                  • Instruction ID: ee0e4b05614287ed159e1c7bc23308fb5d68290ddf79fd33b9e6e95bfae019d6
                                                  • Opcode Fuzzy Hash: 114a5b2499d3ffd102b0be407aeb1e8227e2ffd011ae7f4ace7239b004bb4147
                                                  • Instruction Fuzzy Hash: 3C31FC31B102169FDB29AB38D65476E3BB2EB88600F24446DE502DB3A5DF71DC06CB90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PHq
                                                  • API String ID: 0-3820536768
                                                  • Opcode ID: 7beaf7e04862024600d89e2744e90fb323f14cb0f0d4c807b31a9c57894d59c4
                                                  • Instruction ID: ac7762bf64e7859aa6193068278b0eb1db4643e6b182209ba68681ad34f3f080
                                                  • Opcode Fuzzy Hash: 7beaf7e04862024600d89e2744e90fb323f14cb0f0d4c807b31a9c57894d59c4
                                                  • Instruction Fuzzy Hash: BF31FC31B0021A9FDB29AB39D65476E7BF2AF88700F244469D502DB395DE71EC06C790
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LRq
                                                  • API String ID: 0-3187445251
                                                  • Opcode ID: 28603f3fbbd231cd9302dffec5374bc4713463c74e93fcdbe235ab7abdcd1f19
                                                  • Instruction ID: d039d896f921d6b371d0a57cb3479c1573d9f2dbbda5061054b6b25b446fb689
                                                  • Opcode Fuzzy Hash: 28603f3fbbd231cd9302dffec5374bc4713463c74e93fcdbe235ab7abdcd1f19
                                                  • Instruction Fuzzy Hash: D731A835E2021A9FDF15CFA9C450B9EB7B2FF85300F508515E905EB240EB759D45CB40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LRq
                                                  • API String ID: 0-3187445251
                                                  • Opcode ID: 532cc18c817ba6969266dc12e1ce415da32ee66409042f7b05bead1e47d516e1
                                                  • Instruction ID: cc8c062e6312be7dcf63aedcffeb84e0e82cec3d925cf1918e5629126d8be061
                                                  • Opcode Fuzzy Hash: 532cc18c817ba6969266dc12e1ce415da32ee66409042f7b05bead1e47d516e1
                                                  • Instruction Fuzzy Hash: FB11E0326082805FD301AB78D424B6E7FB6AF86710B1484AED046CB396DE3698058796
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5d1fd9e6264f8368c4bb1ba4d3a16c7d63a601066fd4150d3444c7866bc9f846
                                                  • Instruction ID: b1e27de1aa22007f967247b3536dce42f7487a040e23c1e28df4e8f9ee5c1f9d
                                                  • Opcode Fuzzy Hash: 5d1fd9e6264f8368c4bb1ba4d3a16c7d63a601066fd4150d3444c7866bc9f846
                                                  • Instruction Fuzzy Hash: 07126D347202129FDB26AB38E49562C37A3EBC9355B604A39E105CF356CF75ED4B8B81
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9c581bdecb84008ebfd7f9362f0453a07ae095b160e5262c44f4d57f9220311a
                                                  • Instruction ID: 8ff360ad8d82c26984e28206fb43362ca3165fdab56834a0520e5b1f35b0d907
                                                  • Opcode Fuzzy Hash: 9c581bdecb84008ebfd7f9362f0453a07ae095b160e5262c44f4d57f9220311a
                                                  • Instruction Fuzzy Hash: DBA15F70E2026A9FDB25DFACD8817DDBFF1AF48314F148129D914E7294EB749885CB81
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1f7c943e3465633135720d0fea4e815d48a369df8015260283a20804df54a94e
                                                  • Instruction ID: 59baa622dd055ba3d6b086e3d6d63105c7e0e7fb91db0d1893e3cc5f8e92982d
                                                  • Opcode Fuzzy Hash: 1f7c943e3465633135720d0fea4e815d48a369df8015260283a20804df54a94e
                                                  • Instruction Fuzzy Hash: 5491AF34A102259FDF24DF68D580AADBBF2EF88315F148429E906D7355DB31EC82CB40
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 52ce490a37ac260c480071f96289b9e44543c49964a562f86c8447583d5ef4cb
                                                  • Instruction ID: 15ada904f763c84920239747a9a63b1aa10a3e7ec248cc2e562cfd8db4a71847
                                                  • Opcode Fuzzy Hash: 52ce490a37ac260c480071f96289b9e44543c49964a562f86c8447583d5ef4cb
                                                  • Instruction Fuzzy Hash: 3A917F70E1025AEFDB24DFA8D885BDDBFF2BF58304F248129E505A7254DB789885CB81
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 86cba95208b036f939b3bad1418e7df4428271fc66abcc5f961f7960c50c322a
                                                  • Instruction ID: 4e6738a06dca80281204cb8e21e28d473e3eae4ffdd8f90bf88ed36b3658bbc0
                                                  • Opcode Fuzzy Hash: 86cba95208b036f939b3bad1418e7df4428271fc66abcc5f961f7960c50c322a
                                                  • Instruction Fuzzy Hash: 38818670D10359EFEB25CFA9C880BEEBFB0AF08310F148059E915AB250DB76984ACF51
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 31fe1c2f67ada68c470f991748a176557a80f941b1a5cea35f38226ffa5fc297
                                                  • Instruction ID: 7138c709d9695ea3def06ef753e41f1e62efc27945eb9e771bb3336b1eca7f18
                                                  • Opcode Fuzzy Hash: 31fe1c2f67ada68c470f991748a176557a80f941b1a5cea35f38226ffa5fc297
                                                  • Instruction Fuzzy Hash: BD718E70E2039A9FDB14DFA9C8807DEBFF2BF88314F148129E515A7254DB749841CB95
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 49a5a5243441e3a62533e2ac1b1bd20262c74459d3cbe131203410ce1a59fe51
                                                  • Instruction ID: c718cc5c49b03dabb8cd9be3a6710622c590d5d683d7b38f8ba05554b9a00873
                                                  • Opcode Fuzzy Hash: 49a5a5243441e3a62533e2ac1b1bd20262c74459d3cbe131203410ce1a59fe51
                                                  • Instruction Fuzzy Hash: 2B719C70E2039AAFDB24DFA9C8807DEBFF1AF48314F148129E514AB254DB749841CF95
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4ab603316bfc3dc91af7c6f04ffc4e31c07c0d58c167360f907fdf264f4519e8
                                                  • Instruction ID: 071a3cc88502adefae2693368a88188cc180255de8cc11926b8618e6803c9357
                                                  • Opcode Fuzzy Hash: 4ab603316bfc3dc91af7c6f04ffc4e31c07c0d58c167360f907fdf264f4519e8
                                                  • Instruction Fuzzy Hash: 20513471D202299FDB18CFA9C885B9DBBF1BF48310F158129E815BB351DB74A880CF95
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ec08bdb52a731ac432bb07c901eead26bc4cf33dbdbddcb10888a684cf87bdf5
                                                  • Instruction ID: 0058404f3db4e23c7eaa1b3c221df2785d381952643b05d74e56a3ab7013ead8
                                                  • Opcode Fuzzy Hash: ec08bdb52a731ac432bb07c901eead26bc4cf33dbdbddcb10888a684cf87bdf5
                                                  • Instruction Fuzzy Hash: 8D513471D202299FDB18CFA9C885B9DBBF1BF48310F14812AE815BB351D774A884CF95
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4f0bda9a69aa56f4dd05291011bd9d8975a7a17315a1c5cb4242e3105342b185
                                                  • Instruction ID: c2f0b9eaac4f46dd7358f64365e31c32bcc42112656f72c9c4ec2a9ea365ba4b
                                                  • Opcode Fuzzy Hash: 4f0bda9a69aa56f4dd05291011bd9d8975a7a17315a1c5cb4242e3105342b185
                                                  • Instruction Fuzzy Hash: 985150742212568FCF36FB29FE809453FA1B7D930D3448969D1085FA7EDB742A4ACB81
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: df33827144c56e371d8fb5d229878d678753815e1a6ac2bab399b554cdf26102
                                                  • Instruction ID: 4049dae8d66c6c9a33f687440264827dd5f459c25c8af17fda6b7a735069267b
                                                  • Opcode Fuzzy Hash: df33827144c56e371d8fb5d229878d678753815e1a6ac2bab399b554cdf26102
                                                  • Instruction Fuzzy Hash: BB515E742212468FCF36FB29FE809453FA1B7D930D3448969D1085FA7EDB742A4ACB81
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2e54aa733f1f9e98250de9972d78d8922d78fbb8adec102dca5aa5ecbe699e4d
                                                  • Instruction ID: e68073743d414cf78bb3ba71587e5ffb173643ec07536e564bb06a2aee3b0eee
                                                  • Opcode Fuzzy Hash: 2e54aa733f1f9e98250de9972d78d8922d78fbb8adec102dca5aa5ecbe699e4d
                                                  • Instruction Fuzzy Hash: 4F31E630E102369BDF09CF69D45569EBBB2EF85314F20862AE805EB341DB71DC86CB50
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4dcf61a13a1a097ec2e138740c0ebfe626b061b9c3743c54c38cbb770b9b2c92
                                                  • Instruction ID: cdb2d917f2faeeb0964fa52dd8f9cce5dcc45feb6a64d2333d277b0bca06e034
                                                  • Opcode Fuzzy Hash: 4dcf61a13a1a097ec2e138740c0ebfe626b061b9c3743c54c38cbb770b9b2c92
                                                  • Instruction Fuzzy Hash: 8D316E35E206169BCB19CFA8D59569EBBB6BF8A310F10C529E805E7355EB70EC41CB40
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5c38281ed2167cffce50cb4e56b82e073e97735a33060f8b1055f39512c413c7
                                                  • Instruction ID: 03125eb9a6af8c87c8d2b7b1ba6494eccf0c7b05f1e0e398f72b88345845215e
                                                  • Opcode Fuzzy Hash: 5c38281ed2167cffce50cb4e56b82e073e97735a33060f8b1055f39512c413c7
                                                  • Instruction Fuzzy Hash: FA316035E206169BCB19CFA9D55569EBBF2BF8A310F10C629E805EB355EF70AC41CB40
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b9fb00821877085253f9d0bc37ec400f96fecc94c21492e14eb33b83d5b3a9c6
                                                  • Instruction ID: 110676cea4fd40fe5935c59552a6728c031684fe841800f942248de13b1dafa6
                                                  • Opcode Fuzzy Hash: b9fb00821877085253f9d0bc37ec400f96fecc94c21492e14eb33b83d5b3a9c6
                                                  • Instruction Fuzzy Hash: 6341FEB0D10349DFEB24DFA9C480ADEBFB1FF48310F10842AE819AB250DB759946CB91
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 544a8a9fd7b12da110b7667f39b8a09711c2a7e34bee159bb2f41c87007b091e
                                                  • Instruction ID: b6eca12b1a6693dba77ad8f9f8b1303f8ba068a6e45d7dde32977bdf9c0bcedb
                                                  • Opcode Fuzzy Hash: 544a8a9fd7b12da110b7667f39b8a09711c2a7e34bee159bb2f41c87007b091e
                                                  • Instruction Fuzzy Hash: 6441EEB0D10349EFEB14DFA9C480A9EBBB5BF48310F108029E919AB250DB75A946CB91
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 585ed862952313d7e5b442da2d60e48142162b4c2e15aec3b45642eac5494659
                                                  • Instruction ID: 2a792b82b8bb07fb5ed49838921d15d580114712fcb43d0079c875e09e4b4919
                                                  • Opcode Fuzzy Hash: 585ed862952313d7e5b442da2d60e48142162b4c2e15aec3b45642eac5494659
                                                  • Instruction Fuzzy Hash: E931A231E102269BDF05CF68D49079EFBB2FF8A314F50C229E905EB245DB709881CB90
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2c5e926b619af81655834e268af36d0db2e067341b1704f5881e790838ac528b
                                                  • Instruction ID: c1c2e9c529632aadd3644fdbe13c047809c9069155d3c682b4ebc2434670bf36
                                                  • Opcode Fuzzy Hash: 2c5e926b619af81655834e268af36d0db2e067341b1704f5881e790838ac528b
                                                  • Instruction Fuzzy Hash: 14217330E102269BDF15CFA9D48169EF7B2FF89304F50C629E905EB245DB719885CB50
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7b1ee9d9f5f383cdcae09bc1970d85936792646ec839176dc1199577a8e1af19
                                                  • Instruction ID: 9c908448cb0aba8988bc3be5bb35d2084eede6540dcbd56ac3bdf28318158445
                                                  • Opcode Fuzzy Hash: 7b1ee9d9f5f383cdcae09bc1970d85936792646ec839176dc1199577a8e1af19
                                                  • Instruction Fuzzy Hash: 39210B306301226BDB32536CE485F7D3B63E741315F504829E64AC7786DA3DC896C782
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fef275469f0e8be0911d778887ea43a63086dfa04ea6677d17e322fcdf787236
                                                  • Instruction ID: 0eedcec9dc21b1ba77b1d9b9603ba926b9ff8378f7a42310e35aefa690802a87
                                                  • Opcode Fuzzy Hash: fef275469f0e8be0911d778887ea43a63086dfa04ea6677d17e322fcdf787236
                                                  • Instruction Fuzzy Hash: EC2198385302115FDF36EB28E944F6D3795EB88319F548A20D10ACB65BDB38D8568BD1
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 84241631b62b63dcc5fa34e0d86789fcb7c8e0617f7b463cce935114f1ec953e
                                                  • Instruction ID: 34ffc4f9afd263f13f234c7add5b66a0a0a463264f177badc6600056c763cd5d
                                                  • Opcode Fuzzy Hash: 84241631b62b63dcc5fa34e0d86789fcb7c8e0617f7b463cce935114f1ec953e
                                                  • Instruction Fuzzy Hash: 92211930710219DFDB64EB78D959AAD7BF1EF8D204B104469E506EB364DF3A9E00CB91
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2564378322.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_e7d000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ca19342be922b31c2f096b3a357aeaad9e2158495dc7b822baea0878a345767a
                                                  • Instruction ID: 2235681166d6fbcec270752d0d4b4434a561cc42d964e45771e30f8974b1239a
                                                  • Opcode Fuzzy Hash: ca19342be922b31c2f096b3a357aeaad9e2158495dc7b822baea0878a345767a
                                                  • Instruction Fuzzy Hash: 7021D071608204DFDB14DF14DD84B26BBB6EF84318F24D569D84E5A296C336D847CA62
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2564378322.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_e7d000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3d2d720a61965986131831cb0de9d8f7328cb8c1cbef9db8046940305688b0fb
                                                  • Instruction ID: 53956425c71e2f1b127a354cc69add38ab562882d35cc6b5190b9f3d6949b1ee
                                                  • Opcode Fuzzy Hash: 3d2d720a61965986131831cb0de9d8f7328cb8c1cbef9db8046940305688b0fb
                                                  • Instruction Fuzzy Hash: 7021397150D3C09FCB078B24D994711BF71AF46214F29C5EBD8898F2A7C23A981ACB62
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 569191572470bf83e05e299fc03311ceb9e2b315ef6b79a9a52856b34a69f278
                                                  • Instruction ID: 32b641b093c0add5e637e38bfcdb4121fefaf703ac633b6a70cb2a3f867943f5
                                                  • Opcode Fuzzy Hash: 569191572470bf83e05e299fc03311ceb9e2b315ef6b79a9a52856b34a69f278
                                                  • Instruction Fuzzy Hash: F0218630E1022A9BDF09CF69D45469EB7B2AF49314F10861AE815B7351DB719985CB50
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 87ddb63819fdc8a3eadf02bfbe1d9793c3741a94ce80bc8fce6a4ce2c367e198
                                                  • Instruction ID: ccda1621387ecaaef96344d8283a7e7c4f73f685febc6ded27f8296fb4662b5f
                                                  • Opcode Fuzzy Hash: 87ddb63819fdc8a3eadf02bfbe1d9793c3741a94ce80bc8fce6a4ce2c367e198
                                                  • Instruction Fuzzy Hash: D6218E30B202669FEF25EB78C554BAD7BF2AF49204F10046ED506EB260DF768D51CB61
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: afdd9277caa34793acc14ceb466e847725464190e7672aeed40350452a675856
                                                  • Instruction ID: de9a355b8f91e52ec97762d6835e72fba513b1c244e329b500638c5a828ec81a
                                                  • Opcode Fuzzy Hash: afdd9277caa34793acc14ceb466e847725464190e7672aeed40350452a675856
                                                  • Instruction Fuzzy Hash: 6B216D30B202269FEF24EB78C554BAE77F2AF89204F200469D506EB350DF369D51CBA1
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 25492287dd213f26cf76a12c3e9bc501ba465e2f66914818b92671ca239661f0
                                                  • Instruction ID: a5a51978665bd14a2de2e1078b9eb53e753b948ac24cf3ccc4c4b9159245b3f6
                                                  • Opcode Fuzzy Hash: 25492287dd213f26cf76a12c3e9bc501ba465e2f66914818b92671ca239661f0
                                                  • Instruction Fuzzy Hash: 69218A385302115FDF36EB28E944F6D3795EB89319F508920D109CB65ADB38D8558BD1
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 88bc990b42fcef1f4df6cf826d48ee827b9b40402014f083fb65702942fdd958
                                                  • Instruction ID: 4e07f5c3f30ee05f9d18b0ab34308394fe9a64a69c0579cde04380ad5200591f
                                                  • Opcode Fuzzy Hash: 88bc990b42fcef1f4df6cf826d48ee827b9b40402014f083fb65702942fdd958
                                                  • Instruction Fuzzy Hash: 4E213930710219DFDB64EB78D958AAD7BF1EF8D204B104469E506EB3A0DF3A9E00CB90
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3d53591ea91bd8a613b18b5853dc2ac3ab30a7ef6dfe9cb892a4f8e8e04b24a6
                                                  • Instruction ID: f0ca651a6f6245724266bb6dea5fc56ac708dbf518c9ebbea69e6caa21d729a7
                                                  • Opcode Fuzzy Hash: 3d53591ea91bd8a613b18b5853dc2ac3ab30a7ef6dfe9cb892a4f8e8e04b24a6
                                                  • Instruction Fuzzy Hash: FF11E730B20226ABEF256A7DD44473F3696EB85214F11493AF106CF342DEA5CC858BC6
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a14b026d2eed8637c1d27536c104827037e2c2ac6acd0c40266611a1d27ac025
                                                  • Instruction ID: a3fd1dc157fc1877c0dbcc446e0a1138e0a8c833c9daf204fcc49eee11b73fb6
                                                  • Opcode Fuzzy Hash: a14b026d2eed8637c1d27536c104827037e2c2ac6acd0c40266611a1d27ac025
                                                  • Instruction Fuzzy Hash: 09112C31F30226BBEF266A79D40137F3692DB85214F11843AF106CF243E9A5CC418BC6
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e96e5d71f766223e4b352a5397b91e455515d5f80918fa0cfc6877217acb80db
                                                  • Instruction ID: 7da11b7495c6e5cd72a907df3c09c69337efcdc11f2b111c134790680fb123ad
                                                  • Opcode Fuzzy Hash: e96e5d71f766223e4b352a5397b91e455515d5f80918fa0cfc6877217acb80db
                                                  • Instruction Fuzzy Hash: E511A071F20321AFDF14AE799905A6E3FE6FB88650B104825EA06D7348EF34C9128791
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4c769a60eb4dee8322d12a4d1ec47f0f9ae02b44dc01a317ad84030c4c68e9a1
                                                  • Instruction ID: 1dc27006806d5a3f9566f4e2fdf4f6734d46589b8c9bb8e70c5043565d7c1ab5
                                                  • Opcode Fuzzy Hash: 4c769a60eb4dee8322d12a4d1ec47f0f9ae02b44dc01a317ad84030c4c68e9a1
                                                  • Instruction Fuzzy Hash: 3D11A131E20226AFCF21EFBC9450AAE7BF5FB58210B14047AD505E7301EB35D952CB94
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 04905504874dc85b6da9813fcca9815eb49e6a1ccbf3308ff38eeeb2499d0e78
                                                  • Instruction ID: 925632387e841fb19d0c6177c6e207931225b116a16a871badd2d8dcb96ca744
                                                  • Opcode Fuzzy Hash: 04905504874dc85b6da9813fcca9815eb49e6a1ccbf3308ff38eeeb2499d0e78
                                                  • Instruction Fuzzy Hash: C4018031E21226AFCF21EFBC94509AE7BF5EB48210B14047AD505E7301EB35D951CB95
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 12730fe72cdfb3abb4d634d3d24210c4dbdc912f3f9e08b7827690bc74aed394
                                                  • Instruction ID: f15c79ecac533208af794c8ddd9a921ad62c46e00a683c3b7ead6ad3134ee125
                                                  • Opcode Fuzzy Hash: 12730fe72cdfb3abb4d634d3d24210c4dbdc912f3f9e08b7827690bc74aed394
                                                  • Instruction Fuzzy Hash: 8501B5349103589FCB51EB78E94069D7FF1AB45304F5086A8D004AF18FEE356A05DB42
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: af583d5e57399797f2bb3a368af90937a29bbf85f404f08e3e78a65934de08da
                                                  • Instruction ID: 846b6451c05e3804c2353a05fe468f287c963d66742cb90a42284426c1eb6ba9
                                                  • Opcode Fuzzy Hash: af583d5e57399797f2bb3a368af90937a29bbf85f404f08e3e78a65934de08da
                                                  • Instruction Fuzzy Hash: AFF08B33A24131EFCB228BA8A4909BC7F70FE5821171C00D7D946DB210C635D422C701
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ba206a34863232aa8512086c3c49f983f5bacc2b4a7389b7a728bd8d5498c15b
                                                  • Instruction ID: 2f4158e3600d92227ddf407df53c301558e29b77e3884b717d0326b623494d69
                                                  • Opcode Fuzzy Hash: ba206a34863232aa8512086c3c49f983f5bacc2b4a7389b7a728bd8d5498c15b
                                                  • Instruction Fuzzy Hash: 00F0B239B102188FC714DB68D5A8B6C7BB2EF88355F5144A8E5069B3A4DF35AD46CB40
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.2565889838.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1220000_MSBuild.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 81e3472bcd52fd227a1b627365e5d6d414634bebfb5a375344ea48b086cae4ea
                                                  • Instruction ID: bb466446049b8ddfb056167dab570d2d5ba210fc858b6a02fef04014dd9f31aa
                                                  • Opcode Fuzzy Hash: 81e3472bcd52fd227a1b627365e5d6d414634bebfb5a375344ea48b086cae4ea
                                                  • Instruction Fuzzy Hash: 4FF031349202189FDB51FFB5F94169DBBF1AB44304F9086A8C008AB25AEE357E09CB81