Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Game Laucher.exe

Overview

General Information

Sample name:Game Laucher.exe
Analysis ID:1469270
MD5:b24f58bb4315dfa0c7efe2cb18bed37d
SHA1:e3e00c86534ea4095f45820fc5d9d59641832058
SHA256:a71b560afb99073078fa82e00143a8db8b93ed79e3dc228880f696c109bddc89
Tags:exe
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Njrat
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Creates autorun.inf (USB autostart)
Creates autostart registry keys with suspicious names
Drops PE files to the startup folder
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
PE file contains section with special chars
PE file has nameless sections
Protects its processes via BreakOnTermination flag
Sigma detected: New RUN Key Pointing to Suspicious Folder
Tries to detect sandboxes and other dynamic analysis tools (window names)
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Yara signature match

Classification

  • System is w10x64
  • Game Laucher.exe (PID: 2748 cmdline: "C:\Users\user\Desktop\Game Laucher.exe" MD5: B24F58BB4315DFA0C7EFE2CB18BED37D)
    • windows process.exe (PID: 5880 cmdline: "C:\Users\user\AppData\Local\Temp\windows process.exe" MD5: B24F58BB4315DFA0C7EFE2CB18BED37D)
      • netsh.exe (PID: 1672 cmdline: netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\windows process.exe" "windows process.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 2788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • taskkill.exe (PID: 4932 cmdline: taskkill /F /IM explorer.exe MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
        • conhost.exe (PID: 7092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "2.tcp.eu.ngrok.io", "Port": "16943", "Version": "im523", "Campaign ID": "NLQ WORK", "Install Name": "windows process.exe", "Install Dir": "TEMP"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
    00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x6e2e:$a1: get_Registry
    • 0x7920:$a3: Download ERROR
    • 0x7c12:$a5: netsh firewall delete allowedprogram "
    00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x7b08:$a1: netsh firewall add allowedprogram
    • 0x7d02:$b1: [TAP]
    • 0x7ca8:$b2: & exit
    • 0x7c74:$c1: md.exe /k ping 0 & del
    00000002.00000002.4662154451.0000000003F41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      Process Memory Space: Game Laucher.exe PID: 2748JoeSecurity_NjratYara detected NjratJoe Security
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        0.2.Game Laucher.exe.30000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
          0.2.Game Laucher.exe.30000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x722e:$a1: get_Registry
          • 0x7d20:$a3: Download ERROR
          • 0x8012:$a5: netsh firewall delete allowedprogram "
          0.2.Game Laucher.exe.30000.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
          • 0x7f08:$a1: netsh firewall add allowedprogram
          • 0x8102:$b1: [TAP]
          • 0x80a8:$b2: & exit
          • 0x8074:$c1: md.exe /k ping 0 & del
          0.2.Game Laucher.exe.30000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
          • 0x8012:$s1: netsh firewall delete allowedprogram
          • 0x7f08:$s2: netsh firewall add allowedprogram
          • 0x8072:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
          • 0x7cfc:$s4: Execute ERROR
          • 0x7d5c:$s4: Execute ERROR
          • 0x7d20:$s5: Download ERROR
          • 0x80b8:$s6: [kl]

          System Summary

          barindex
          Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: "C:\Users\user\AppData\Local\Temp\windows process.exe" .., EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\windows process.exe, ProcessId: 5880, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b0eb5dd3a6fc209e7aa02e6880775930
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Local\Temp\windows process.exe" .., EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\windows process.exe, ProcessId: 5880, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b0eb5dd3a6fc209e7aa02e6880775930
          Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\windows process.exe, ProcessId: 5880, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exe
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Local\Temp\windows process.exe" .., EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\windows process.exe, ProcessId: 5880, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\b0eb5dd3a6fc209e7aa02e6880775930
          Timestamp:07/08/24-18:13:32.142062
          SID:2825564
          Source Port:49717
          Destination Port:16943
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:07/08/24-18:15:49.953303
          SID:2825563
          Source Port:49731
          Destination Port:16943
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:07/08/24-18:13:26.281099
          SID:2825563
          Source Port:49717
          Destination Port:16943
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:07/08/24-18:13:32.142062
          SID:2814860
          Source Port:49717
          Destination Port:16943
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:07/08/24-18:13:32.552443
          SID:2825565
          Source Port:49717
          Destination Port:16943
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:07/08/24-18:13:26.276084
          SID:2033132
          Source Port:49717
          Destination Port:16943
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:07/08/24-18:15:49.953303
          SID:2814856
          Source Port:49731
          Destination Port:16943
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:07/08/24-18:15:51.939065
          SID:2019214
          Source Port:49731
          Destination Port:16943
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:07/08/24-18:13:32.552443
          SID:2019214
          Source Port:49717
          Destination Port:16943
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:07/08/24-18:13:26.281099
          SID:2814856
          Source Port:49717
          Destination Port:16943
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:07/08/24-18:15:49.947605
          SID:2033132
          Source Port:49731
          Destination Port:16943
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:07/08/24-18:15:51.939065
          SID:2825565
          Source Port:49731
          Destination Port:16943
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Game Laucher.exeAvira: detected
          Source: 2.tcp.eu.ngrok.ioAvira URL Cloud: Label: malware
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
          Source: C:\windows process.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
          Source: 00000002.00000002.4662154451.0000000003F41000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Njrat {"Host": "2.tcp.eu.ngrok.io", "Port": "16943", "Version": "im523", "Campaign ID": "NLQ WORK", "Install Name": "windows process.exe", "Install Dir": "TEMP"}
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeReversingLabs: Detection: 52%
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exeReversingLabs: Detection: 52%
          Source: C:\windows process.exeReversingLabs: Detection: 52%
          Source: Game Laucher.exeReversingLabs: Detection: 52%
          Source: Yara matchFile source: 0.2.Game Laucher.exe.30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.4662154451.0000000003F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Game Laucher.exe PID: 2748, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: windows process.exe PID: 5880, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeJoe Sandbox ML: detected
          Source: C:\windows process.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exeJoe Sandbox ML: detected
          Source: Game Laucher.exeJoe Sandbox ML: detected

          Compliance

          barindex
          Source: C:\Users\user\Desktop\Game Laucher.exeUnpacked PE file: 0.2.Game Laucher.exe.30000.0.unpack
          Source: Game Laucher.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\Game Laucher.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior

          Spreading

          barindex
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile created: C:\autorun.infJump to behavior
          Source: Game Laucher.exeBinary or memory string: autorun.inf
          Source: Game Laucher.exeBinary or memory string: [autorun]
          Source: Game Laucher.exe, 00000000.00000002.2267012943.00000000037F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
          Source: Game Laucher.exe, 00000000.00000002.2267012943.00000000037F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
          Source: Game Laucher.exe, 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
          Source: Game Laucher.exe, 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
          Source: windows process.exe, 00000002.00000002.4662154451.0000000003F41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
          Source: windows process.exe, 00000002.00000002.4662154451.0000000003F41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
          Source: autorun.inf.2.drBinary or memory string: [autorun]
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_00727490 FindFirstFileW,2_2_00727490
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: C:\Windows\SysWOW64\avicap32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: C:\Windows\SysWOW64\MSVFW32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: C:\Windows\SysWOW64\en-US\MSVFW32.dll.muiJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_d94bc80de1097097Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: C:\Windows\SysWOW64\en-US\avicap32.dll.muiJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: C:\Windows\System32\en-US\KERNELBASE.dll.muiJump to behavior

          Networking

          barindex
          Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.6:49717 -> 18.192.93.86:16943
          Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.6:49717 -> 18.192.93.86:16943
          Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.6:49717 -> 18.192.93.86:16943
          Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.6:49717 -> 18.192.93.86:16943
          Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.6:49717 -> 18.192.93.86:16943
          Source: TrafficSnort IDS: 2019214 ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture) 192.168.2.6:49717 -> 18.192.93.86:16943
          Source: TrafficSnort IDS: 2825565 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP) 192.168.2.6:49717 -> 18.192.93.86:16943
          Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.6:49731 -> 18.156.13.209:16943
          Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.6:49731 -> 18.156.13.209:16943
          Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.6:49731 -> 18.156.13.209:16943
          Source: TrafficSnort IDS: 2019214 ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture) 192.168.2.6:49731 -> 18.156.13.209:16943
          Source: TrafficSnort IDS: 2825565 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP) 192.168.2.6:49731 -> 18.156.13.209:16943
          Source: Malware configuration extractorURLs: 2.tcp.eu.ngrok.io
          Source: global trafficTCP traffic: 18.192.93.86 ports 1,3,4,6,16943,9
          Source: global trafficTCP traffic: 18.156.13.209 ports 1,3,4,6,16943,9
          Source: global trafficTCP traffic: 192.168.2.6:49717 -> 18.192.93.86:16943
          Source: global trafficTCP traffic: 192.168.2.6:49731 -> 18.156.13.209:16943
          Source: Joe Sandbox ViewIP Address: 18.192.93.86 18.192.93.86
          Source: Joe Sandbox ViewIP Address: 18.156.13.209 18.156.13.209
          Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
          Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: 2.tcp.eu.ngrok.io
          Source: windows process.exe, 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.enigmaprotector.com/
          Source: Game Laucher.exe, 00000000.00000002.2264581590.000000000004A000.00000040.00000001.01000000.00000003.sdmp, windows process.exe, 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.enigmaprotector.com/openU
          Source: Game Laucher.exe, Game Laucher.exe, 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmp, windows process.exe, 00000002.00000002.4662154451.0000000003F41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 0.2.Game Laucher.exe.30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.4662154451.0000000003F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Game Laucher.exe PID: 2748, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: windows process.exe PID: 5880, type: MEMORYSTR

          Operating System Destruction

          barindex
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: 01 00 00 00 Jump to behavior

          System Summary

          barindex
          Source: 0.2.Game Laucher.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
          Source: 0.2.Game Laucher.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 0.2.Game Laucher.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
          Source: 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
          Source: 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: Game Laucher.exeStatic PE information: section name: .data P
          Source: windows process.exe.0.drStatic PE information: section name: .data P
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: section name: .data P
          Source: windows process.exe.2.drStatic PE information: section name: .data P
          Source: Game Laucher.exeStatic PE information: section name:
          Source: Game Laucher.exeStatic PE information: section name:
          Source: Game Laucher.exeStatic PE information: section name:
          Source: Game Laucher.exeStatic PE information: section name:
          Source: windows process.exe.0.drStatic PE information: section name:
          Source: windows process.exe.0.drStatic PE information: section name:
          Source: windows process.exe.0.drStatic PE information: section name:
          Source: windows process.exe.0.drStatic PE information: section name:
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: section name:
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: section name:
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: section name:
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: section name:
          Source: windows process.exe.2.drStatic PE information: section name:
          Source: windows process.exe.2.drStatic PE information: section name:
          Source: windows process.exe.2.drStatic PE information: section name:
          Source: windows process.exe.2.drStatic PE information: section name:
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F650 NtSetInformationFile,2_2_0074F650
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F646 NtClose,2_2_0074F646
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F6B8 NtReadFile,2_2_0074F6B8
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F710 NtCreateFile,2_2_0074F710
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F7F0 NtProtectVirtualMemory,2_2_0074F7F0
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074FBD0 NtClose,VirtualFree,2_2_0074FBD0
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F070 NtEnumerateKey,2_2_0074F070
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F028 NtCreateKey,2_2_0074F028
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F0B0 NtSetValueKey,2_2_0074F0B0
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F174 NtLoadKey2,2_2_0074F174
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F17E NtNotifyChangeKey,2_2_0074F17E
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F142 NtLoadKey,2_2_0074F142
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F13A NtFlushKey,2_2_0074F13A
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F102 NtDeleteKey,2_2_0074F102
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F10A NtDeleteValueKey,2_2_0074F10A
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F1E0 NtQueryMultipleValueKey,2_2_0074F1E0
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F27C NtSetInformationKey,2_2_0074F27C
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F25E NtSaveKey,2_2_0074F25E
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F234 NtReplaceKey,2_2_0074F234
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F23E NtRestoreKey,2_2_0074F23E
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F2E0 NtWriteFile,2_2_0074F2E0
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F2C2 NtTerminateProcess,2_2_0074F2C2
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F2BA NtUnloadKey,2_2_0074F2BA
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F36C NtQueryDirectoryFile,2_2_0074F36C
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F338 NtQueryObject,2_2_0074F338
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F3F2 NtDuplicateObject,2_2_0074F3F2
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F3E8 NtOpenSection,2_2_0074F3E8
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F43C NtQueryVolumeInformationFile,2_2_0074F43C
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F4EC NtUnlockFile,2_2_0074F4EC
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F482 NtDeleteFile,2_2_0074F482
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F48A NtLockFile,2_2_0074F48A
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F558 NtQuerySection,2_2_0074F558
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F54F NtUnmapViewOfSection,2_2_0074F54F
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F533 NtQueryFullAttributesFile,2_2_0074F533
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F5EC NtCreateSection,2_2_0074F5EC
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F58C NtMapViewOfSection,2_2_0074F58C
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F634 NtClose,2_2_0074F634
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F684 NtQueryInformationFile,2_2_0074F684
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F778 NtOpenFile,2_2_0074F778
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074F7CB NtQueryAttributesFile,2_2_0074F7CB
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EBE4 NtCreateThread,2_2_0074EBE4
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EC50 NtCreateProcess,2_2_0074EC50
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EC47 NtResumeThread,2_2_0074EC47
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074ECF8 NtCreateUserProcess,2_2_0074ECF8
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074ECA0 NtCreateProcessEx,2_2_0074ECA0
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074ED60 NtOpenKeyEx,2_2_0074ED60
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EDD4 NtSetSecurityObject,2_2_0074EDD4
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EDDE NtQuerySecurityObject,2_2_0074EDDE
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074ED8C NtSetVolumeInformationFile,2_2_0074ED8C
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EE6C NtFsControlFile,2_2_0074EE6C
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EE14 NtNotifyChangeDirectoryFile,2_2_0074EE14
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EEFB NtExtendSection,2_2_0074EEFB
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EEDF NtFlushBuffersFile,2_2_0074EEDF
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EF72 NtEnumerateValueKey,2_2_0074EF72
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EF68 NtOpenKey,2_2_0074EF68
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EF04 NtAccessCheck,2_2_0074EF04
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EFE8 NtQueryValueKey,2_2_0074EFE8
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074EFB4 NtQueryKey,2_2_0074EFB4
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_037E052A NtQuerySystemInformation,2_2_037E052A
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_037E010E NtSetInformationProcess,2_2_037E010E
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_037E04EF NtQuerySystemInformation,2_2_037E04EF
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_037E00EC NtSetInformationProcess,2_2_037E00EC
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile created: C:\windows process.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile created: C:\windows process.exe\:Zone.Identifier:$DATAJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_036432582_2_03643258
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: String function: 0004E264 appears 102 times
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: String function: 00700D9C appears 67 times
          Source: Game Laucher.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 0.2.Game Laucher.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
          Source: 0.2.Game Laucher.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 0.2.Game Laucher.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
          Source: 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
          Source: 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: Game Laucher.exeStatic PE information: Section: .data P ZLIB complexity 0.997179533305921
          Source: windows process.exe.0.drStatic PE information: Section: .data P ZLIB complexity 0.997179533305921
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: Section: .data P ZLIB complexity 0.997179533305921
          Source: windows process.exe.2.drStatic PE information: Section: .data P ZLIB complexity 0.997179533305921
          Source: classification engineClassification label: mal100.spre.troj.adwa.evad.winEXE@9/9@2/2
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_030ABDA2 AdjustTokenPrivileges,2_2_030ABDA2
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_030ABD6B AdjustTokenPrivileges,2_2_030ABD6B
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_001B796C GetDiskFreeSpaceExA,0_2_001B796C
          Source: C:\Users\user\Desktop\Game Laucher.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Game Laucher.exe.logJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeMutant created: NULL
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7092:120:WilError_03
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeMutant created: \Sessions\1\BaseNamedObjects\b0eb5dd3a6fc209e7aa02e6880775930
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2788:120:WilError_03
          Source: C:\Users\user\Desktop\Game Laucher.exeFile created: C:\Users\user\AppData\Local\Temp\windows process.exeJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "explorer.exe")
          Source: C:\Users\user\Desktop\Game Laucher.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Game Laucher.exeReversingLabs: Detection: 52%
          Source: C:\Users\user\Desktop\Game Laucher.exeFile read: C:\Users\user\Desktop\Game Laucher.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\Game Laucher.exe "C:\Users\user\Desktop\Game Laucher.exe"
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess created: C:\Users\user\AppData\Local\Temp\windows process.exe "C:\Users\user\AppData\Local\Temp\windows process.exe"
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\windows process.exe" "windows process.exe" ENABLE
          Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM explorer.exe
          Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess created: C:\Users\user\AppData\Local\Temp\windows process.exe "C:\Users\user\AppData\Local\Temp\windows process.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\windows process.exe" "windows process.exe" ENABLEJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM explorer.exeJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\Game Laucher.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
          Source: Game Laucher.exeStatic file information: File size 1150464 > 1048576
          Source: C:\Users\user\Desktop\Game Laucher.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior

          Data Obfuscation

          barindex
          Source: C:\Users\user\Desktop\Game Laucher.exeUnpacked PE file: 0.2.Game Laucher.exe.30000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;.rsrc:EW;Unknown_Section4:EW;.data:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;.rsrc:ER;Unknown_Section4:ER;.data:ER;
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeUnpacked PE file: 2.2.windows process.exe.6e0000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;.rsrc:EW;Unknown_Section4:EW;.data:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;.rsrc:ER;Unknown_Section4:ER;.data:ER;
          Source: C:\Users\user\Desktop\Game Laucher.exeUnpacked PE file: 0.2.Game Laucher.exe.30000.0.unpack
          Source: Game Laucher.exeStatic PE information: section name:
          Source: Game Laucher.exeStatic PE information: section name:
          Source: Game Laucher.exeStatic PE information: section name:
          Source: Game Laucher.exeStatic PE information: section name:
          Source: Game Laucher.exeStatic PE information: section name: .data P
          Source: windows process.exe.0.drStatic PE information: section name:
          Source: windows process.exe.0.drStatic PE information: section name:
          Source: windows process.exe.0.drStatic PE information: section name:
          Source: windows process.exe.0.drStatic PE information: section name:
          Source: windows process.exe.0.drStatic PE information: section name: .data P
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: section name:
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: section name:
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: section name:
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: section name:
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: section name: .data P
          Source: windows process.exe.2.drStatic PE information: section name:
          Source: windows process.exe.2.drStatic PE information: section name:
          Source: windows process.exe.2.drStatic PE information: section name:
          Source: windows process.exe.2.drStatic PE information: section name:
          Source: windows process.exe.2.drStatic PE information: section name: .data P
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_00076EC8 push 00076F17h; ret 0_2_00076F0F
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_0003751D push es; retf 0_2_00037528
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_00066104 push ecx; mov dword ptr [esp], edx0_2_00066109
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_0006A19C push ecx; mov dword ptr [esp], edx0_2_0006A19E
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_0006632C push ecx; mov dword ptr [esp], edx0_2_00066331
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_0005A365 push 0005A6D8h; ret 0_2_0005A6D0
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_0005A370 push 0005A6D8h; ret 0_2_0005A6D0
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_000523EA push 00052418h; ret 0_2_00052410
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_0007040C push ecx; mov dword ptr [esp], edx0_2_00070411
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_00052424 push 00052450h; ret 0_2_00052448
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_00066448 push ecx; mov dword ptr [esp], edx0_2_0006644D
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_00064454 push 000644A1h; ret 0_2_00064499
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_0005245C push 00052488h; ret 0_2_00052480
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_0006648C push ecx; mov dword ptr [esp], edx0_2_00066491
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_00052494 push 000524C0h; ret 0_2_000524B8
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_000524F8 push 0005252Ch; ret 0_2_00052524
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_00062536 push 000625B5h; ret 0_2_000625AD
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_0006854C push ecx; mov dword ptr [esp], edx0_2_0006854D
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_000505F0 push 00050641h; ret 0_2_00050639
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_0005A6DA push 0005A74Bh; ret 0_2_0005A743
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_00062804 push 00062830h; ret 0_2_00062828
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_0005A85E push 0005A88Ch; ret 0_2_0005A884
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_000508AA push 000508D8h; ret 0_2_000508D0
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_00050968 push 00050994h; ret 0_2_0005098C
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_00068F70 push ecx; mov dword ptr [esp], ecx0_2_00068F75
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_0004CF90 push eax; ret 0_2_0004CFCC
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_000633A0 push 00063400h; ret 0_2_000633F8
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_00063456 push 000635A4h; ret 0_2_0006359C
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_0006162C push 000616A2h; ret 0_2_0006169A
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_00063684 push ecx; mov dword ptr [esp], ecx0_2_00063687
          Source: C:\Users\user\Desktop\Game Laucher.exeCode function: 0_2_000616A4 push 0006174Ch; ret 0_2_00061744
          Source: Game Laucher.exeStatic PE information: section name: entropy: 7.953883778943793
          Source: Game Laucher.exeStatic PE information: section name: .rsrc entropy: 7.885616164638959
          Source: Game Laucher.exeStatic PE information: section name: .data P entropy: 7.986419269749442
          Source: windows process.exe.0.drStatic PE information: section name: entropy: 7.953883778943793
          Source: windows process.exe.0.drStatic PE information: section name: .rsrc entropy: 7.885616164638959
          Source: windows process.exe.0.drStatic PE information: section name: .data P entropy: 7.986419269749442
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: section name: entropy: 7.953883778943793
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: section name: .rsrc entropy: 7.885616164638959
          Source: b0eb5dd3a6fc209e7aa02e6880775930.exe.2.drStatic PE information: section name: .data P entropy: 7.986419269749442
          Source: windows process.exe.2.drStatic PE information: section name: entropy: 7.953883778943793
          Source: windows process.exe.2.drStatic PE information: section name: .rsrc entropy: 7.885616164638959
          Source: windows process.exe.2.drStatic PE information: section name: .data P entropy: 7.986419269749442
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile created: C:\windows process.exeJump to dropped file
          Source: C:\Users\user\Desktop\Game Laucher.exeFile created: C:\Users\user\AppData\Local\Temp\windows process.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile created: C:\windows process.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run b0eb5dd3a6fc209e7aa02e6880775930Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exe\:Zone.Identifier:$DATAJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run b0eb5dd3a6fc209e7aa02e6880775930Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run b0eb5dd3a6fc209e7aa02e6880775930Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run b0eb5dd3a6fc209e7aa02e6880775930Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run b0eb5dd3a6fc209e7aa02e6880775930Jump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeMemory allocated: 2B30000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeMemory allocated: 37F0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeMemory allocated: 2EB0000 memory commit | memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeMemory allocated: 35D0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeMemory allocated: 3F40000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeMemory allocated: 3CC0000 memory commit | memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeWindow / User API: threadDelayed 2151Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeWindow / User API: threadDelayed 1874Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeWindow / User API: threadDelayed 2984Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeWindow / User API: threadDelayed 1468Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeWindow / User API: foregroundWindowGot 539Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeWindow / User API: foregroundWindowGot 1425Jump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exe TID: 5576Thread sleep count: 35 > 30Jump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exe TID: 3108Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exe TID: 5028Thread sleep time: -2151000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exe TID: 6960Thread sleep time: -1874000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exe TID: 5028Thread sleep time: -1468000s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_00727490 FindFirstFileW,2_2_00727490
          Source: C:\Users\user\Desktop\Game Laucher.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: C:\Windows\SysWOW64\avicap32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: C:\Windows\SysWOW64\MSVFW32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: C:\Windows\SysWOW64\en-US\MSVFW32.dll.muiJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_d94bc80de1097097Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: C:\Windows\SysWOW64\en-US\avicap32.dll.muiJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: C:\Windows\System32\en-US\KERNELBASE.dll.muiJump to behavior
          Source: windows process.exe, 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: VBoxService.exe
          Source: Game Laucher.exe, Game Laucher.exe, 00000000.00000002.2264581590.0000000000190000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ~VirtualMachineTypes
          Source: Game Laucher.exe, 00000000.00000002.2265236834.0000000000CCF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11
          Source: Game Laucher.exe, Game Laucher.exe, 00000000.00000002.2264581590.0000000000190000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ]DLL_Loader_VirtualMachine
          Source: windows process.exe, 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: VMWare
          Source: Game Laucher.exe, 00000000.00000002.2265236834.0000000000CCF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
          Source: Game Laucher.exe, 00000000.00000002.2264581590.0000000000190000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: DLL_Loader_Marker]DLL_Loader_VirtualMachineZDLL_Loader_Reloc_Unit
          Source: windows process.exe, 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: &VBoxService.exe
          Source: windows process.exe, 00000002.00000002.4660894310.00000000015FB000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000003.00000003.2333244460.0000000002CF1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess information queried: ProcessInformationJump to behavior

          Anti Debugging

          barindex
          Source: C:\Users\user\Desktop\Game Laucher.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeOpen window title or class name: ollydbg
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: SIWDEBUG
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: NTICE
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeFile opened: SICE
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\Game Laucher.exeProcess created: C:\Users\user\AppData\Local\Temp\windows process.exe "C:\Users\user\AppData\Local\Temp\windows process.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM explorer.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeCode function: 2_2_0074DCC0 GetTimeZoneInformation,2_2_0074DCC0
          Source: C:\Users\user\Desktop\Game Laucher.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\windows process.exe" "windows process.exe" ENABLE
          Source: C:\Users\user\AppData\Local\Temp\windows process.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\windows process.exe" "windows process.exe" ENABLE

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.Game Laucher.exe.30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.4662154451.0000000003F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Game Laucher.exe PID: 2748, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: windows process.exe PID: 5880, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.Game Laucher.exe.30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.4662154451.0000000003F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Game Laucher.exe PID: 2748, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: windows process.exe PID: 5880, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure11
          Replication Through Removable Media
          1
          Windows Management Instrumentation
          221
          Registry Run Keys / Startup Folder
          1
          Access Token Manipulation
          21
          Masquerading
          OS Credential Dumping1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          11
          Process Injection
          211
          Disable or Modify Tools
          LSASS Memory311
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)221
          Registry Run Keys / Startup Folder
          241
          Virtualization/Sandbox Evasion
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          DLL Side-Loading
          1
          Access Token Manipulation
          NTDS241
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput Capture11
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          Peripheral Device Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
          Obfuscated Files or Information
          DCSync3
          File and Directory Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job22
          Software Packing
          Proc Filesystem14
          System Information Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          DLL Side-Loading
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1469270 Sample: Game Laucher.exe Startdate: 08/07/2024 Architecture: WINDOWS Score: 100 40 2.tcp.eu.ngrok.io 2->40 46 Snort IDS alert for network traffic 2->46 48 Found malware configuration 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 20 other signatures 2->52 9 Game Laucher.exe 1 8 2->9         started        signatures3 process4 file5 26 C:\Users\user\AppData\...\windows process.exe, PE32 9->26 dropped 28 C:\...\windows process.exe:Zone.Identifier, ASCII 9->28 dropped 30 C:\Users\user\...behaviorgraphame Laucher.exe.log, ASCII 9->30 dropped 54 Hides threads from debuggers 9->54 13 windows process.exe 2 11 9->13         started        signatures6 process7 dnsIp8 42 18.156.13.209, 16943, 49731 AMAZON-02US United States 13->42 44 2.tcp.eu.ngrok.io 18.192.93.86, 16943, 49717 AMAZON-02US United States 13->44 32 C:\windows process.exe, PE32 13->32 dropped 34 C:\...\b0eb5dd3a6fc209e7aa02e6880775930.exe, PE32 13->34 dropped 36 C:\windows process.exe:Zone.Identifier, ASCII 13->36 dropped 38 2 other malicious files 13->38 dropped 56 Protects its processes via BreakOnTermination flag 13->56 58 Creates autorun.inf (USB autostart) 13->58 60 Creates autostart registry keys with suspicious names 13->60 62 Hides threads from debuggers 13->62 18 netsh.exe 2 13->18         started        20 taskkill.exe 1 13->20         started        file9 signatures10 process11 process12 22 conhost.exe 18->22         started        24 conhost.exe 20->24         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Game Laucher.exe53%ReversingLabsWin32.Packed.Enigma
          Game Laucher.exe100%AviraTR/Crypt.XPACK.Gen
          Game Laucher.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\windows process.exe100%AviraTR/Crypt.XPACK.Gen
          C:\windows process.exe100%AviraTR/Crypt.XPACK.Gen
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exe100%AviraTR/Crypt.XPACK.Gen
          C:\Users\user\AppData\Local\Temp\windows process.exe100%Joe Sandbox ML
          C:\windows process.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Temp\windows process.exe53%ReversingLabsWin32.Backdoor.njRAT
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exe53%ReversingLabsWin32.Backdoor.njRAT
          C:\windows process.exe53%ReversingLabsWin32.Backdoor.njRAT
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=00%Avira URL Cloudsafe
          2.tcp.eu.ngrok.io100%Avira URL Cloudmalware
          http://www.enigmaprotector.com/0%Avira URL Cloudsafe
          http://www.enigmaprotector.com/openU0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          2.tcp.eu.ngrok.io
          18.192.93.86
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            2.tcp.eu.ngrok.iotrue
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0Game Laucher.exe, Game Laucher.exe, 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmp, windows process.exe, 00000002.00000002.4662154451.0000000003F41000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.enigmaprotector.com/windows process.exe, 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.enigmaprotector.com/openUGame Laucher.exe, 00000000.00000002.2264581590.000000000004A000.00000040.00000001.01000000.00000003.sdmp, windows process.exe, 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            18.192.93.86
            2.tcp.eu.ngrok.ioUnited States
            16509AMAZON-02UStrue
            18.156.13.209
            unknownUnited States
            16509AMAZON-02UStrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1469270
            Start date and time:2024-07-08 18:12:09 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 8m 42s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:10
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Game Laucher.exe
            Detection:MAL
            Classification:mal100.spre.troj.adwa.evad.winEXE@9/9@2/2
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 54%
            • Number of executed functions: 184
            • Number of non-executed functions: 53
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, SearchApp.exe
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • VT rate limit hit for: Game Laucher.exe
            TimeTypeDescription
            12:13:48API Interceptor4364728x Sleep call for process: windows process.exe modified
            18:13:25AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run b0eb5dd3a6fc209e7aa02e6880775930 "C:\Users\user\AppData\Local\Temp\windows process.exe" ..
            18:13:33AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run b0eb5dd3a6fc209e7aa02e6880775930 "C:\Users\user\AppData\Local\Temp\windows process.exe" ..
            18:13:41AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run b0eb5dd3a6fc209e7aa02e6880775930 "C:\Users\user\AppData\Local\Temp\windows process.exe" ..
            18:13:49AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            18.192.93.86P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
            • 2.tcp.eu.ngrok.io:17685/
            http://www.sdrclm.cn/vendor/phpdocumentor/P800/P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
            • 2.tcp.eu.ngrok.io:17685/
            18.156.13.209http://www.sdrclm.cn/vendor/phpdocumentor/P800/P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
            • 2.tcp.eu.ngrok.io:17685/
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            2.tcp.eu.ngrok.io10.exeGet hashmaliciousUnknownBrowse
            • 18.192.93.86
            En3e396wX1.exeGet hashmaliciousNjratBrowse
            • 18.197.239.5
            ZxocxU01PB.exeGet hashmaliciousNjratBrowse
            • 18.197.239.5
            4xKDL5YCfQ.exeGet hashmaliciousNjratBrowse
            • 18.156.13.209
            R3ov8eFFFP.exeGet hashmaliciousNjratBrowse
            • 3.127.138.57
            Ve0c8i5So2.exeGet hashmaliciousNjratBrowse
            • 18.157.68.73
            LMQV4V1d3E.exeGet hashmaliciousNjratBrowse
            • 18.192.93.86
            b8UsrDOVGV.exeGet hashmaliciousNjratBrowse
            • 3.127.138.57
            2G8CgDVl3K.exeGet hashmaliciousNjratBrowse
            • 18.197.239.5
            BHp5Is5Xe7.exeGet hashmaliciousNjratBrowse
            • 18.192.93.86
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            AMAZON-02UShttps://us-west-2.protection.sophos.com/?d=exactag.com&u=aHR0cHM6Ly9tLmV4YWN0YWcuY29tL2FpLmFzcHg_dGM9ZDkyODI0MDNiYzQwYjA3MjA1YmJkMjZhMjNhOGQyZTZiNmI0ZjkmdXJsPS8vamtvbGV3b2lka2pqanVlaXV3dWVpa3N1ZWhtaXdramVodWl3aWplbS5wYWdlcy5kZXYvIz9lbWFpbD1kMmRoYkd4aFoyaGxja0IzYVd4c2FXRnRjMkoxY21kaGRYUnZMbU52YlE9PQ==&p=m&i=NjMxYTA3MTQzYzM4OGExMWNhNTUxMjM3&t=M2MzLzlOanJsS2xuWlREbDkvZnVrQnRKZUgvY05SdUszRk92MWFQV0JUcz0=&h=22cc77147c96407ab786e61486ffe8f8&s=AVNPUEhUT0NFTkNSWVBUSVaj2MyeOPMPdOTEGVo_dGllpNUTdUTDvA7RNZ7HJM-6vQGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
            • 108.157.194.47
            Scan_Doc-00024.pdfGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
            • 108.157.194.47
            http://le100.netGet hashmaliciousUnknownBrowse
            • 54.76.66.215
            Complete with Docusign_ June_Commission-Report.pdf.emlGet hashmaliciousHTMLPhisherBrowse
            • 52.89.98.217
            Order 81307529516.LZ.exeGet hashmaliciousFormBookBrowse
            • 54.179.173.60
            https://hr.economictimes.indiatimes.com/etl.php?url=https://link.mail.beehiiv.com/ls/click?upn=u001.C7CyaRD6J7Tdcqj9-2FMOqGE7r0wgi8kv64sAcgUPyKxo5WVoDX535gK1GDXQwPdAQrihn70HxgcGt2YBaUq1CgXa4w9UpnKYDWVk4wstl4BzTl0nByfbAMK9adrJtPNZDcYNrLz06jcC5tefVJ0MSELmrJVBWp2H-2FJNpadLpkW49aZHb0SN7faZdRSrGyWuvMdp4__d7CEfkoadLhLBotLDjFJV7Gf-2FGq-2FLbbkNC53nfsKxrXBgvOKDfwaSxCVShLSUOB96Cn1WOBmKtjwKglvs4Ik-2BSw75NpxJFloSreNjVrf23EvzQ1FRnAoElvJF-2B8D-2BMukEyUOFyqiDfOcPKVuQi4IrT2aGHp2KaoeXacWORZxyg-2BV2JHBFjW8KSG6ohd2I1l-2Bys1eXb0UaY6hTGOmp7v7bQMT64tqZtgUnbI7dAvCSbjKmaiKyIN7QZWXlla-2Bl8SOGSAyzrZKFQV17NyAoV171-2FYqo1ABGkQoLEipNqxGy4lfga0v-2FXAFNABPZkTJ1ZqclpC2FUhBDYSM-2Bab4YaBlh-2BErAoNeIxttwbVnYGtNKIF4zBYqTFz4qjHn2b3VZ8BmkRPY4ofkEnlvrjKe2YQtpdmmW90mogImF21NdSt2XKUr9ey1x1i70RJFZn5ES3dCGet hashmaliciousUnknownBrowse
            • 108.139.243.59
            SecuriteInfo.com.Exploit.CVE-2018-0798.4.20958.13318.rtfGet hashmaliciousFormBookBrowse
            • 52.52.24.52
            https://t.apemail.net/c/nqkqivaeafkveu2tdidqguiddibqeakudjkqoakvdihvmb2tkiaagdydaihfmfi3audqkaifbyabwaabbyhqcbafaanq4byoaedqeaipamnqogyvpf3bkgyvafkambqpkikwu-nqdbwfkcivnrkgyvpf3bkgygamaa4bqedmcagbahdmcqabipaidqagyfaycqiaibainqkbyfaecq4aa3aubq4dqfbyaaegyvarkaiakvkjjvggqhaniqggqdaiavigsva4avkgqpkydvguqaamhqgaqokykrwdqhbyaqoaqbb4brwfl3ijmvmrixpfjeaf3okjlekfy2c4dqefy7mzbf4vc4c5sfewktdykrwflfojqx44tacunqaaiob4aqibiadmkv6q2di5ca2gaylbnv6wcblzavqvkfdfkfqwqzkvcrqvsaivcugvcylfbvmvcddbqqiy3odabx6x2pbydu4qcwdfpugws3cunugrkckinqaaqcdmkxs5qvdnmuew23dnmuew23dnmuew23dnmuew23dmkqcvagayhveflkGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
            • 65.9.86.73
            https://www.bing.com/ck/a?!&&p=1c2e03d92a757c8bJmltdHM9MTcyMDA1MTIwMCZpZ3VpZD0xN2U2ZWM4Ni1jZTFkLTY0ODgtMDE5Yy1mODM0Y2ZkZDY1ZDYmaW5zaWQ9NTMwOQ&ptn=3&ver=2&hsh=3&fclid=17e6ec86-ce1d-6488-019c-f834cfdd65d6&u=a1aHR0cHM6Ly93d3cuZGlyZWl0b2RlbGFzcG9yZWxhcy5jb20uYnIvbXlwYWdlL2xvZ2lu&#amVpc2ZlbGRlckBtZW5vbWluZWVjYXNpbm9yZXNvcnQuY29tGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
            • 13.227.219.11
            https://mail.pfl.fyi/v1/messages/01907499-c522-7db0-8f73-8ecef125b6ef/click?link_id=01907499-c784-79b1-9586-0af27d2ecc90&signature=435c599a2ffdd44fb638aab33a856024482c0588Get hashmaliciousTycoon2FABrowse
            • 13.226.184.73
            AMAZON-02UShttps://us-west-2.protection.sophos.com/?d=exactag.com&u=aHR0cHM6Ly9tLmV4YWN0YWcuY29tL2FpLmFzcHg_dGM9ZDkyODI0MDNiYzQwYjA3MjA1YmJkMjZhMjNhOGQyZTZiNmI0ZjkmdXJsPS8vamtvbGV3b2lka2pqanVlaXV3dWVpa3N1ZWhtaXdramVodWl3aWplbS5wYWdlcy5kZXYvIz9lbWFpbD1kMmRoYkd4aFoyaGxja0IzYVd4c2FXRnRjMkoxY21kaGRYUnZMbU52YlE9PQ==&p=m&i=NjMxYTA3MTQzYzM4OGExMWNhNTUxMjM3&t=M2MzLzlOanJsS2xuWlREbDkvZnVrQnRKZUgvY05SdUszRk92MWFQV0JUcz0=&h=22cc77147c96407ab786e61486ffe8f8&s=AVNPUEhUT0NFTkNSWVBUSVaj2MyeOPMPdOTEGVo_dGllpNUTdUTDvA7RNZ7HJM-6vQGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
            • 108.157.194.47
            Scan_Doc-00024.pdfGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
            • 108.157.194.47
            http://le100.netGet hashmaliciousUnknownBrowse
            • 54.76.66.215
            Complete with Docusign_ June_Commission-Report.pdf.emlGet hashmaliciousHTMLPhisherBrowse
            • 52.89.98.217
            Order 81307529516.LZ.exeGet hashmaliciousFormBookBrowse
            • 54.179.173.60
            https://hr.economictimes.indiatimes.com/etl.php?url=https://link.mail.beehiiv.com/ls/click?upn=u001.C7CyaRD6J7Tdcqj9-2FMOqGE7r0wgi8kv64sAcgUPyKxo5WVoDX535gK1GDXQwPdAQrihn70HxgcGt2YBaUq1CgXa4w9UpnKYDWVk4wstl4BzTl0nByfbAMK9adrJtPNZDcYNrLz06jcC5tefVJ0MSELmrJVBWp2H-2FJNpadLpkW49aZHb0SN7faZdRSrGyWuvMdp4__d7CEfkoadLhLBotLDjFJV7Gf-2FGq-2FLbbkNC53nfsKxrXBgvOKDfwaSxCVShLSUOB96Cn1WOBmKtjwKglvs4Ik-2BSw75NpxJFloSreNjVrf23EvzQ1FRnAoElvJF-2B8D-2BMukEyUOFyqiDfOcPKVuQi4IrT2aGHp2KaoeXacWORZxyg-2BV2JHBFjW8KSG6ohd2I1l-2Bys1eXb0UaY6hTGOmp7v7bQMT64tqZtgUnbI7dAvCSbjKmaiKyIN7QZWXlla-2Bl8SOGSAyzrZKFQV17NyAoV171-2FYqo1ABGkQoLEipNqxGy4lfga0v-2FXAFNABPZkTJ1ZqclpC2FUhBDYSM-2Bab4YaBlh-2BErAoNeIxttwbVnYGtNKIF4zBYqTFz4qjHn2b3VZ8BmkRPY4ofkEnlvrjKe2YQtpdmmW90mogImF21NdSt2XKUr9ey1x1i70RJFZn5ES3dCGet hashmaliciousUnknownBrowse
            • 108.139.243.59
            SecuriteInfo.com.Exploit.CVE-2018-0798.4.20958.13318.rtfGet hashmaliciousFormBookBrowse
            • 52.52.24.52
            https://t.apemail.net/c/nqkqivaeafkveu2tdidqguiddibqeakudjkqoakvdihvmb2tkiaagdydaihfmfi3audqkaifbyabwaabbyhqcbafaanq4byoaedqeaipamnqogyvpf3bkgyvafkambqpkikwu-nqdbwfkcivnrkgyvpf3bkgygamaa4bqedmcagbahdmcqabipaidqagyfaycqiaibainqkbyfaecq4aa3aubq4dqfbyaaegyvarkaiakvkjjvggqhaniqggqdaiavigsva4avkgqpkydvguqaamhqgaqokykrwdqhbyaqoaqbb4brwfl3ijmvmrixpfjeaf3okjlekfy2c4dqefy7mzbf4vc4c5sfewktdykrwflfojqx44tacunqaaiob4aqibiadmkv6q2di5ca2gaylbnv6wcblzavqvkfdfkfqwqzkvcrqvsaivcugvcylfbvmvcddbqqiy3odabx6x2pbydu4qcwdfpugws3cunugrkckinqaaqcdmkxs5qvdnmuew23dnmuew23dnmuew23dnmuew23dmkqcvagayhveflkGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
            • 65.9.86.73
            https://www.bing.com/ck/a?!&&p=1c2e03d92a757c8bJmltdHM9MTcyMDA1MTIwMCZpZ3VpZD0xN2U2ZWM4Ni1jZTFkLTY0ODgtMDE5Yy1mODM0Y2ZkZDY1ZDYmaW5zaWQ9NTMwOQ&ptn=3&ver=2&hsh=3&fclid=17e6ec86-ce1d-6488-019c-f834cfdd65d6&u=a1aHR0cHM6Ly93d3cuZGlyZWl0b2RlbGFzcG9yZWxhcy5jb20uYnIvbXlwYWdlL2xvZ2lu&#amVpc2ZlbGRlckBtZW5vbWluZWVjYXNpbm9yZXNvcnQuY29tGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
            • 13.227.219.11
            https://mail.pfl.fyi/v1/messages/01907499-c522-7db0-8f73-8ecef125b6ef/click?link_id=01907499-c784-79b1-9586-0af27d2ecc90&signature=435c599a2ffdd44fb638aab33a856024482c0588Get hashmaliciousTycoon2FABrowse
            • 13.226.184.73
            No context
            No context
            Process:C:\Users\user\Desktop\Game Laucher.exe
            File Type:ASCII text, with CRLF line terminators
            Category:modified
            Size (bytes):641
            Entropy (8bit):5.255094057343913
            Encrypted:false
            SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk70U2+Eb5iv:MLF2CpI3zffup29Iz52VM2+Z
            MD5:898DE7911DF98E1BCA0E8A9E4EF5AB04
            SHA1:9C9E968E380403E4F11EA34C3169C9CE1496F345
            SHA-256:C2FCB238F2C3F05B744A9E3287F474E493BF76AE73112FBDF79A296FE291891B
            SHA-512:E9ED6D76D1B594FB7C3B03FF7B940F87B81896AFC6F65ADC0229BFDF3B4372CCB42E2C16596B5588CC360469BB77AC669A58DAF6418683DE2903EDE5F19BD015
            Malicious:true
            Reputation:low
            Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\74774597e319a738b792e6a6c06d3559\System.Xml.ni.dll",0..
            Process:C:\Users\user\Desktop\Game Laucher.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1150464
            Entropy (8bit):7.989590055840964
            Encrypted:false
            SSDEEP:24576:ga81+sa79EYE7uS2KzKuHcJNc4R0eB+Kt3cNmLc9dJ:ga81+sqnQd2KzK0coTeBX3cQL2J
            MD5:B24F58BB4315DFA0C7EFE2CB18BED37D
            SHA1:E3E00C86534EA4095F45820FC5D9D59641832058
            SHA-256:A71B560AFB99073078FA82E00143A8DB8B93ED79E3DC228880F696C109BDDC89
            SHA-512:F8B97748D0E2B8BC044A89BB1E7C035C91E0FF3F4C8DE4D439248FC6566D0EF2A5BA3536CA54D2DF3F3BCD7BE7601C225EA51A8491E79E397D68D5BB8A091892
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 53%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H.f.....................N......$>... ........@.. ........................7...........@................................. .)......@..DJ....................).................................................................................................. ...@..................@............`...........D..............@............ ... .......F..............@....rsrc....`...@...L...H..............@.............(.........................@....data. P.@....)..@...N..............@............................................./LG'..h.....w0........................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\Game Laucher.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:true
            Reputation:high, very likely benign file
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Users\user\AppData\Local\Temp\windows process.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1150464
            Entropy (8bit):7.989590055840964
            Encrypted:false
            SSDEEP:24576:ga81+sa79EYE7uS2KzKuHcJNc4R0eB+Kt3cNmLc9dJ:ga81+sqnQd2KzK0coTeBX3cQL2J
            MD5:B24F58BB4315DFA0C7EFE2CB18BED37D
            SHA1:E3E00C86534EA4095F45820FC5D9D59641832058
            SHA-256:A71B560AFB99073078FA82E00143A8DB8B93ED79E3DC228880F696C109BDDC89
            SHA-512:F8B97748D0E2B8BC044A89BB1E7C035C91E0FF3F4C8DE4D439248FC6566D0EF2A5BA3536CA54D2DF3F3BCD7BE7601C225EA51A8491E79E397D68D5BB8A091892
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 53%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H.f.....................N......$>... ........@.. ........................7...........@................................. .)......@..DJ....................).................................................................................................. ...@..................@............`...........D..............@............ ... .......F..............@....rsrc....`...@...L...H..............@.............(.........................@....data. P.@....)..@...N..............@............................................./LG'..h.....w0........................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\windows process.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:true
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Users\user\AppData\Local\Temp\windows process.exe
            File Type:Microsoft Windows Autorun file
            Category:dropped
            Size (bytes):58
            Entropy (8bit):4.461092201874919
            Encrypted:false
            SSDEEP:3:It1KV2BBK9XK96i0x:e1KIIKs
            MD5:F2C8846FA65E2CBFE8BF344B9C64F1E3
            SHA1:E36BFE32F0AEC7924D2AE308C78CE86E64A9D0A0
            SHA-256:0E3D1C4FD40DF226531C4EEA100220BE69A35DDCB7CFCA495F7ED495929E4DBB
            SHA-512:BCFD7AD4A11B2BFB00AF7FA22CA0A3130DAAF9F2E684C682333961492A1398CBAB35608D25D6FF23B32541FC1DDFEA4FB9FA6E6E9A06060067407314AA204760
            Malicious:true
            Preview:[autorun]..open=C:\windows process.exe..shellexecute=C:\..
            Process:C:\Users\user\AppData\Local\Temp\windows process.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1150464
            Entropy (8bit):7.989590055840964
            Encrypted:false
            SSDEEP:24576:ga81+sa79EYE7uS2KzKuHcJNc4R0eB+Kt3cNmLc9dJ:ga81+sqnQd2KzK0coTeBX3cQL2J
            MD5:B24F58BB4315DFA0C7EFE2CB18BED37D
            SHA1:E3E00C86534EA4095F45820FC5D9D59641832058
            SHA-256:A71B560AFB99073078FA82E00143A8DB8B93ED79E3DC228880F696C109BDDC89
            SHA-512:F8B97748D0E2B8BC044A89BB1E7C035C91E0FF3F4C8DE4D439248FC6566D0EF2A5BA3536CA54D2DF3F3BCD7BE7601C225EA51A8491E79E397D68D5BB8A091892
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 53%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H.f.....................N......$>... ........@.. ........................7...........@................................. .)......@..DJ....................).................................................................................................. ...@..................@............`...........D..............@............ ... .......F..............@....rsrc....`...@...L...H..............@.............(.........................@....data. P.@....)..@...N..............@............................................./LG'..h.....w0........................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\windows process.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:true
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Windows\SysWOW64\netsh.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):313
            Entropy (8bit):4.971939296804078
            Encrypted:false
            SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
            MD5:689E2126A85BF55121488295EE068FA1
            SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
            SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
            SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
            Malicious:false
            Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):7.989590055840964
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.94%
            • Win16/32 Executable Delphi generic (2074/23) 0.02%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:Game Laucher.exe
            File size:1'150'464 bytes
            MD5:b24f58bb4315dfa0c7efe2cb18bed37d
            SHA1:e3e00c86534ea4095f45820fc5d9d59641832058
            SHA256:a71b560afb99073078fa82e00143a8db8b93ed79e3dc228880f696c109bddc89
            SHA512:f8b97748d0e2b8bc044a89bb1e7c035c91e0ff3f4c8de4d439248fc6566d0ef2a5ba3536ca54d2df3f3bcd7be7601c225ea51a8491e79e397d68d5bb8a091892
            SSDEEP:24576:ga81+sa79EYE7uS2KzKuHcJNc4R0eB+Kt3cNmLc9dJ:ga81+sqnQd2KzK0coTeBX3cQL2J
            TLSH:0E35331E73CB1851EC54B9BF9610BC78BD8FC6287DAE1E08AFD7558321404E25F80E9A
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H..f.....................N......$>... ........@.. ........................7...........@................................
            Icon Hash:0f33f16cea4d6917
            Entrypoint:0x403e24
            Entrypoint Section:
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
            Time Stamp:0x668BEF48 [Mon Jul 8 13:53:12 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:2e5467cba76f44a088d39f78c5e807b6
            Instruction
            push ebp
            mov ebp, esp
            add esp, FFFFFFF0h
            mov eax, 00401000h
            call 00007FA4886DC976h
            call far 5DE5h : 8B10C483h
            jmp 00007FA488A5413Dh
            lds ecx, edx
            imul ebx, ebp, 7E2E3C9Bh
            pop edx
            pop ss
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x29a0200x210.data P
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x4a44.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x29a0000xc.data P
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            0x20000xa0000x4000f9cecc5c1b2a1a69d41cbebb20328d11False0.98321533203125data7.953883778943793IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            0xc0000x60000x2002c2c577491b1d8ff3874dde5a1f099eaFalse0.0625data0.3623175539007212IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            0x120000x20000x200bfa22a756f9ec241c5b50d744e000d8bFalse0.056640625data0.30140680731160896IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x140000x60000x4c009adc5c3a4d64f80db25f34ad2ddf570eFalse0.9642269736842105data7.885616164638959IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            0x1a0000x2800000x2ba00bcbeb41f5da92d3b3ba1c39d94f12b24unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .data P0x29a0000xe40000xe400038ea37a97940620192b3c79e57b26695False0.997179533305921data7.986419269749442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x140e80x475dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.0008758005364278
            RT_GROUP_ICON0x188480x14data0.9
            RT_MANIFEST0x1885c0x1e7XML 1.0 document, ASCII text, with CRLF line terminators0.5338809034907598
            DLLImport
            kernel32.dllGetModuleHandleA, GetProcAddress, ExitProcess, LoadLibraryA
            user32.dllMessageBoxA
            advapi32.dllRegCloseKey
            oleaut32.dllSysFreeString
            gdi32.dllCreateFontA
            shell32.dllShellExecuteA
            version.dllGetFileVersionInfoA
            mscoree.dll_CorExeMain
            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            07/08/24-18:13:32.142062TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4971716943192.168.2.618.192.93.86
            07/08/24-18:15:49.953303TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4973116943192.168.2.618.156.13.209
            07/08/24-18:13:26.281099TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4971716943192.168.2.618.192.93.86
            07/08/24-18:13:32.142062TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4971716943192.168.2.618.192.93.86
            07/08/24-18:13:32.552443TCP2825565ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP)4971716943192.168.2.618.192.93.86
            07/08/24-18:13:26.276084TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4971716943192.168.2.618.192.93.86
            07/08/24-18:15:49.953303TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973116943192.168.2.618.156.13.209
            07/08/24-18:15:51.939065TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)4973116943192.168.2.618.156.13.209
            07/08/24-18:13:32.552443TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)4971716943192.168.2.618.192.93.86
            07/08/24-18:13:26.281099TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4971716943192.168.2.618.192.93.86
            07/08/24-18:15:49.947605TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973116943192.168.2.618.156.13.209
            07/08/24-18:15:51.939065TCP2825565ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP)4973116943192.168.2.618.156.13.209
            TimestampSource PortDest PortSource IPDest IP
            Jul 8, 2024 18:13:26.133502960 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:13:26.138665915 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:26.138751030 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:13:26.276083946 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:13:26.280916929 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:26.281099081 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:13:26.286154985 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:32.142061949 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:13:32.146970034 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:32.455060959 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:32.501008987 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:13:32.552443027 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:13:32.558012962 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:32.732079029 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:32.732336044 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:13:32.737212896 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:35.472769976 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:35.516582012 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:13:35.546808958 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:13:35.551842928 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:50.765440941 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:50.765952110 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:13:50.770767927 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:54.632209063 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:54.666264057 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:13:54.671606064 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:57.658540964 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:13:57.699090958 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:13:57.704221010 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:14:02.702924967 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:14:02.743608952 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:14:02.748678923 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:14:08.782021046 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:14:08.782320023 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:14:08.788913965 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:14:26.791515112 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:14:26.791692972 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:14:26.796799898 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:14:44.825001955 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:14:44.825357914 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:14:44.830495119 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:02.882661104 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:02.884843111 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:02.889997005 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:18.439989090 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:18.479739904 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:18.485356092 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:20.891350985 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:20.893440008 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:20.898462057 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:21.457317114 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:21.513179064 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:21.518201113 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:24.481426001 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:24.544212103 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:24.549083948 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:27.511253119 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:27.556701899 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:27.561953068 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:30.537621975 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:30.595518112 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:30.601322889 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:33.567269087 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:33.620892048 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:33.625911951 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:36.588613987 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:36.635577917 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:36.641448975 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:38.889575005 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:38.889795065 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:39.141957998 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:39.142009020 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:39.142683029 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:39.627569914 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:39.670746088 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:39.692205906 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:39.698250055 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:42.636113882 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:42.701000929 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:42.712647915 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:47.910871029 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:47.913347960 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:49.923856020 CEST4971716943192.168.2.618.192.93.86
            Jul 8, 2024 18:15:49.928883076 CEST169434971718.192.93.86192.168.2.6
            Jul 8, 2024 18:15:49.937984943 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:15:49.943368912 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:15:49.945307016 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:15:49.947604895 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:15:49.952650070 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:15:49.953303099 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:15:49.958645105 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:15:51.872101068 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:15:51.939064980 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:15:51.945029974 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:15:54.767394066 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:15:54.806215048 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:15:54.811647892 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:15:56.628695011 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:15:56.629098892 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:15:56.640582085 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:15:58.288058996 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:15:58.288794994 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:15:58.288917065 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:15:58.320530891 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:15:58.518594027 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:15:58.518656969 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:15:58.525681019 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:16:00.817461014 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:16:00.870003939 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:16:00.876492023 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:16:00.881706953 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:16:04.850775957 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:16:04.901065111 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:16:04.905962944 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:16:14.563033104 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:16:14.563244104 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:16:14.569116116 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:16:32.977298975 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:16:32.977569103 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:16:32.980880022 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:16:32.980959892 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:16:32.984558105 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:16:50.613889933 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:16:50.614052057 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:16:50.622395039 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:17:08.612670898 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:17:08.612869024 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:17:08.618752003 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:17:19.607773066 CEST169434973118.156.13.209192.168.2.6
            Jul 8, 2024 18:17:19.647943974 CEST4973116943192.168.2.618.156.13.209
            Jul 8, 2024 18:17:19.652987957 CEST169434973118.156.13.209192.168.2.6
            TimestampSource PortDest PortSource IPDest IP
            Jul 8, 2024 18:13:26.063364029 CEST6265453192.168.2.61.1.1.1
            Jul 8, 2024 18:13:26.076687098 CEST53626541.1.1.1192.168.2.6
            Jul 8, 2024 18:15:49.925180912 CEST5021753192.168.2.61.1.1.1
            Jul 8, 2024 18:15:49.936157942 CEST53502171.1.1.1192.168.2.6
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Jul 8, 2024 18:13:26.063364029 CEST192.168.2.61.1.1.10xa020Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
            Jul 8, 2024 18:15:49.925180912 CEST192.168.2.61.1.1.10x8bb8Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jul 8, 2024 18:13:26.076687098 CEST1.1.1.1192.168.2.60xa020No error (0)2.tcp.eu.ngrok.io18.192.93.86A (IP address)IN (0x0001)false
            Jul 8, 2024 18:15:49.936157942 CEST1.1.1.1192.168.2.60x8bb8No error (0)2.tcp.eu.ngrok.io18.156.13.209A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:12:13:09
            Start date:08/07/2024
            Path:C:\Users\user\Desktop\Game Laucher.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\Game Laucher.exe"
            Imagebase:0x30000
            File size:1'150'464 bytes
            MD5 hash:B24F58BB4315DFA0C7EFE2CB18BED37D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Borland Delphi
            Yara matches:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000002.2264558666.0000000000032000.00000040.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
            Reputation:low
            Has exited:true

            Target ID:2
            Start time:12:13:16
            Start date:08/07/2024
            Path:C:\Users\user\AppData\Local\Temp\windows process.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\AppData\Local\Temp\windows process.exe"
            Imagebase:0x6e0000
            File size:1'150'464 bytes
            MD5 hash:B24F58BB4315DFA0C7EFE2CB18BED37D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Borland Delphi
            Yara matches:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000002.00000002.4662154451.0000000003F41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Antivirus matches:
            • Detection: 100%, Avira
            • Detection: 100%, Joe Sandbox ML
            • Detection: 53%, ReversingLabs
            Reputation:low
            Has exited:false

            Target ID:3
            Start time:12:13:22
            Start date:08/07/2024
            Path:C:\Windows\SysWOW64\netsh.exe
            Wow64 process (32bit):true
            Commandline:netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\windows process.exe" "windows process.exe" ENABLE
            Imagebase:0xa60000
            File size:82'432 bytes
            MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:4
            Start time:12:13:22
            Start date:08/07/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff66e660000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:5
            Start time:12:13:23
            Start date:08/07/2024
            Path:C:\Windows\SysWOW64\taskkill.exe
            Wow64 process (32bit):true
            Commandline:taskkill /F /IM explorer.exe
            Imagebase:0xa10000
            File size:74'240 bytes
            MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:true

            Target ID:6
            Start time:12:13:23
            Start date:08/07/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff66e660000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:2.7%
              Dynamic/Decrypted Code Coverage:94.6%
              Signature Coverage:0%
              Total number of Nodes:37
              Total number of Limit Nodes:2
              execution_graph 22650 1b7598 22651 1b75a5 VirtualAlloc 22650->22651 22653 29dad5e 22656 29dad93 ReadFile 22653->22656 22655 29dadc5 22656->22655 22657 29da9de 22659 29daa13 GetFileType 22657->22659 22660 29daa40 22659->22660 22665 29da74e 22666 29da7b9 22665->22666 22667 29da77a FindCloseChangeNotification 22665->22667 22666->22667 22668 29da788 22667->22668 22689 29da2fe 22690 29da32a SetErrorMode 22689->22690 22691 29da353 22689->22691 22692 29da33f 22690->22692 22691->22690 22693 29daefa 22696 29daf23 CopyFileW 22693->22696 22695 29daf4a 22696->22695 22669 29da486 22671 29da4bb RegSetValueExW 22669->22671 22672 29da507 22671->22672 22673 29da646 22674 29da67e CreateMutexW 22673->22674 22676 29da6c1 22674->22676 22677 29da8c6 22678 29da8fe CreateFileW 22677->22678 22680 29da94d 22678->22680 22661 29da392 22664 29da3c7 RegQueryValueExW 22661->22664 22663 29da41b 22664->22663 22681 29db102 22683 29db128 ShellExecuteExW 22681->22683 22684 29db144 22683->22684 22685 29dae42 22686 29dae6b SetFileAttributesW 22685->22686 22688 29dae87 22686->22688

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 2e20310-2e20334 2 2e20336-2e20338 0->2 3 2e2033e-2e20346 0->3 2->3 4 2e20348-2e2034d 3->4 5 2e2034e-2e2035a 3->5 7 2e2035e 5->7 8 2e2035c 5->8 9 2e20362 7->9 10 2e20360 7->10 8->7 8->9 11 2e20366-2e20391 9->11 12 2e20364-2e20365 9->12 10->9 14 2e20393-2e203bb 11->14 15 2e203d8-2e20418 11->15 12->11 20 2e203ce 14->20 22 2e2041a 15->22 23 2e2041f 15->23 20->15 22->23 59 2e2041f call 37e05df 23->59 60 2e2041f call 37e0606 23->60 61 2e2041f call 2e20938 23->61 24 2e20425-2e20434 25 2e20436-2e20460 24->25 26 2e2046b-2e20523 24->26 25->26 45 2e20570-2e20587 26->45 46 2e20525-2e20569 26->46 47 2e20880 45->47 48 2e2058d-2e205bf 45->48 46->45 48->47 59->24 60->24 61->24
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2266519767.0000000002E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2e20000_Game Laucher.jbxd
              Similarity
              • API ID:
              • String ID: [Mj^$-[Mj^$2Yl$2Yl$2Yl$=[Mj^
              • API String ID: 0-495715389
              • Opcode ID: 86f6d30cfc6d97d3dc4a52f28205759c8cfedd7d319ed247da3c9e01fb3620d4
              • Instruction ID: b8f40c61d62f9effb1958f852c00d3316bccbccd07f8494703b03a82319d7a0f
              • Opcode Fuzzy Hash: 86f6d30cfc6d97d3dc4a52f28205759c8cfedd7d319ed247da3c9e01fb3620d4
              • Instruction Fuzzy Hash: 8861DF30B04210CBCB09DB79C410ABE77E7EB95208B5494A9E406DB7D1DF3ADC4A87A6

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 62 2e203bd-2e20418 70 2e2041a 62->70 71 2e2041f 62->71 70->71 107 2e2041f call 37e05df 71->107 108 2e2041f call 37e0606 71->108 109 2e2041f call 2e20938 71->109 72 2e20425-2e20434 73 2e20436-2e20460 72->73 74 2e2046b-2e20523 72->74 73->74 93 2e20570-2e20587 74->93 94 2e20525-2e20569 74->94 95 2e20880 93->95 96 2e2058d-2e205bf 93->96 94->93 96->95 107->72 108->72 109->72
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2266519767.0000000002E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2e20000_Game Laucher.jbxd
              Similarity
              • API ID:
              • String ID: [Mj^$-[Mj^$2Yl$2Yl$2Yl$=[Mj^
              • API String ID: 0-495715389
              • Opcode ID: 2175f99b763c26c4bf28d2b828810948b25e006782c08c4798ec859eb6467fd7
              • Instruction ID: 97bc0801cd234262c7e00bc1954f7fdfc3a560f380ee495da631e03bb702efc6
              • Opcode Fuzzy Hash: 2175f99b763c26c4bf28d2b828810948b25e006782c08c4798ec859eb6467fd7
              • Instruction Fuzzy Hash: E741B130B042148BCB09EB79C4246BE33E79FD5248B58946DE416DBBD5DF39CC0A97A2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 110 2e20938-2e20942 111 2e20946-2e20993 110->111 112 2e20944 110->112 114 2e20999-2e20a22 111->114 115 2e20a2e-2e20a30 111->115 112->111 264 2e20a24 call 37e05df 114->264 265 2e20a24 call 37e0606 114->265 116 2e20a37-2e20a3c 115->116 117 2e20a42-2e20a7a 116->117 118 2e20b1e-2e20bc2 116->118 135 2e20aa1-2e20afc 117->135 136 2e20a7c-2e20a9a 117->136 156 2e20bc8-2e20c8b 118->156 157 2e20c9e-2e20ca7 118->157 174 2e20b01 135->174 136->135 155 2e20a2a-2e20a2c 155->115 159 2e20a32 155->159 156->157 160 2e20d51-2e20d5a 157->160 161 2e20cad-2e20d3e 157->161 159->116 162 2e20d7a-2e20d83 160->162 163 2e20d5c-2e20d73 160->163 161->160 166 2e20d85-2e20d96 162->166 167 2e20da9-2e20db2 162->167 163->162 166->167 171 2e20f33-2e20f3a 167->171 172 2e20db8-2e20e06 167->172 192 2e20f1c-2e20f2d 172->192 174->118 192->171 194 2e20e0b-2e20e14 192->194 195 2e20f40-2e20fd1 194->195 196 2e20e1a-2e20f1a 194->196 227 2e20fd7-2e20fe8 195->227 228 2e210ca 195->228 196->192 245 2e20f3b 196->245 234 2e20fea-2e2100b 227->234 229 2e210cc-2e210d3 228->229 242 2e21012-2e21048 234->242 243 2e2100d 234->243 251 2e2104a 242->251 252 2e2104f-2e21077 242->252 243->242 245->195 251->252 256 2e21079-2e2107b 252->256 257 2e2107d-2e210a1 252->257 256->229 260 2e210a3-2e210a8 257->260 261 2e210aa-2e210b4 257->261 260->229 262 2e210b6-2e210b8 261->262 263 2e210ba-2e210c4 261->263 262->229 263->228 263->234 264->155 265->155
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2266519767.0000000002E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2e20000_Game Laucher.jbxd
              Similarity
              • API ID:
              • String ID: :@2l$\OYl
              • API String ID: 0-3579895576
              • Opcode ID: 927917f87566fd323cf19a5814e142dc7644fd84f12c05ed7b3c611427889fda
              • Instruction ID: 2aa25d43231a4b13469cb13ec10afc3d85f12475c198619ea31d5116e97bb033
              • Opcode Fuzzy Hash: 927917f87566fd323cf19a5814e142dc7644fd84f12c05ed7b3c611427889fda
              • Instruction Fuzzy Hash: 84026D30711210DFDB18EB74D860AAD77E2EF89208F54846DD806DB7A5DF3A9C4ACB91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 325 29da8a4-29da91e 329 29da920 325->329 330 29da923-29da92f 325->330 329->330 331 29da934-29da93d 330->331 332 29da931 330->332 333 29da93f-29da963 CreateFileW 331->333 334 29da98e-29da993 331->334 332->331 337 29da995-29da99a 333->337 338 29da965-29da98b 333->338 334->333 337->338
              APIs
              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 029DA945
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: bfcefcbbfcc8281e0df4d381ab2f5c1db3cca884f9b3c636b6c2eeebc287a4c9
              • Instruction ID: 443bd892360a5683f9c0438b6513aec3b56d3a10219b93478f9e686753602506
              • Opcode Fuzzy Hash: bfcefcbbfcc8281e0df4d381ab2f5c1db3cca884f9b3c636b6c2eeebc287a4c9
              • Instruction Fuzzy Hash: 6931DF71505340AFE722CF65CC44FA2FBF8EF45224F08889EE9898B652D325E819CB71

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 341 29da612-29da695 345 29da69a-29da6a3 341->345 346 29da697 341->346 347 29da6a8-29da6b1 345->347 348 29da6a5 345->348 346->345 349 29da6b3-29da6d7 CreateMutexW 347->349 350 29da702-29da707 347->350 348->347 353 29da709-29da70e 349->353 354 29da6d9-29da6ff 349->354 350->349 353->354
              APIs
              • CreateMutexW.KERNELBASE(?,?), ref: 029DA6B9
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: ae0b52949d24cc5e75a1184e428afc0d6224fa26fc26ca8a984bbbec138d32f8
              • Instruction ID: 07bd3514d9a88bd836eb746c75f441575c8488cc188b4ac06cf3adf62b2c4f87
              • Opcode Fuzzy Hash: ae0b52949d24cc5e75a1184e428afc0d6224fa26fc26ca8a984bbbec138d32f8
              • Instruction Fuzzy Hash: D831A4B55093806FE712CB25CC85B96FFF8EF06214F08849AE984CF292D365E909C771

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 357 29da361-29da3cf 360 29da3d4-29da3dd 357->360 361 29da3d1 357->361 362 29da3df 360->362 363 29da3e2-29da3e8 360->363 361->360 362->363 364 29da3ed-29da404 363->364 365 29da3ea 363->365 367 29da43b-29da440 364->367 368 29da406-29da419 RegQueryValueExW 364->368 365->364 367->368 369 29da41b-29da438 368->369 370 29da442-29da447 368->370 370->369
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E90,554A37A4,00000000,00000000,00000000,00000000), ref: 029DA40C
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 1d56a5375d24ba1b9b37614c1185b68eb91332031bd33538d2055e1fc39af309
              • Instruction ID: 2982658c5bd65b7f414971eea1458e830afb176494472f833039ca2b5411322e
              • Opcode Fuzzy Hash: 1d56a5375d24ba1b9b37614c1185b68eb91332031bd33538d2055e1fc39af309
              • Instruction Fuzzy Hash: C8319175505780AFE722CF11CC84F92FBBCEF06214F08849AE989CB292D364E909CB71

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 374 29da99c-29daa29 378 29daa5e-29daa63 374->378 379 29daa2b-29daa3e GetFileType 374->379 378->379 380 29daa65-29daa6a 379->380 381 29daa40-29daa5d 379->381 380->381
              APIs
              • GetFileType.KERNELBASE(?,00000E90,554A37A4,00000000,00000000,00000000,00000000), ref: 029DAA31
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: 5dd4a9eed7b715ecba88b886d224aafc1cc013234eef5fbba90b8b1f6b790846
              • Instruction ID: a82e73804265f680010dade9e981a199af003bc3499a7a36494b122fb791710a
              • Opcode Fuzzy Hash: 5dd4a9eed7b715ecba88b886d224aafc1cc013234eef5fbba90b8b1f6b790846
              • Instruction Fuzzy Hash: 14210DB55097806FD7128B21DC41BA2BF7CDF47724F1881D6E9848B253D3649909C7B1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 385 29da462-29da4c3 388 29da4c8-29da4d4 385->388 389 29da4c5 385->389 390 29da4d9-29da4f0 388->390 391 29da4d6 388->391 389->388 393 29da527-29da52c 390->393 394 29da4f2-29da505 RegSetValueExW 390->394 391->390 393->394 395 29da52e-29da533 394->395 396 29da507-29da524 394->396 395->396
              APIs
              • RegSetValueExW.KERNELBASE(?,00000E90,554A37A4,00000000,00000000,00000000,00000000), ref: 029DA4F8
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 2a146ed3caaa901544b60859c3da006c3185f0edda1e46d46742f2beafe4712a
              • Instruction ID: 55b8f774bf32a8bc9dbe63b79e923a5b311b75d304d46d8619e1ae587e3c6f0a
              • Opcode Fuzzy Hash: 2a146ed3caaa901544b60859c3da006c3185f0edda1e46d46742f2beafe4712a
              • Instruction Fuzzy Hash: 5921A1B65043806FDB228F11DC44FA7BFBCEF46214F08849AE989CB652D364E958C7B1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 400 29da8c6-29da91e 403 29da920 400->403 404 29da923-29da92f 400->404 403->404 405 29da934-29da93d 404->405 406 29da931 404->406 407 29da93f-29da947 CreateFileW 405->407 408 29da98e-29da993 405->408 406->405 409 29da94d-29da963 407->409 408->407 411 29da995-29da99a 409->411 412 29da965-29da98b 409->412 411->412
              APIs
              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 029DA945
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: f09078cfee8388ed307f0f938a9c58d73b99ab745fc36c0ae4541b44badbc788
              • Instruction ID: 1280653e1ab60544b6d0cc8bc770874ed8678234c7693f5c1ed5e68d44010ed1
              • Opcode Fuzzy Hash: f09078cfee8388ed307f0f938a9c58d73b99ab745fc36c0ae4541b44badbc788
              • Instruction Fuzzy Hash: EF219071501240AFE721CF65CD45F66FBE8EF04224F08885EE9898B751D375E418DB71

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 415 29da646-29da695 418 29da69a-29da6a3 415->418 419 29da697 415->419 420 29da6a8-29da6b1 418->420 421 29da6a5 418->421 419->418 422 29da6b3-29da6bb CreateMutexW 420->422 423 29da702-29da707 420->423 421->420 425 29da6c1-29da6d7 422->425 423->422 426 29da709-29da70e 425->426 427 29da6d9-29da6ff 425->427 426->427
              APIs
              • CreateMutexW.KERNELBASE(?,?), ref: 029DA6B9
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: 563b88979fd00989d69fe0c984e34f21eb7a990b2cec99e1f5c95492264aecd8
              • Instruction ID: 0bd8a30f17d6f514741f0978fac6d69c3c45c29d0d61ae54313e6c3a9ab86721
              • Opcode Fuzzy Hash: 563b88979fd00989d69fe0c984e34f21eb7a990b2cec99e1f5c95492264aecd8
              • Instruction Fuzzy Hash: 8721A475501200AFE720CF65CD45BA6FBE8EF04614F04C869ED488F741D775E519CAB5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 430 29da710-29da778 432 29da7b9-29da7be 430->432 433 29da77a-29da782 FindCloseChangeNotification 430->433 432->433 434 29da788-29da79a 433->434 436 29da79c-29da7b8 434->436 437 29da7c0-29da7c5 434->437 437->436
              APIs
              • FindCloseChangeNotification.KERNELBASE(?), ref: 029DA780
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: ChangeCloseFindNotification
              • String ID:
              • API String ID: 2591292051-0
              • Opcode ID: 0a3b7296f9348b9232fb2c66d7df3387433dbc86f3df98fffd9f9ec73313e584
              • Instruction ID: d240d2c75d93c5be994f19aeb1966d84523f5f744abb83def1d666fbf6046281
              • Opcode Fuzzy Hash: 0a3b7296f9348b9232fb2c66d7df3387433dbc86f3df98fffd9f9ec73313e584
              • Instruction Fuzzy Hash: B321F3B54093809FDB128B25DC85B52BFB8EF03224F0984EBDC848F653D2259909DB62

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 439 29dad3e-29dadb5 443 29dadf9-29dadfe 439->443 444 29dadb7-29dadd7 ReadFile 439->444 443->444 447 29dadd9-29dadf6 444->447 448 29dae00-29dae05 444->448 448->447
              APIs
              • ReadFile.KERNELBASE(?,00000E90,554A37A4,00000000,00000000,00000000,00000000), ref: 029DADBD
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: 1f8f8780d4c06498d966d565eea27993aa2ceba3eba45b390c5a8a86f0a30dba
              • Instruction ID: 20d7dca95fc3a2e931a1878f33b78278dcdc6d4616393d8e8bc3bcd1115061f9
              • Opcode Fuzzy Hash: 1f8f8780d4c06498d966d565eea27993aa2ceba3eba45b390c5a8a86f0a30dba
              • Instruction Fuzzy Hash: 1F21C372405380AFDB22CF51DC44F97FFB8EF45314F08849AE9889B652D325A508CBB5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 451 29da392-29da3cf 453 29da3d4-29da3dd 451->453 454 29da3d1 451->454 455 29da3df 453->455 456 29da3e2-29da3e8 453->456 454->453 455->456 457 29da3ed-29da404 456->457 458 29da3ea 456->458 460 29da43b-29da440 457->460 461 29da406-29da419 RegQueryValueExW 457->461 458->457 460->461 462 29da41b-29da438 461->462 463 29da442-29da447 461->463 463->462
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E90,554A37A4,00000000,00000000,00000000,00000000), ref: 029DA40C
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 391e43e24118de5cd9d649269859e90c7dd3214a10a9c19be9b8ac6f32947dc6
              • Instruction ID: e451e42f748f00c6f0d9e7c55e2c3a4627c8a55f63e627ab539e8a863a5cf7b3
              • Opcode Fuzzy Hash: 391e43e24118de5cd9d649269859e90c7dd3214a10a9c19be9b8ac6f32947dc6
              • Instruction Fuzzy Hash: 27219D76600604AFEB20CF55CC84FA6F7ECEF04624F08C46AED498B651D760F919DAB2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 467 29daece-29daf21 469 29daf26-29daf2c 467->469 470 29daf23 467->470 471 29daf2e 469->471 472 29daf31-29daf3a 469->472 470->469 471->472 473 29daf7d-29daf82 472->473 474 29daf3c-29daf5c CopyFileW 472->474 473->474 477 29daf5e-29daf7a 474->477 478 29daf84-29daf89 474->478 478->477
              APIs
              • CopyFileW.KERNELBASE(?,?,?), ref: 029DAF42
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: CopyFile
              • String ID:
              • API String ID: 1304948518-0
              • Opcode ID: aff67879b591acc7d51b0f30383b7fdf490a46cedb5feff435561400d848c6e5
              • Instruction ID: fe598c49a683e85cde1623ff52e87dac01f2dd02cafd119fa274c543be5cd72e
              • Opcode Fuzzy Hash: aff67879b591acc7d51b0f30383b7fdf490a46cedb5feff435561400d848c6e5
              • Instruction Fuzzy Hash: C12181B25053809FD751CF25DC85B56BFF8EF06210F0884EAE845CB262D325E854DB61
              APIs
              • SetFileAttributesW.KERNELBASE(?,?), ref: 029DAE7F
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: 71b5dbbb556caa693cd0e5f58c97291a3d25ab1920f1251679e6c104da835b5a
              • Instruction ID: e3c095a38c8567282b035983119afe84dc9987050b6ae8d950a5257e0bbfcac8
              • Opcode Fuzzy Hash: 71b5dbbb556caa693cd0e5f58c97291a3d25ab1920f1251679e6c104da835b5a
              • Instruction Fuzzy Hash: 2E21F3755093C05FDB12CB25DC95B92BFE8EF02314F0D84EAD8848F253D2259909CB71
              APIs
              • RegSetValueExW.KERNELBASE(?,00000E90,554A37A4,00000000,00000000,00000000,00000000), ref: 029DA4F8
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 42132a969658c63ec8ef330a6a50f3cefa23793970153e8ca9f380232a5531d6
              • Instruction ID: 393adbefad8896e1cf7b9be1aa479bc01bcaec1c050e09bf3d8ae00ff8dcfd9c
              • Opcode Fuzzy Hash: 42132a969658c63ec8ef330a6a50f3cefa23793970153e8ca9f380232a5531d6
              • Instruction Fuzzy Hash: E811D0B6600600AFEB218F11CC45FA7FBACEF04614F04C45AED498A741D360E518DAB2
              APIs
              • SetErrorMode.KERNELBASE(?), ref: 029DA330
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: 49571b651ecd44a82f9d98deac48b27e0516f198ed34563794b89423845c93bd
              • Instruction ID: 1bbc82a3d37f087885ce52ecca94c5e75310941b4ea3f5703f1f2071a70d6aac
              • Opcode Fuzzy Hash: 49571b651ecd44a82f9d98deac48b27e0516f198ed34563794b89423845c93bd
              • Instruction Fuzzy Hash: 2D21297540E3C09FDB138B25DC95B52BFB49F07224F0984DBDD848F2A3D269A818DB62
              APIs
              • ReadFile.KERNELBASE(?,00000E90,554A37A4,00000000,00000000,00000000,00000000), ref: 029DADBD
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: fa3ad3c59cf54a90d12df25c9971185a7622f5dedd8b7310fad507c5c7d29f55
              • Instruction ID: 0175bb88509d0a9c85cadeb865b46913192463d7628273033d3e12101bc6be56
              • Opcode Fuzzy Hash: fa3ad3c59cf54a90d12df25c9971185a7622f5dedd8b7310fad507c5c7d29f55
              • Instruction Fuzzy Hash: 5C110172500200AFEB21CF51DC40FA6FBB8EF44324F04C85AE9498B651C731E518CBB2
              APIs
              • ShellExecuteExW.SHELL32(?), ref: 029DB13C
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: ExecuteShell
              • String ID:
              • API String ID: 587946157-0
              • Opcode ID: c4b5e74ccee4b7d7666917f444c42c6b16b2f192742d073b928cc75504615e55
              • Instruction ID: f697597d17cb3decc741797751ac1e32d328dc995de253a6bcf6c07a9f7c6c79
              • Opcode Fuzzy Hash: c4b5e74ccee4b7d7666917f444c42c6b16b2f192742d073b928cc75504615e55
              • Instruction Fuzzy Hash: 7C11E2755093809FCB12CF25DC94B52BFB8DF06224F09C0EAEC44CF252D224E808CB62
              APIs
              • CopyFileW.KERNELBASE(?,?,?), ref: 029DAF42
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: CopyFile
              • String ID:
              • API String ID: 1304948518-0
              • Opcode ID: 1ad035d4a3ce546ac3958c88f78e389ce09ab1cfa988804a87b04dbd57df811f
              • Instruction ID: 3b9e38741fe9785f0d901bce21e38f35a59f399a0279e41e1599465f56b86288
              • Opcode Fuzzy Hash: 1ad035d4a3ce546ac3958c88f78e389ce09ab1cfa988804a87b04dbd57df811f
              • Instruction Fuzzy Hash: F81161B66002009FDB50CF69DC85B56FBE8EF04624F08C4BADD49CB751D775E418DA62
              APIs
              • GetFileType.KERNELBASE(?,00000E90,554A37A4,00000000,00000000,00000000,00000000), ref: 029DAA31
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: c712594ca7d8e736038e576480d2bc7ebb5794eb7fd301c2d0d7ce93ed33a8a6
              • Instruction ID: b1d539083824840edb781db1422520453fe8f0c1b34f16749b571cc1c55caf8b
              • Opcode Fuzzy Hash: c712594ca7d8e736038e576480d2bc7ebb5794eb7fd301c2d0d7ce93ed33a8a6
              • Instruction Fuzzy Hash: B101F575500200AFE720CB11DD85BA6F7ACDF44724F18C09AED098B741D375E518CAF6
              APIs
              • SetFileAttributesW.KERNELBASE(?,?), ref: 029DAE7F
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: d7cdb517863394a626180010d64a1be94eb802a2f3407c9cbf3373422e5e5afb
              • Instruction ID: 683209ba855c57a07009ec2b116f602bda610c2b85ecc10e63da6153d1ad2272
              • Opcode Fuzzy Hash: d7cdb517863394a626180010d64a1be94eb802a2f3407c9cbf3373422e5e5afb
              • Instruction Fuzzy Hash: 0E01B176A012009FDB50CF25D885766FBE8EF04224F08C8AADC89CB752E375E514DB72
              APIs
              • ShellExecuteExW.SHELL32(?), ref: 029DB13C
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: ExecuteShell
              • String ID:
              • API String ID: 587946157-0
              • Opcode ID: 1b814ea69f50f4cfc0de58561c531e71ff70a560c4139bdad46e8e56ba88c5fb
              • Instruction ID: d9f2907325658a0a9b6ff3d5ee3c6adf9da34d1bf02181ee1f70733e9d91454a
              • Opcode Fuzzy Hash: 1b814ea69f50f4cfc0de58561c531e71ff70a560c4139bdad46e8e56ba88c5fb
              • Instruction Fuzzy Hash: 83019E766002409FDB10CF69D985B66FBE8EF04228F08C4AADD49CF752D775E408DB62
              APIs
              • FindCloseChangeNotification.KERNELBASE(?), ref: 029DA780
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: ChangeCloseFindNotification
              • String ID:
              • API String ID: 2591292051-0
              • Opcode ID: 91b18dc3d14ead484ea3668acd6815c162a24dcace4c2a3d850f6ef70f3f2b10
              • Instruction ID: 9211fea224b2a0ae09ed70a194025b3b94a1610f134bb8d0382d80fe52ebea02
              • Opcode Fuzzy Hash: 91b18dc3d14ead484ea3668acd6815c162a24dcace4c2a3d850f6ef70f3f2b10
              • Instruction Fuzzy Hash: DB01A2759002409FDB10CF55D985766FBB4EF00624F08C4ABDD498F752D375E458DEA2
              APIs
              • SetErrorMode.KERNELBASE(?), ref: 029DA330
              Memory Dump Source
              • Source File: 00000000.00000002.2265971797.00000000029DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29da000_Game Laucher.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: e422801444eea89a1d0e0dd804c5e625c6dfd38f9ffcde5665f9e5734465fc33
              • Instruction ID: 355e2e2ba1e4edb32c34ed24a2b716c91ae4fe08fd3169b573e67d4f887026e3
              • Opcode Fuzzy Hash: e422801444eea89a1d0e0dd804c5e625c6dfd38f9ffcde5665f9e5734465fc33
              • Instruction Fuzzy Hash: E7F0CD35904240DFDB20CF09D889761FBA4EF04724F48C4AADD494F752E3BAE468DEA2
              APIs
              • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 001B75C3
              Memory Dump Source
              • Source File: 00000000.00000002.2264581590.00000000001AB000.00000040.00000001.01000000.00000003.sdmp, Offset: 0004A000, based on PE: true
              • Associated: 00000000.00000002.2264581590.000000000004A000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2264581590.000000000018B000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2264581590.0000000000190000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_30000_Game Laucher.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID:
              • API String ID: 4275171209-0
              • Opcode ID: cb148c8c30d8ffb178d6c7c7ea942aa275c310c40d6b800f0f3ee4a01b82382d
              • Instruction ID: fa55e162a5c315ba6b7da191d2254ed6a4ba88200f7b2e0fd6cba7e9fc5f2746
              • Opcode Fuzzy Hash: cb148c8c30d8ffb178d6c7c7ea942aa275c310c40d6b800f0f3ee4a01b82382d
              • Instruction Fuzzy Hash: 8DE0E2B6304208ABDB20CE8CD984FAA339DE788310F108021FA0AD7780C334EC509B65
              Memory Dump Source
              • Source File: 00000000.00000002.2266519767.0000000002E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2e20000_Game Laucher.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 79a9c6ca6a8abb7a4311d78d35a5c2f151a0547cdc7278a790208455be3d04b0
              • Instruction ID: 67fded1ffd96dfe5577623ddfb552b2a6f9c50200ef54f7762e05fd7f858e195
              • Opcode Fuzzy Hash: 79a9c6ca6a8abb7a4311d78d35a5c2f151a0547cdc7278a790208455be3d04b0
              • Instruction Fuzzy Hash: 1C717E3160E3C1CFC702DB34E9659D93BB2EF92208745C9EAD4458B267DB285D4DCB92
              Memory Dump Source
              • Source File: 00000000.00000002.2266994663.00000000037E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_37e0000_Game Laucher.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2cdff236388c2fdd0ff0c50fed8c6a92d291688419fe903c0c9fe19cca3709ca
              • Instruction ID: dfe60061e8967630f4c4aebb26b23192006449581749e9a271fc2b0c90ab4dac
              • Opcode Fuzzy Hash: 2cdff236388c2fdd0ff0c50fed8c6a92d291688419fe903c0c9fe19cca3709ca
              • Instruction Fuzzy Hash: 4B0186B65093805FD711CF05EC85862FFB8EF86620749C49FEC498B712D225B909CBB2
              Memory Dump Source
              • Source File: 00000000.00000002.2266519767.0000000002E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2e20000_Game Laucher.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 60c3da63509447321a5647ad33a16f26fd75b183066f679518c52926209d34f4
              • Instruction ID: f15440916cf1fcac8f9d776bff1e47b1cda581e292a717c7822894751636b319
              • Opcode Fuzzy Hash: 60c3da63509447321a5647ad33a16f26fd75b183066f679518c52926209d34f4
              • Instruction Fuzzy Hash: 39018030A08382CFCB01ABB4D4984997BF1EF95308B84C81DE9968B355DE748C458B53
              Memory Dump Source
              • Source File: 00000000.00000002.2266994663.00000000037E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_37e0000_Game Laucher.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ce99ce48aa4aeda1b1970569b48042be6d4c07c9f445355979ead8ef5b43b100
              • Instruction ID: 87e2cbe76791e3bac7584248c3ce046119fca4bbbb69dd1b7221b7c1660e8278
              • Opcode Fuzzy Hash: ce99ce48aa4aeda1b1970569b48042be6d4c07c9f445355979ead8ef5b43b100
              • Instruction Fuzzy Hash: EEE012BAA046449F9750CF0AEC81452F7A4EF84630B58C47FDC0D8BB11E676B509CAA5
              Memory Dump Source
              • Source File: 00000000.00000002.2265950626.00000000029D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 029D2000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29d2000_Game Laucher.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cd662860ec918f8785afe4a1a0bd5011bf3a36a03d13cc9fe71211de2e90e441
              • Instruction ID: af59156ca83e210663395b6d98db6eb4b7e97e97c9f937c788e61325d107fa0d
              • Opcode Fuzzy Hash: cd662860ec918f8785afe4a1a0bd5011bf3a36a03d13cc9fe71211de2e90e441
              • Instruction Fuzzy Hash: 3AD05EB96096C14FE3178B1CC1A4F9537E8AB51708F4684FDAC048B7A3C768E982E200
              Memory Dump Source
              • Source File: 00000000.00000002.2265950626.00000000029D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 029D2000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_29d2000_Game Laucher.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fc338f76f7820b6aea84641caf8be0cc9cec80c6ff03b3ece2a1f87b50096ead
              • Instruction ID: 767b564d8496a846eade29b3d22039c1bd545c0c303eb7a7480737186ede245b
              • Opcode Fuzzy Hash: fc338f76f7820b6aea84641caf8be0cc9cec80c6ff03b3ece2a1f87b50096ead
              • Instruction Fuzzy Hash: 17D05E346002814BD715DB0CC2D4F5977E8AB80B08F1684ECAC108B7A2C3B4D981DA00
              Memory Dump Source
              • Source File: 00000000.00000002.2264581590.00000000001AB000.00000040.00000001.01000000.00000003.sdmp, Offset: 0004A000, based on PE: true
              • Associated: 00000000.00000002.2264581590.000000000004A000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2264581590.000000000018B000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2264581590.0000000000190000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_30000_Game Laucher.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0f51041bc8aa6d2c755f2798c0aa891acf9bf36ecc594d11263bff3e9af03130
              • Instruction ID: cf9819e0d18fa3cc75072f1463c33f231c3b650789b2b379f6286e0e5fd35dc1
              • Opcode Fuzzy Hash: 0f51041bc8aa6d2c755f2798c0aa891acf9bf36ecc594d11263bff3e9af03130
              • Instruction Fuzzy Hash: 02B1412241D2D04FC7934B78487A6F13FB4DE2BA10B0E0ADAD5D18F2B3D61A591BD326

              Execution Graph

              Execution Coverage:11.8%
              Dynamic/Decrypted Code Coverage:91.2%
              Signature Coverage:11.1%
              Total number of Nodes:217
              Total number of Limit Nodes:11
              execution_graph 19842 36418e0 19843 364152a 19842->19843 19848 36419b7 19843->19848 19857 36419ca 19843->19857 19866 3641999 19843->19866 19875 3641928 19843->19875 19849 36419be 19848->19849 19884 3640310 19849->19884 19851 3641a85 19852 3640310 2 API calls 19851->19852 19853 3641aee 19852->19853 19854 3641b14 19853->19854 19889 3642757 19853->19889 19893 36427b8 19853->19893 19858 36419d1 19857->19858 19859 3640310 2 API calls 19858->19859 19860 3641a85 19859->19860 19861 3640310 2 API calls 19860->19861 19862 3641aee 19861->19862 19863 3641b14 19862->19863 19864 3642757 2 API calls 19862->19864 19865 36427b8 2 API calls 19862->19865 19864->19863 19865->19863 19867 36419a0 19866->19867 19868 3640310 2 API calls 19867->19868 19869 3641a85 19868->19869 19870 3640310 2 API calls 19869->19870 19871 3641aee 19870->19871 19872 3641b14 19871->19872 19873 3642757 2 API calls 19871->19873 19874 36427b8 2 API calls 19871->19874 19873->19872 19874->19872 19876 3641963 19875->19876 19877 3640310 2 API calls 19876->19877 19878 3641a85 19877->19878 19879 3640310 2 API calls 19878->19879 19880 3641aee 19879->19880 19881 3641b14 19880->19881 19882 3642757 2 API calls 19880->19882 19883 36427b8 2 API calls 19880->19883 19882->19881 19883->19881 19885 3640322 19884->19885 19888 3640348 19885->19888 19897 3641ec0 19885->19897 19902 3641eb0 19885->19902 19888->19851 19890 3642760 19889->19890 19892 364278c 19890->19892 19915 3642dd0 19890->19915 19892->19854 19894 36427e3 19893->19894 19895 364282b 19894->19895 19896 3642dd0 2 API calls 19894->19896 19895->19854 19896->19895 19898 3641ee4 19897->19898 19901 3641f01 19898->19901 19907 37e010e 19898->19907 19911 37e00ec 19898->19911 19901->19888 19903 3641ee4 19902->19903 19904 3641f01 19903->19904 19905 37e010e NtSetInformationProcess 19903->19905 19906 37e00ec NtSetInformationProcess 19903->19906 19904->19888 19905->19904 19906->19904 19908 37e0143 NtSetInformationProcess 19907->19908 19909 37e016e 19907->19909 19910 37e0158 19908->19910 19909->19908 19910->19901 19912 37e010e NtSetInformationProcess 19911->19912 19914 37e0158 19912->19914 19914->19901 19916 3642e05 19915->19916 19917 3642e40 19916->19917 19920 37e1f76 19916->19920 19924 37e1fe6 19916->19924 19917->19892 19921 37e1fe6 GetVolumeInformationA 19920->19921 19923 37e203e 19921->19923 19923->19917 19925 37e2036 GetVolumeInformationA 19924->19925 19926 37e203e 19925->19926 19926->19917 19927 37e15fa 19928 37e1632 ConvertStringSecurityDescriptorToSecurityDescriptorW 19927->19928 19930 37e1673 19928->19930 20007 30aa74e 20008 30aa77a FindCloseChangeNotification 20007->20008 20009 30aa7b9 20007->20009 20010 30aa788 20008->20010 20009->20008 20011 37e3136 20012 37e316b ioctlsocket 20011->20012 20014 37e3197 20012->20014 19942 30aa486 19944 30aa4bb RegSetValueExW 19942->19944 19945 30aa507 19944->19945 19931 30aaa06 19932 30aaa6b 19931->19932 19933 30aaa35 WaitForInputIdle 19931->19933 19932->19933 19934 30aaa43 19933->19934 19935 74f978 19936 74f98c 19935->19936 19939 74f650 19936->19939 19940 74f664 19939->19940 19941 74f672 NtSetInformationFile 19939->19941 19941->19940 20018 30aa646 20019 30aa67e CreateMutexW 20018->20019 20021 30aa6c1 20019->20021 20022 37e0032 20023 37e0067 GetExitCodeProcess 20022->20023 20025 37e0090 20023->20025 20026 74f6b8 20027 74f6eb NtReadFile 20026->20027 20028 74f6cd 20026->20028 20027->20028 20029 37e0eb2 20030 37e0ede DispatchMessageA 20029->20030 20031 37e0f07 20029->20031 20032 37e0ef3 20030->20032 20031->20030 20033 74fab8 20034 74fae3 20033->20034 20037 74f710 20034->20037 20036 74fb3b 20038 74f725 20037->20038 20039 74f74b NtCreateFile 20037->20039 20038->20036 20039->20038 19946 30aa09a 19947 30aa0cf send 19946->19947 19948 30aa107 19946->19948 19949 30aa0dd 19947->19949 19948->19947 20040 30aac5a 20041 30aac92 CreateFileW 20040->20041 20043 30aace1 20041->20043 19950 37e1eea 19952 37e1f1f WSAConnect 19950->19952 19953 37e1f3e 19952->19953 20044 37e052a 20045 37e055f NtQuerySystemInformation 20044->20045 20046 37e058a 20044->20046 20047 37e0574 20045->20047 20046->20045 20048 37e17aa 20049 37e17e2 MapViewOfFile 20048->20049 20051 37e1831 20049->20051 19954 37e2f66 19955 37e2f9e RegCreateKeyExW 19954->19955 19957 37e3010 19955->19957 19958 37e0466 19959 37e0492 K32EnumProcesses 19958->19959 19961 37e04ae 19959->19961 19962 37e32e6 19963 37e331b GetProcessWorkingSetSize 19962->19963 19965 37e3347 19963->19965 19966 30aa392 19967 30aa3c7 RegQueryValueExW 19966->19967 19969 30aa41b 19967->19969 20052 37e3726 20055 37e3752 LoadLibraryShim 20052->20055 20054 37e3780 20055->20054 20056 30ab352 20057 30ab37b CopyFileW 20056->20057 20059 30ab3a2 20057->20059 20060 30aab52 20061 30aab8a RegOpenKeyExW 20060->20061 20063 30aabe0 20061->20063 20064 36403bd 20066 36403c4 20064->20066 20065 36405bf 20066->20065 20067 3641ec0 2 API calls 20066->20067 20068 3641eb0 2 API calls 20066->20068 20067->20065 20068->20065 20069 30ab1d6 20071 30ab1ff SetFileAttributesW 20069->20071 20072 30ab21b 20071->20072 20073 37e1c1e 20074 37e1c53 GetProcessTimes 20073->20074 20076 37e1c85 20074->20076 20077 3644084 20078 3644095 20077->20078 20079 364543a 20078->20079 20080 364544b 20078->20080 20083 364451e 20078->20083 20081 3641ec0 2 API calls 20079->20081 20082 3641ec0 2 API calls 20080->20082 20080->20083 20081->20083 20082->20083 19970 30ab4ae 19971 30ab4da FindClose 19970->19971 19972 30ab50c 19970->19972 19973 30ab4ef 19971->19973 19972->19971 19974 30aaaae 19975 30aaada OleInitialize 19974->19975 19976 30aab10 19974->19976 19977 30aaae8 19975->19977 19976->19975 19978 30abc22 19980 30abc4b LookupPrivilegeValueW 19978->19980 19981 30abc72 19980->19981 19982 30abda2 19985 30abdd1 AdjustTokenPrivileges 19982->19985 19984 30abdf3 19985->19984 19986 37e05d2 19987 37e0648 19986->19987 19988 37e0610 DuplicateHandle 19986->19988 19987->19988 19989 37e061e 19988->19989 20084 37e3212 20085 37e323b select 20084->20085 20087 37e3270 20085->20087 19990 37e1a4e 19991 37e1a83 shutdown 19990->19991 19993 37e1aac 19991->19993 19994 37e11ce 19996 37e1206 WSASocketW 19994->19996 19997 37e1242 19996->19997 19998 74f646 NtClose 19999 37e33ca 20001 37e33ff SetProcessWorkingSetSize 19999->20001 20002 37e342b 20001->20002 20097 37e1d0a 20098 37e1d45 getaddrinfo 20097->20098 20100 37e1db7 20098->20100 20101 30aa2fe 20102 30aa32a SetErrorMode 20101->20102 20103 30aa353 20101->20103 20104 30aa33f 20102->20104 20103->20102 20003 75204d 20004 751f48 20003->20004 20005 752052 KiUserCallbackDispatcher 20004->20005 20006 752097 20005->20006 20105 30aa172 20106 30aa1c2 EnumWindows 20105->20106 20107 30aa1ca 20106->20107 20108 30aad72 20110 30aada7 GetFileType 20108->20110 20111 30aadd4 20110->20111 20112 30ab0f2 20114 30ab127 WriteFile 20112->20114 20115 30ab159 20114->20115
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: $ $:@2l$:@2l$:@2l$:@2l$:@2l$:@2l$:@2l
              • API String ID: 0-1480468673
              • Opcode ID: 9ad5fed00e2e49aeaee4f5d91b58a4f57840452b7990f7489475c5ef6f7897b6
              • Instruction ID: bbb2464b60e35def4bd1cdcaf6ef36d4ea7dc54f699209c789b234792cc96c84
              • Opcode Fuzzy Hash: 9ad5fed00e2e49aeaee4f5d91b58a4f57840452b7990f7489475c5ef6f7897b6
              • Instruction Fuzzy Hash: 2F239D34B002148FDB14DB35DA55BAEB7B2AF85304F2480A9E50A9B7A1DF39DD86CF50

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1428 74fbd0-74fbe3 call 700d74 1431 74fbe5-74fbef call 700edc 1428->1431 1432 74fbf1-74fbf3 1428->1432 1431->1432 1434 74fcb5-74fcba 1432->1434 1435 74fbf9-74fc10 call 70102c 1432->1435 1435->1434 1439 74fc16-74fc53 call 700d74 call 74fbc8 call 7019c0 1435->1439 1446 74fc58-74fc82 call 6fe734 * 2 call 74fbc8 1439->1446 1455 74fc84-74fc89 1446->1455 1456 74fc9f-74fca3 1446->1456 1455->1456 1456->1446 1457 74fca5-74fcb0 call 70103c 1456->1457 1457->1434
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: GetProcAddress$kernel32.dll$ntdll.dll
              • API String ID: 0-3551693257
              • Opcode ID: f7902720d87e8a7f87f19f7c57d4ad27b253ad3792c67e1d66ed6435337fd045
              • Instruction ID: 2632684ecfefcba1870dd0613eed1388949cce057eb1cf33d94b0c30a204c930
              • Opcode Fuzzy Hash: f7902720d87e8a7f87f19f7c57d4ad27b253ad3792c67e1d66ed6435337fd045
              • Instruction Fuzzy Hash: CD1100B13406489BD762AB689CC6B2A32C4DB45790F210635FE44EE2C6EBACDC418274
              APIs
              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 030ABDEB
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: AdjustPrivilegesToken
              • String ID:
              • API String ID: 2874748243-0
              • Opcode ID: 6fedc8609664d93755be2d00aa0b2a1e00a75a3d23a1c9a182fe0e582f7bbe88
              • Instruction ID: 5ce3a86ff7fc38ec388b50b08dab9206310c0fcb037ac20cb9e36ddd56d7bd1b
              • Opcode Fuzzy Hash: 6fedc8609664d93755be2d00aa0b2a1e00a75a3d23a1c9a182fe0e582f7bbe88
              • Instruction Fuzzy Hash: FB21BF75509780AFDB12CF25DC44B92BFF8EF06210F0885DAE9858F163D2319918DB62
              APIs
              • NtQuerySystemInformation.NTDLL ref: 037E0565
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: InformationQuerySystem
              • String ID:
              • API String ID: 3562636166-0
              • Opcode ID: facf79b30d31d3cdb893468539aeba4746e4a85b38895ebf23e650be3e5d73a8
              • Instruction ID: 203f2aa982f56dc7a7772963de4f9f4c3b5b0bf4b52c47f00c9055b95139fbba
              • Opcode Fuzzy Hash: facf79b30d31d3cdb893468539aeba4746e4a85b38895ebf23e650be3e5d73a8
              • Instruction Fuzzy Hash: 2521C0B14097C09FDB238B21DC45A52FFB4EF07314F0D80DBE9844B163D265A909DB62
              APIs
              • NtCreateFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 0074F768
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 89e007958f43f54a2f5ee1435b583d3af037074fc09fc3700ed69b886460a45e
              • Instruction ID: e12816a64c5cb086c9201ca18374405030c0a4394b56976bc9e65d8f86ca3281
              • Opcode Fuzzy Hash: 89e007958f43f54a2f5ee1435b583d3af037074fc09fc3700ed69b886460a45e
              • Instruction Fuzzy Hash: 84014AB6200249BF9B10DE9ADCC5DDBBBACFB8D654F454015FB1897202C234AD518BB0
              APIs
              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 030ABDEB
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: AdjustPrivilegesToken
              • String ID:
              • API String ID: 2874748243-0
              • Opcode ID: 0f26a3f85d701ff7279e1795348c6d2770c0190c4f513cf8e7e4c2762ed36797
              • Instruction ID: 43249dfcccea5d4dd5f80a3a58ca30eac019a37ee62ce0d8c19691f5dbb49dab
              • Opcode Fuzzy Hash: 0f26a3f85d701ff7279e1795348c6d2770c0190c4f513cf8e7e4c2762ed36797
              • Instruction Fuzzy Hash: 701182715017009FDB20CF99E984BA6FBE8EF04220F08C8AEDE458B652D375E458DF61
              APIs
              • NtSetInformationProcess.NTDLL ref: 037E0149
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: InformationProcess
              • String ID:
              • API String ID: 1801817001-0
              • Opcode ID: 6dcd3341bdd9ed1451f6ab6260fb37df02d46d705e1ef9cf804f1d15f19d5177
              • Instruction ID: 96056971d44a854c7f827f475284b9d443aa04f2bb723a3feb2a4bed8159f06c
              • Opcode Fuzzy Hash: 6dcd3341bdd9ed1451f6ab6260fb37df02d46d705e1ef9cf804f1d15f19d5177
              • Instruction Fuzzy Hash: 9511EC35008380AFCB228F11DC44E62FFB4EF0A220F0884CEED844B662C275A818CB62
              APIs
              • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?), ref: 0074F700
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: a77b9586c4717f208cb31dc98a300a7ac82f182e919658ee9b70c7eacfb66829
              • Instruction ID: e627cf994e7de34c6063c7aef6c5c5691960b7678970eb68780c987f36cb24ed
              • Opcode Fuzzy Hash: a77b9586c4717f208cb31dc98a300a7ac82f182e919658ee9b70c7eacfb66829
              • Instruction Fuzzy Hash: 4CF09CB6100259BF9710CE9ADCC4DEB7B6CFB8D764B448015FA1997201C274AD50CBB0
              APIs
              • NtQuerySystemInformation.NTDLL ref: 037E0565
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: InformationQuerySystem
              • String ID:
              • API String ID: 3562636166-0
              • Opcode ID: d355c407be7020ab01b8116dc9b677cea0864ed994b7957098cc7be3f5300de4
              • Instruction ID: 350fa957a6138932df95ad4c2f1af9bb9c098f683fdcc3bb5af8fb9e64733323
              • Opcode Fuzzy Hash: d355c407be7020ab01b8116dc9b677cea0864ed994b7957098cc7be3f5300de4
              • Instruction Fuzzy Hash: 7601AD715007409FDB20CF46D984B61FBA0EF09724F08C49EDD590B612D3B6E458DFA2
              APIs
              • NtSetInformationProcess.NTDLL ref: 037E0149
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: InformationProcess
              • String ID:
              • API String ID: 1801817001-0
              • Opcode ID: d355c407be7020ab01b8116dc9b677cea0864ed994b7957098cc7be3f5300de4
              • Instruction ID: bb07489a340b83b243646e148665e289a17f3e55fb742a9d4a0085b205c91e25
              • Opcode Fuzzy Hash: d355c407be7020ab01b8116dc9b677cea0864ed994b7957098cc7be3f5300de4
              • Instruction Fuzzy Hash: C7018F355006409FDB20CF46D944B65FBA0EF09625F08C09EDD490E615D3B5E458DFA2
              APIs
              • NtSetInformationFile.NTDLL(?,?,?,?,?), ref: 0074F677
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: FileInformation
              • String ID:
              • API String ID: 4253254148-0
              • Opcode ID: 849649d640c59efa852fcbbf55676e3927d57612f159cb85f61aff849fca88d9
              • Instruction ID: e13aee68eda9c209681747172e2a04b30ce615b0deca15608f254542b48c2660
              • Opcode Fuzzy Hash: 849649d640c59efa852fcbbf55676e3927d57612f159cb85f61aff849fca88d9
              • Instruction Fuzzy Hash: D0E017A21001547EE72057ABAC0CEEB7FACEFCABB1B15846AF518D3120C364AC44C6B1
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Close
              • String ID:
              • API String ID: 3535843008-0
              • Opcode ID: 2b96eb5b4056f9dc35a20f807748ccc3b404a1493c396d52f8927614c6b5be46
              • Instruction ID: 55f7d2bf0783267a8744e0c49cb52e904c110bae832d9d907518774048569e49
              • Opcode Fuzzy Hash: 2b96eb5b4056f9dc35a20f807748ccc3b404a1493c396d52f8927614c6b5be46
              • Instruction Fuzzy Hash: 4DB09290C44A442EDF11E7F85D0C7D76A8DBF8C302F048494B020C2060CB288684E625
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Close
              • String ID:
              • API String ID: 3535843008-0
              • Opcode ID: 3597016a76f02f282c66b84c98d82c6356e6cfba4153ac2fec9bfc2dfad0e47b
              • Instruction ID: 327f7aa775cd7df1c46d4fd82d749e439b2b43576bfa431e98284d6b6b79ebad
              • Opcode Fuzzy Hash: 3597016a76f02f282c66b84c98d82c6356e6cfba4153ac2fec9bfc2dfad0e47b
              • Instruction Fuzzy Hash:
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0094d056b04c6c17507f3b996e4629d19dd8758711d04132d8d4baf7ff616489
              • Instruction ID: 2d4b00db094e76b67957b7b6f765bed77d6b817147a5ec7267aa3872202d328f
              • Opcode Fuzzy Hash: 0094d056b04c6c17507f3b996e4629d19dd8758711d04132d8d4baf7ff616489
              • Instruction Fuzzy Hash: 4101AC706082689FC715E6359D81A9A7BEDEB4D310F4045B9F50DD32B2F6345D50C954
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2638bc3255d2f5580471076e9a504c584781273c3e016f3865964de7511cd930
              • Instruction ID: f909288c99e82d107ca33e73c4ce51c55d6b1b18e04bfd2e62ed738e52f5dfa4
              • Opcode Fuzzy Hash: 2638bc3255d2f5580471076e9a504c584781273c3e016f3865964de7511cd930
              • Instruction Fuzzy Hash: 2FF03675E0060CEBCF60EFA4C8C8ADDB7F9EB08320F1046D2B55893281E7359F518A51
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 09b5d102a133842556b193053f5de286db46d1de97e982ea93665c7b990029db
              • Instruction ID: 52e5a9fd5bd30c62c503d0cbbc62e89bbb971fe6a0fdfb5ea108518994bf3344
              • Opcode Fuzzy Hash: 09b5d102a133842556b193053f5de286db46d1de97e982ea93665c7b990029db
              • Instruction Fuzzy Hash: C7D09E7210020DAA9B01EEE8DD45DDB33DCAA08610F004616B915C7142EA34E51447B0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 743 3640310-3640334 745 3640336-3640338 743->745 746 364033e-3640346 743->746 745->746 747 364034e-3640391 746->747 748 3640348-364034d 746->748 751 3640393-36403ce 747->751 752 36403d8-3640418 747->752 751->752 759 364041f 752->759 760 364041a 752->760 804 364041f call 3640f05 759->804 805 364041f call 3640e55 759->805 806 364041f call 3640d40 759->806 807 364041f call 3da05df 759->807 808 364041f call 3640c22 759->808 809 364041f call 3640b03 759->809 810 364041f call 3640c8d 759->810 811 364041f call 3640938 759->811 812 364041f call 3640ba8 759->812 813 364041f call 3640d98 759->813 814 364041f call 3da0606 759->814 760->759 761 3640425-3640434 762 3640436-3640460 761->762 763 364046b-36404b5 761->763 762->763 798 36404b7 call 3da05df 763->798 799 36404b7 call 3da0606 763->799 774 36404bd-3640523 782 3640525-3640531 774->782 783 3640570-3640587 774->783 796 3640533 call 3da05df 782->796 797 3640533 call 3da0606 782->797 784 3640880 783->784 785 364058d-36405b4 783->785 800 36405b9 call 3641ec0 785->800 801 36405b9 call 3641eb0 785->801 802 36405b9 call 3da05df 785->802 803 36405b9 call 3da0606 785->803 788 3640539-3640569 788->783 793 36405bf 793->784 796->788 797->788 798->774 799->774 800->793 801->793 802->793 803->793 804->761 805->761 806->761 807->761 808->761 809->761 810->761 811->761 812->761 813->761 814->761
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: [i^$-[i^$2Yl$2Yl$2Yl$=[i^
              • API String ID: 0-301882302
              • Opcode ID: a2c3f2a6ccb65c3762be504be16d505b98a98930a2274af98b061637ca5b35b0
              • Instruction ID: c2fb10ca47e08c810983c6a51456617c34ad3f5f97979c3911f323bad7227415
              • Opcode Fuzzy Hash: a2c3f2a6ccb65c3762be504be16d505b98a98930a2274af98b061637ca5b35b0
              • Instruction Fuzzy Hash: EA5107347002188FCB08EB79D514AAEB7E6EFC5204B14456DE405DF795EF39DC4A87A2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 815 36403bd-3640418 823 364041f 815->823 824 364041a 815->824 868 364041f call 3640f05 823->868 869 364041f call 3640e55 823->869 870 364041f call 3640d40 823->870 871 364041f call 3da05df 823->871 872 364041f call 3640c22 823->872 873 364041f call 3640b03 823->873 874 364041f call 3640c8d 823->874 875 364041f call 3640938 823->875 876 364041f call 3640ba8 823->876 877 364041f call 3640d98 823->877 878 364041f call 3da0606 823->878 824->823 825 3640425-3640434 826 3640436-3640460 825->826 827 364046b-36404b5 825->827 826->827 862 36404b7 call 3da05df 827->862 863 36404b7 call 3da0606 827->863 838 36404bd-3640523 846 3640525-3640531 838->846 847 3640570-3640587 838->847 860 3640533 call 3da05df 846->860 861 3640533 call 3da0606 846->861 848 3640880 847->848 849 364058d-36405b4 847->849 864 36405b9 call 3641ec0 849->864 865 36405b9 call 3641eb0 849->865 866 36405b9 call 3da05df 849->866 867 36405b9 call 3da0606 849->867 852 3640539-3640569 852->847 857 36405bf 857->848 860->852 861->852 862->838 863->838 864->857 865->857 866->857 867->857 868->825 869->825 870->825 871->825 872->825 873->825 874->825 875->825 876->825 877->825 878->825
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: [i^$-[i^$2Yl$2Yl$2Yl$=[i^
              • API String ID: 0-301882302
              • Opcode ID: 0bb60ef53adc934b8cf72ff5262223e8ac9c0b3d11b5c89fdea5c93dfd3929dc
              • Instruction ID: 89bc3cbe642ccdc6d80fd2eae7921bb77bced08b3af99e9f270182515cd608c3
              • Opcode Fuzzy Hash: 0bb60ef53adc934b8cf72ff5262223e8ac9c0b3d11b5c89fdea5c93dfd3929dc
              • Instruction Fuzzy Hash: 1841E134B005188BCB08E7B99524AFE72E79FD5248718446DD006DF795EF39CC4A97B2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 879 3641928-3641980 882 3641982-3641988 879->882 883 36419aa-3641b07 call 3640310 * 2 879->883 884 364198f-3641997 882->884 990 3641b0e call 3642aa5 883->990 991 3641b0e call 3642757 883->991 992 3641b0e call 3642bc0 883->992 993 3641b0e call 3da05df 883->993 994 3641b0e call 36429c3 883->994 995 3641b0e call 364290d 883->995 996 3641b0e call 36428bd 883->996 997 3641b0e call 364294f 883->997 998 3641b0e call 36427b8 883->998 999 3641b0e call 3da0606 883->999 884->883 913 3641b14 1000 3641b16 call 3643040 913->1000 1001 3641b16 call 3643030 913->1001 914 3641b1c-3641b45 call 36413b8 919 3641b47-3641b68 914->919 920 3641b6a-3641ba7 call 36413b8 914->920 926 3641baa-3641c82 919->926 920->926 943 3641c84-3641c89 926->943 944 3641c8b 926->944 945 3641c90-3641cb8 943->945 944->945 948 3641cc1 945->948 949 3641cba-3641cbf 945->949 950 3641cc6-3641cee 948->950 949->950 953 3641cf7 950->953 954 3641cf0-3641cf5 950->954 955 3641cfc-3641d24 953->955 954->955 958 3641d26-3641d2b 955->958 959 3641d2d 955->959 960 3641d32-3641d5a 958->960 959->960 963 3641d63 960->963 964 3641d5c-3641d61 960->964 965 3641d68-3641d90 963->965 964->965 968 3641d92-3641d97 965->968 969 3641d99 965->969 970 3641d9e-3641dc6 968->970 969->970 973 3641dcf 970->973 974 3641dc8-3641dcd 970->974 975 3641dd4-3641dfc 973->975 974->975 978 3641e05 975->978 979 3641dfe-3641e03 975->979 980 3641e0a-3641e40 978->980 979->980 1002 3641e42 call 3643040 980->1002 1003 3641e42 call 3643030 980->1003 985 3641e48-3641e92 989 3641e93 985->989 989->989 990->913 991->913 992->913 993->913 994->913 995->913 996->913 997->913 998->913 999->913 1000->914 1001->914 1002->985 1003->985
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l$:@2l$\OYl
              • API String ID: 0-3268719163
              • Opcode ID: 932ad4575edd092b56c2b596829e6432a435bd72ef6e817a3b4e427f7dc5c2d6
              • Instruction ID: 6d272a13065be54786f6d3928361aa46d8a860c36d412e966638359a5f4799fb
              • Opcode Fuzzy Hash: 932ad4575edd092b56c2b596829e6432a435bd72ef6e817a3b4e427f7dc5c2d6
              • Instruction Fuzzy Hash: E6C180787001588BDB08DB79F6657AA37F7EBD9208F208069D4169B784DF3C9C86CB61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1004 3641999-3641b07 call 3640310 * 2 1113 3641b0e call 3642aa5 1004->1113 1114 3641b0e call 3642757 1004->1114 1115 3641b0e call 3642bc0 1004->1115 1116 3641b0e call 3da05df 1004->1116 1117 3641b0e call 36429c3 1004->1117 1118 3641b0e call 364290d 1004->1118 1119 3641b0e call 36428bd 1004->1119 1120 3641b0e call 364294f 1004->1120 1121 3641b0e call 36427b8 1004->1121 1122 3641b0e call 3da0606 1004->1122 1036 3641b14 1125 3641b16 call 3643040 1036->1125 1126 3641b16 call 3643030 1036->1126 1037 3641b1c-3641b45 call 36413b8 1042 3641b47-3641b68 1037->1042 1043 3641b6a-3641ba7 call 36413b8 1037->1043 1049 3641baa-3641c82 1042->1049 1043->1049 1066 3641c84-3641c89 1049->1066 1067 3641c8b 1049->1067 1068 3641c90-3641cb8 1066->1068 1067->1068 1071 3641cc1 1068->1071 1072 3641cba-3641cbf 1068->1072 1073 3641cc6-3641cee 1071->1073 1072->1073 1076 3641cf7 1073->1076 1077 3641cf0-3641cf5 1073->1077 1078 3641cfc-3641d24 1076->1078 1077->1078 1081 3641d26-3641d2b 1078->1081 1082 3641d2d 1078->1082 1083 3641d32-3641d5a 1081->1083 1082->1083 1086 3641d63 1083->1086 1087 3641d5c-3641d61 1083->1087 1088 3641d68-3641d90 1086->1088 1087->1088 1091 3641d92-3641d97 1088->1091 1092 3641d99 1088->1092 1093 3641d9e-3641dc6 1091->1093 1092->1093 1096 3641dcf 1093->1096 1097 3641dc8-3641dcd 1093->1097 1098 3641dd4-3641dfc 1096->1098 1097->1098 1101 3641e05 1098->1101 1102 3641dfe-3641e03 1098->1102 1103 3641e0a-3641e40 1101->1103 1102->1103 1123 3641e42 call 3643040 1103->1123 1124 3641e42 call 3643030 1103->1124 1108 3641e48-3641e92 1112 3641e93 1108->1112 1112->1112 1113->1036 1114->1036 1115->1036 1116->1036 1117->1036 1118->1036 1119->1036 1120->1036 1121->1036 1122->1036 1123->1108 1124->1108 1125->1037 1126->1037
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l$:@2l$\OYl
              • API String ID: 0-3268719163
              • Opcode ID: 6846b6ca25d8793a1718aabe104858c438b0f4b188310eb5dc14cf21a9f71286
              • Instruction ID: 9164506cabd2861f05e4bea3b0382961bda026fea1104615193b7a30996fb490
              • Opcode Fuzzy Hash: 6846b6ca25d8793a1718aabe104858c438b0f4b188310eb5dc14cf21a9f71286
              • Instruction Fuzzy Hash: 37A170787001548BDB08EB79E6257B936F7EBD9208F208069D41697BD4DF3C8C86C762

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1127 36419b7-3641b07 call 3640310 * 2 1235 3641b0e call 3642aa5 1127->1235 1236 3641b0e call 3642757 1127->1236 1237 3641b0e call 3642bc0 1127->1237 1238 3641b0e call 3da05df 1127->1238 1239 3641b0e call 36429c3 1127->1239 1240 3641b0e call 364290d 1127->1240 1241 3641b0e call 36428bd 1127->1241 1242 3641b0e call 364294f 1127->1242 1243 3641b0e call 36427b8 1127->1243 1244 3641b0e call 3da0606 1127->1244 1158 3641b14 1247 3641b16 call 3643040 1158->1247 1248 3641b16 call 3643030 1158->1248 1159 3641b1c-3641b45 call 36413b8 1164 3641b47-3641b68 1159->1164 1165 3641b6a-3641ba7 call 36413b8 1159->1165 1171 3641baa-3641c82 1164->1171 1165->1171 1188 3641c84-3641c89 1171->1188 1189 3641c8b 1171->1189 1190 3641c90-3641cb8 1188->1190 1189->1190 1193 3641cc1 1190->1193 1194 3641cba-3641cbf 1190->1194 1195 3641cc6-3641cee 1193->1195 1194->1195 1198 3641cf7 1195->1198 1199 3641cf0-3641cf5 1195->1199 1200 3641cfc-3641d24 1198->1200 1199->1200 1203 3641d26-3641d2b 1200->1203 1204 3641d2d 1200->1204 1205 3641d32-3641d5a 1203->1205 1204->1205 1208 3641d63 1205->1208 1209 3641d5c-3641d61 1205->1209 1210 3641d68-3641d90 1208->1210 1209->1210 1213 3641d92-3641d97 1210->1213 1214 3641d99 1210->1214 1215 3641d9e-3641dc6 1213->1215 1214->1215 1218 3641dcf 1215->1218 1219 3641dc8-3641dcd 1215->1219 1220 3641dd4-3641dfc 1218->1220 1219->1220 1223 3641e05 1220->1223 1224 3641dfe-3641e03 1220->1224 1225 3641e0a-3641e40 1223->1225 1224->1225 1245 3641e42 call 3643040 1225->1245 1246 3641e42 call 3643030 1225->1246 1230 3641e48-3641e92 1234 3641e93 1230->1234 1234->1234 1235->1158 1236->1158 1237->1158 1238->1158 1239->1158 1240->1158 1241->1158 1242->1158 1243->1158 1244->1158 1245->1230 1246->1230 1247->1159 1248->1159
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l$:@2l$\OYl
              • API String ID: 0-3268719163
              • Opcode ID: 1d1f37a8e6484717bc74839eec5e880b2fb9f3ba6b703d0b88dc33434692e67f
              • Instruction ID: f306b8f836e29ca36f17b754a381090aec4cb7d5b9f35bbc19d1e236eaf67576
              • Opcode Fuzzy Hash: 1d1f37a8e6484717bc74839eec5e880b2fb9f3ba6b703d0b88dc33434692e67f
              • Instruction Fuzzy Hash: 23A161787001548BDB09EB79EA257B936F7EBD9208F208069D41697BC4DF3C8C86C762

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1249 36419ca-3641b07 call 3640310 * 2 1356 3641b0e call 3642aa5 1249->1356 1357 3641b0e call 3642757 1249->1357 1358 3641b0e call 3642bc0 1249->1358 1359 3641b0e call 3da05df 1249->1359 1360 3641b0e call 36429c3 1249->1360 1361 3641b0e call 364290d 1249->1361 1362 3641b0e call 36428bd 1249->1362 1363 3641b0e call 364294f 1249->1363 1364 3641b0e call 36427b8 1249->1364 1365 3641b0e call 3da0606 1249->1365 1279 3641b14 1368 3641b16 call 3643040 1279->1368 1369 3641b16 call 3643030 1279->1369 1280 3641b1c-3641b45 call 36413b8 1285 3641b47-3641b68 1280->1285 1286 3641b6a-3641ba7 call 36413b8 1280->1286 1292 3641baa-3641c82 1285->1292 1286->1292 1309 3641c84-3641c89 1292->1309 1310 3641c8b 1292->1310 1311 3641c90-3641cb8 1309->1311 1310->1311 1314 3641cc1 1311->1314 1315 3641cba-3641cbf 1311->1315 1316 3641cc6-3641cee 1314->1316 1315->1316 1319 3641cf7 1316->1319 1320 3641cf0-3641cf5 1316->1320 1321 3641cfc-3641d24 1319->1321 1320->1321 1324 3641d26-3641d2b 1321->1324 1325 3641d2d 1321->1325 1326 3641d32-3641d5a 1324->1326 1325->1326 1329 3641d63 1326->1329 1330 3641d5c-3641d61 1326->1330 1331 3641d68-3641d90 1329->1331 1330->1331 1334 3641d92-3641d97 1331->1334 1335 3641d99 1331->1335 1336 3641d9e-3641dc6 1334->1336 1335->1336 1339 3641dcf 1336->1339 1340 3641dc8-3641dcd 1336->1340 1341 3641dd4-3641dfc 1339->1341 1340->1341 1344 3641e05 1341->1344 1345 3641dfe-3641e03 1341->1345 1346 3641e0a-3641e40 1344->1346 1345->1346 1366 3641e42 call 3643040 1346->1366 1367 3641e42 call 3643030 1346->1367 1351 3641e48-3641e92 1355 3641e93 1351->1355 1355->1355 1356->1279 1357->1279 1358->1279 1359->1279 1360->1279 1361->1279 1362->1279 1363->1279 1364->1279 1365->1279 1366->1351 1367->1351 1368->1280 1369->1280
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l$:@2l$\OYl
              • API String ID: 0-3268719163
              • Opcode ID: 8287dadcea3f46aac72300e9e24c1390fac35a8e6c794f6a5180fde4db9b1171
              • Instruction ID: 06d6eeb4a4c8eab7d2959d23bce8728adf9a3316ca933212743c43ef363c4c82
              • Opcode Fuzzy Hash: 8287dadcea3f46aac72300e9e24c1390fac35a8e6c794f6a5180fde4db9b1171
              • Instruction Fuzzy Hash: 91A160787001548BDB09EB79EA257B936E7EBD9208F208069D41697BC4DF3C8C86C762

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1470 3640938-3640993 1472 3640a2e-3640a30 1470->1472 1473 3640999-3640a22 1470->1473 1474 3640a37-3640a3c 1472->1474 1625 3640a24 call 3da05df 1473->1625 1626 3640a24 call 3da0606 1473->1626 1475 3640a42-3640a7a 1474->1475 1476 3640b1e-3640bc2 1474->1476 1493 3640aa1-3640b01 1475->1493 1494 3640a7c-3640a9a 1475->1494 1514 3640c9e-3640ca7 1476->1514 1515 3640bc8-3640c50 1476->1515 1493->1476 1494->1493 1513 3640a2a-3640a2c 1513->1472 1518 3640a32 1513->1518 1516 3640d51-3640d5a 1514->1516 1517 3640cad-3640d2c 1514->1517 1549 3640c57-3640c8b 1515->1549 1520 3640d5c-3640d73 1516->1520 1521 3640d7a-3640d83 1516->1521 1563 3640d33-3640d3e 1517->1563 1518->1474 1520->1521 1525 3640d85-3640d8c 1521->1525 1526 3640da9-3640db2 1521->1526 1536 3640d96 1525->1536 1527 3640f33-3640f3a 1526->1527 1528 3640db8-3640dd6 1526->1528 1623 3640dd8 call 3da05df 1528->1623 1624 3640dd8 call 3da0606 1528->1624 1534 3640dde-3640e06 1551 3640f1c-3640f2d 1534->1551 1536->1526 1549->1514 1551->1527 1552 3640e0b-3640e14 1551->1552 1555 3640f40-3640fd1 1552->1555 1556 3640e1a-3640efb 1552->1556 1586 3640fd7-3640fe8 1555->1586 1587 36410ca 1555->1587 1599 3640f03-3640f1a 1556->1599 1563->1516 1593 3640fea-364100b 1586->1593 1589 36410cc-36410d3 1587->1589 1602 3641012-3641048 1593->1602 1603 364100d 1593->1603 1599->1551 1604 3640f3b 1599->1604 1610 364104f-3641077 1602->1610 1611 364104a 1602->1611 1603->1602 1604->1555 1615 364107d-36410a1 1610->1615 1616 3641079-364107b 1610->1616 1611->1610 1619 36410a3-36410a8 1615->1619 1620 36410aa-36410b4 1615->1620 1616->1589 1619->1589 1621 36410b6-36410b8 1620->1621 1622 36410ba-36410c4 1620->1622 1621->1589 1622->1587 1622->1593 1623->1534 1624->1534 1625->1513 1626->1513
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l$\OYl
              • API String ID: 0-3579895576
              • Opcode ID: 830adb62ccd8ff3239902dbf0d3d6592731c8785d2c84ee9fd1c09915855c0eb
              • Instruction ID: 54257cdf0e89c25be1a24a9d6932c55ecf9ecd3a3f0fdbb0f1a0046f4705c96d
              • Opcode Fuzzy Hash: 830adb62ccd8ff3239902dbf0d3d6592731c8785d2c84ee9fd1c09915855c0eb
              • Instruction Fuzzy Hash: D3027D347002149FCB08EB78E954AAD77E2EFD8218B15407DD406DB7A4EF399C86CB91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1627 3641510-3641527 1628 364152a-364154a 1627->1628 1630 3641894-36418a3 1628->1630 1631 3641550-364155c 1628->1631 1633 36418a5-36418de 1630->1633 1634 36418f1 1630->1634 1632 364155f-3641565 1631->1632 1635 364187e-364188f 1632->1635 1636 364156b-3641579 1632->1636 1633->1634 1724 36418f8 call 36419b7 1634->1724 1725 36418f8 call 3641928 1634->1725 1726 36418f8 call 3641999 1634->1726 1727 36418f8 call 36419ca 1634->1727 1635->1630 1638 3641588-3641597 1636->1638 1639 364157b-3641580 1636->1639 1637 36418fe-3641908 1637->1630 1641 364190a-3641911 1637->1641 1638->1630 1643 364159d-36415b4 1638->1643 1639->1638 1641->1628 1648 36415b6-36415c4 1643->1648 1649 36415cb-36415e2 1643->1649 1648->1649 1649->1630 1652 36415e8-36415ee 1649->1652 1653 36415f4 1652->1653 1654 36415f0-36415f2 1652->1654 1655 36415f9-36415fb 1653->1655 1654->1655 1656 3641601-3641607 1655->1656 1657 36416bf-36416cf 1655->1657 1658 36416ba 1656->1658 1657->1635 1661 36416d5-36416d8 1657->1661 1662 3641619-364161b 1658->1662 1661->1635 1663 36416de-36416e1 1661->1663 1665 3641623-3641629 1662->1665 1663->1635 1664 36416e7-3641712 1663->1664 1664->1635 1678 3641718-3641723 1664->1678 1666 364168a-36416b8 1665->1666 1667 364162b 1665->1667 1666->1658 1667->1630 1669 3641632 1667->1669 1672 3641639-3641643 1669->1672 1673 3641645-3641647 1672->1673 1674 3641649 1672->1674 1677 364164e-3641650 1673->1677 1674->1677 1680 3641652 1677->1680 1681 3641668-364167f 1677->1681 1682 3641725 1678->1682 1683 364172b-364172d 1678->1683 1722 3641658 call 3643040 1680->1722 1723 3641658 call 3643030 1680->1723 1681->1649 1692 3641685 1681->1692 1684 3641727-3641729 1682->1684 1685 364172f 1682->1685 1686 3641734-3641736 1683->1686 1684->1683 1684->1685 1685->1686 1690 364178d-36417a8 1686->1690 1691 3641738-364173e 1686->1691 1688 364165e-3641661 1688->1681 1695 36417af-36417d4 1690->1695 1691->1635 1693 3641744-3641746 1691->1693 1692->1632 1696 3641752-3641755 1693->1696 1697 3641748-364174a 1693->1697 1705 36417d6-36417d8 1695->1705 1706 36417da-36417dc 1695->1706 1696->1635 1699 364175b-364175e 1696->1699 1697->1635 1698 3641750 1697->1698 1698->1699 1699->1635 1701 3641764-3641767 1699->1701 1701->1635 1702 364176d-3641770 1701->1702 1702->1635 1703 3641776-3641782 1702->1703 1703->1690 1705->1706 1708 36417de 1705->1708 1709 36417e3-36417e5 1706->1709 1708->1709 1709->1632 1710 36417eb-3641835 1709->1710 1715 364183d-364183f 1710->1715 1716 3641846-3641879 1715->1716 1716->1632 1722->1688 1723->1688 1724->1637 1725->1637 1726->1637 1727->1637
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: 2Yl$KnX
              • API String ID: 0-1646643623
              • Opcode ID: f5e9a2e2251f8be66efcf97f90250efe0e29833106cd1b5614ea8765d17a5a7c
              • Instruction ID: b23ba5fbd48d134dc2d9db7a0de3d920520f2cab046a34a0330b0e81e8d26041
              • Opcode Fuzzy Hash: f5e9a2e2251f8be66efcf97f90250efe0e29833106cd1b5614ea8765d17a5a7c
              • Instruction Fuzzy Hash: 63A10434B002058FD714DB79EA487A9B3E2EB96354F184669D4129B3D0EF38DD86CB61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1728 3645c29-3645c71 1732 3645caf-3645cba 1728->1732 1733 3645c73-3645c76 1732->1733 1734 3645cbc-3645cc6 1732->1734 1735 3645ccc-3645d06 1733->1735 1736 3645c78-3645cad 1733->1736 1765 3645d08 call 30ab51a 1735->1765 1766 3645d08 call 30ab572 1735->1766 1736->1732 1743 3645cc7 1736->1743 1739 3645d0d-3645d37 1745 3645d3e-3645d6f 1739->1745 1743->1735 1748 3645d75-3645e2b 1745->1748 1749 3645e4c 1745->1749 1748->1749 1750 3645e52-3645e59 1748->1750 1749->1750 1765->1739 1766->1739
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l$p=Wl
              • API String ID: 0-4134690350
              • Opcode ID: 5c89a36d15be0ca6b9036e877357ffc7e951c924f5002f4648b53df6de6825ce
              • Instruction ID: 37860f763264f8bea0668e8eb757091388f5bab741190750288e486f90cd606f
              • Opcode Fuzzy Hash: 5c89a36d15be0ca6b9036e877357ffc7e951c924f5002f4648b53df6de6825ce
              • Instruction Fuzzy Hash: DB51D031B002048FCB04DBB8D951AEEBBF6AFC5208F25846AE546D7790DF399D05CB91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1767 3640509-3640523 1771 3640525-3640531 1767->1771 1772 3640570-3640587 1767->1772 1785 3640533 call 3da05df 1771->1785 1786 3640533 call 3da0606 1771->1786 1773 3640880 1772->1773 1774 364058d-36405b4 1772->1774 1787 36405b9 call 3641ec0 1774->1787 1788 36405b9 call 3641eb0 1774->1788 1789 36405b9 call 3da05df 1774->1789 1790 36405b9 call 3da0606 1774->1790 1777 3640539-3640569 1777->1772 1782 36405bf 1782->1773 1785->1777 1786->1777 1787->1782 1788->1782 1789->1782 1790->1782
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: [i^$2Yl
              • API String ID: 0-1450692056
              • Opcode ID: e4d22e77d60a8e7d2bdb0472b717be400df26f6460ea6ce4b5ae047b39c7224e
              • Instruction ID: ce301d9dd24f2faad0eaa724192c2dc7c4d2a297ef1c60e1d0a307328808975f
              • Opcode Fuzzy Hash: e4d22e77d60a8e7d2bdb0472b717be400df26f6460ea6ce4b5ae047b39c7224e
              • Instruction Fuzzy Hash: 2F01DA24B015208BCB08F7BD44206FEA1E74FC8108B09842ED00ADB781EF28CC0697E3

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1803 3641f3f-3641f4a 1805 3641f4c-3641f56 1803->1805 1993 3641f56 call 30ab51a 1805->1993 1994 3641f56 call 30ab572 1805->1994 1807 3641f5b-3641f67 1808 36423b6 1807->1808 1809 3641f6d-3641f88 1807->1809 1808->1805 1809->1808 1811 3641f8e-3641fa1 1809->1811 1813 3641fa3-3641fa9 1811->1813 1814 3641fab-3641fba 1811->1814 1815 364200c-3642019 1813->1815 1818 3641fc0-3641fca 1814->1818 1819 36423bb 1814->1819 1823 3642020-364203a 1815->1823 1820 3641fd0 1818->1820 1821 3641fcc-3641fce 1818->1821 1822 36423c0-364242c 1819->1822 1824 3641fd3-3641ff9 1820->1824 1821->1824 1842 3642442-3642448 1822->1842 1843 364242e-3642432 1822->1843 1831 3642041-364208f 1823->1831 1832 364203c 1823->1832 1833 3642003-364200a 1824->1833 1834 3641ffb-3642001 1824->1834 1868 3642096-36420e7 1831->1868 1869 3642091 1831->1869 1832->1831 1833->1815 1834->1815 1846 3642453 1842->1846 1847 364244a-364244d 1842->1847 1844 3642434-3642439 1843->1844 1845 364243b 1843->1845 1844->1842 1845->1842 1849 3642458-364245d 1846->1849 1847->1846 1848 364244f-3642451 1847->1848 1848->1849 1851 3642491-3642497 1849->1851 1852 364245f-364248c 1849->1852 1854 364251c 1851->1854 1855 364249d-36424a3 1851->1855 1864 364267d-3642686 1852->1864 1857 3642521-3642526 1854->1857 1855->1854 1856 36424a5-36424ab 1855->1856 1856->1854 1859 36424ad-36424b0 1856->1859 1860 3642533-364253e 1857->1860 1861 3642528-364252e 1857->1861 1859->1854 1863 36424b2-36424b8 1859->1863 1865 3642540-3642546 1860->1865 1866 364254b-364254e 1860->1866 1861->1864 1863->1854 1870 36424ba-36424bd 1863->1870 1865->1864 1871 3642550-3642553 1866->1871 1872 3642559 1866->1872 1914 36420ee-3642134 1868->1914 1915 36420e9 1868->1915 1869->1868 1870->1854 1874 36424bf-36424c5 1870->1874 1871->1872 1875 3642555-3642557 1871->1875 1877 364255e-3642563 1872->1877 1874->1854 1878 36424c7-36424cd 1874->1878 1875->1877 1879 3642565-364257b 1877->1879 1880 3642593-364259e 1877->1880 1878->1854 1884 36424cf-36424d5 1878->1884 1889 364257d-3642583 1879->1889 1890 3642588-364258e 1879->1890 1882 36425a0-36425a6 1880->1882 1883 36425ab-36425af 1880->1883 1882->1864 1886 36425b1-36425b7 1883->1886 1887 36425f2-36425f8 1883->1887 1884->1854 1888 36424d7-36424da 1884->1888 1891 3642606-364261f 1886->1891 1894 36425b9-36425ed 1886->1894 1887->1891 1892 36425fa 1887->1892 1888->1854 1895 36424dc-36424df 1888->1895 1889->1864 1890->1864 1912 3642650-3642678 1891->1912 1913 3642621-364264e 1891->1913 1995 36425fc call 3642698 1892->1995 1996 36425fc call 3642689 1892->1996 1894->1864 1895->1854 1896 36424e1-36424e4 1895->1896 1896->1854 1901 36424e6-36424e9 1896->1901 1897 3642602-3642604 1897->1864 1901->1854 1902 36424eb-36424ee 1901->1902 1902->1854 1906 36424f0-36424f3 1902->1906 1906->1854 1907 36424f5-36424f8 1906->1907 1907->1854 1911 36424fa-36424fd 1907->1911 1911->1854 1916 36424ff-3642502 1911->1916 1912->1864 1913->1864 1939 3642136 1914->1939 1940 364213b-364216b 1914->1940 1915->1914 1916->1854 1918 3642504-3642507 1916->1918 1918->1854 1920 3642509-364250c 1918->1920 1920->1854 1924 364250e-3642511 1920->1924 1924->1854 1926 3642513-3642516 1924->1926 1926->1854 1929 3642518-364251a 1926->1929 1929->1857 1939->1940 1940->1808 1945 3642171-36421a1 1940->1945 1949 3642330-364233e 1945->1949 1950 3642344-3642366 1949->1950 1951 36421a6-36421ac 1949->1951 1950->1808 1952 3642368-364236c 1950->1952 1951->1822 1953 36421b2-36421e1 1951->1953 1954 3642373-364237a 1952->1954 1955 364236e 1952->1955 1953->1819 1960 36421e7-3642210 1953->1960 1954->1822 1956 364237c-364238a 1954->1956 1955->1954 1961 3642391-3642398 1956->1961 1962 364238c 1956->1962 1967 3642217-3642242 1960->1967 1968 3642212 1960->1968 1961->1822 1963 364239a-36423ac 1961->1963 1962->1961 1963->1808 1972 3642244-364224d 1967->1972 1973 364227a-3642295 1967->1973 1968->1967 1974 364224f-3642253 1972->1974 1975 364225b-364226a 1972->1975 1979 3642297 1973->1979 1980 364229c-36422e3 1973->1980 1974->1975 1975->1822 1976 3642270-3642277 1975->1976 1976->1973 1979->1980 1986 36422e5 1980->1986 1987 36422ea-364231b 1980->1987 1986->1987 1991 3642327-364232a 1987->1991 1992 364231d-3642321 1987->1992 1991->1819 1991->1949 1992->1819 1992->1991 1993->1807 1994->1807 1995->1897 1996->1897
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: L.Yl
              • API String ID: 0-3978860573
              • Opcode ID: 2cb716d21083e870edb4bc78ba491891ced4cbab429a4bd3bad0779e8c464131
              • Instruction ID: 2b26880cee6f472a3646ad0cefef8496739f45ca60a621ad8d3c54ad786cc27f
              • Opcode Fuzzy Hash: 2cb716d21083e870edb4bc78ba491891ced4cbab429a4bd3bad0779e8c464131
              • Instruction Fuzzy Hash: 5212D631F002148BDB18EB78D6607ADB6F1AF84204F298879E455DB791EF39CD85CBA1
              APIs
              • RegCreateKeyExW.KERNEL32(?,00000E90), ref: 037E3001
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: 55ab1d45d81e16adf08eda45ea4077bf249767fce87fbccf54a477cca95cb2c5
              • Instruction ID: a413bff403bd16f5118ad9ed3c658aa5a850479ac7f9a81afd74b184df3ba5d3
              • Opcode Fuzzy Hash: 55ab1d45d81e16adf08eda45ea4077bf249767fce87fbccf54a477cca95cb2c5
              • Instruction Fuzzy Hash: A4316172504744AFE721CB65CC44FA7FBFCEF09214F08459AE9858B652D324E509CBA1
              APIs
              • RegQueryValueExW.KERNEL32(?,00000E90,?,?), ref: 037E1182
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 0e573c350a10db1a720be2d74ddf656498998ae9f859bfbfbba7dfc3dd2332f6
              • Instruction ID: 7b659a0261555843ecfb425622a87bd744f6cd3c17877e8aa952980f3e0a1dcd
              • Opcode Fuzzy Hash: 0e573c350a10db1a720be2d74ddf656498998ae9f859bfbfbba7dfc3dd2332f6
              • Instruction Fuzzy Hash: 01317C6510E3C06FD3138B258C61A61BF74EF47614F1E85CBE8C48F6A3D229A919D7B2
              APIs
              • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 030AACD9
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: e9483c07e0a596d306a286d35ef8b587139499e5e11f30058593a25a69cdf560
              • Instruction ID: e233760964086f36cb5177427000f53ce7cf999c9dc43993a8f896947c5fbbbc
              • Opcode Fuzzy Hash: e9483c07e0a596d306a286d35ef8b587139499e5e11f30058593a25a69cdf560
              • Instruction Fuzzy Hash: 6731B2715057806FE722CF65DC45F92FFF8EF06224F08849EE9898B692D361E409CB61
              APIs
              • getaddrinfo.WS2_32(?,00000E90), ref: 037E1DAF
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: getaddrinfo
              • String ID:
              • API String ID: 300660673-0
              • Opcode ID: 3e0baf594547b925aafbabb83cffd922f0d95b1993bafe8a384d955713f6526c
              • Instruction ID: ffd939fa1c946144c1e2d1e20ef7322939aea66dd633ab4840625050239bdd4a
              • Opcode Fuzzy Hash: 3e0baf594547b925aafbabb83cffd922f0d95b1993bafe8a384d955713f6526c
              • Instruction Fuzzy Hash: 7231DFB2104340AFEB21CB60DC84FA7FBACEF04314F04489AFA499B281D374A908CB71
              APIs
              • GetVolumeInformationA.KERNEL32(?,00000E90,?,?), ref: 037E2036
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: InformationVolume
              • String ID:
              • API String ID: 2039140958-0
              • Opcode ID: c1cb1ab31fe367a0e841a03fac67458b4a9f1fd45325b98cba6e1d30f99ec31a
              • Instruction ID: e9585569d910d0f60511c6c3e2730fb89d6d656c7884b4ab293261fc1eb0d07a
              • Opcode Fuzzy Hash: c1cb1ab31fe367a0e841a03fac67458b4a9f1fd45325b98cba6e1d30f99ec31a
              • Instruction Fuzzy Hash: 60318E7150D3C06FD3138B358C61BA2BFB4AF47210F1A80DBE8C49F5A3D225A959C7A2
              APIs
              • RegOpenKeyExW.KERNEL32(?,00000E90), ref: 030AABD1
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: 22f426a98795310825e409dc798f555adebf6d9ea56e6dec0f1cfc73fd92ec9b
              • Instruction ID: 1c6fd9680d7dc3aa085c17629fa38609e0200045789a2b9a11a3d92bcbeaeac4
              • Opcode Fuzzy Hash: 22f426a98795310825e409dc798f555adebf6d9ea56e6dec0f1cfc73fd92ec9b
              • Instruction Fuzzy Hash: 7E3195715097846FE7228B55DC44FA6BFBCEF06214F08849BE9858B593D324A909C771
              APIs
              • GetProcessTimes.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E1C7D
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: ProcessTimes
              • String ID:
              • API String ID: 1995159646-0
              • Opcode ID: df69c381d7d6f506433d46d1719e81e40b2b4471cbd8e6a4df2feaeb461b4c8a
              • Instruction ID: acc8f0e93ce101b4e6dfa137dc7f5af8529b6d4425dd61050309a7d4ddb445f1
              • Opcode Fuzzy Hash: df69c381d7d6f506433d46d1719e81e40b2b4471cbd8e6a4df2feaeb461b4c8a
              • Instruction Fuzzy Hash: B531C5715097806FDB12CB61DC45F96BFB8EF46314F0884DAE985CB153D2259909C7B1
              APIs
              • CreateMutexW.KERNEL32(?,?), ref: 030AA6B9
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: 50cc55309c961ea70423d3ae5cd339868d735982c176941420ec206cb10574e7
              • Instruction ID: 11c5247e77c8380a9ca1a4109d2c09f5af5d9ec4d8ca97e48fa4ace0a0c7323f
              • Opcode Fuzzy Hash: 50cc55309c961ea70423d3ae5cd339868d735982c176941420ec206cb10574e7
              • Instruction Fuzzy Hash: 2B3181715097806FE711CB65DC85B96FFF8EF06214F08849AE9848F292D365E909CB61
              APIs
              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E90), ref: 037E166B
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: DescriptorSecurity$ConvertString
              • String ID:
              • API String ID: 3907675253-0
              • Opcode ID: 74a8ea63cbcab1dab89c5a832cf3ac4b32bc1bc6a4a374671ea9be50f6a12cca
              • Instruction ID: 24e1726a1640ce4a57d06d1a018d9428533ad5b1e733f4169cf65a6ac5c3da02
              • Opcode Fuzzy Hash: 74a8ea63cbcab1dab89c5a832cf3ac4b32bc1bc6a4a374671ea9be50f6a12cca
              • Instruction Fuzzy Hash: 2B31BF72504344AFE721CB64DC45FA6BFB8EF46214F0888AAE944DB252D364E909CB61
              APIs
              • RegCreateKeyExW.KERNEL32(?,00000E90), ref: 037E3001
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: cf2f1f6f758e291b7cf597e952994276b3e9eb585383860a6585ba9678b326da
              • Instruction ID: dfb49113baebd74191d5ee0ad20fd8bab162ade4b88d0e1709b8071f34f62ac6
              • Opcode Fuzzy Hash: cf2f1f6f758e291b7cf597e952994276b3e9eb585383860a6585ba9678b326da
              • Instruction Fuzzy Hash: 52219172600704AFEB21DF55CC44FA7FBECEF08614F08885AE945C7652D724E5498BB1
              APIs
              • RegQueryValueExW.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 030AA40C
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: a5d95e46e27877f934ea50afa3fc910d9efa8ece791a5f0242a7c493a6b7143f
              • Instruction ID: 160c3e2990e9990835a1b187d83d5d24cc286229fe91e8412fca9adb7d88e171
              • Opcode Fuzzy Hash: a5d95e46e27877f934ea50afa3fc910d9efa8ece791a5f0242a7c493a6b7143f
              • Instruction Fuzzy Hash: 4E31B175205740AFD721CF15DC84F92BBF8EF46210F08849AE9458B692D324E908CB71
              APIs
              • GetProcessWorkingSetSize.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E333F
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: e73cd5761e51436cc5d8444e28cf98b7af24556c71a92d3b4dc97444c1d2af79
              • Instruction ID: bcabb54243dc3ad0322ec1869c8988038b355e62c330df7d5be1f9ba81e4360a
              • Opcode Fuzzy Hash: e73cd5761e51436cc5d8444e28cf98b7af24556c71a92d3b4dc97444c1d2af79
              • Instruction Fuzzy Hash: 5E21B6755093C06FE712CB20DC55B96BFB8AF46214F0C84DFE9889F193D225A949C7B1
              APIs
              • EnumWindows.USER32(?,00000E90,?,?), ref: 030AA1C2
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: EnumWindows
              • String ID:
              • API String ID: 1129996299-0
              • Opcode ID: 1d36cc5b318e5f08ee048a1b2e8af116929042a98292966c9898f2c8ff69b4f4
              • Instruction ID: 7de32cbc742af38ee28589079b80b736b536e55dc056fdcc39b10ed30efc5b4c
              • Opcode Fuzzy Hash: 1d36cc5b318e5f08ee048a1b2e8af116929042a98292966c9898f2c8ff69b4f4
              • Instruction Fuzzy Hash: EC21A37140D3C06FD3128B258C55BA6BFB4EF47620F1A85DBD884DF593D225A909CBA2
              APIs
              • getaddrinfo.WS2_32(?,00000E90), ref: 037E1DAF
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: getaddrinfo
              • String ID:
              • API String ID: 300660673-0
              • Opcode ID: ff5584e5059cd4aed4366bc0680849e61b1598f50b95bcd96eb342f5f1c851a9
              • Instruction ID: 9f1cfad167d27b880c20e39aaff9c75a77ca7738e26e577f49fed5978d0fe7db
              • Opcode Fuzzy Hash: ff5584e5059cd4aed4366bc0680849e61b1598f50b95bcd96eb342f5f1c851a9
              • Instruction Fuzzy Hash: 9D21E571500300BEEB20DB60DC85FAAFBACEF08714F14485AFA499A681D775E549CBB1
              APIs
              • GetFileType.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 030AADC5
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: 470ced40bdc9690ddbdf7b437dc20c035c2198973b29b00563ec60ea55c027c6
              • Instruction ID: 5713c201a01b8ddfdf31ac0ce5673e7ac29d4af883b292f39de1bea58340e090
              • Opcode Fuzzy Hash: 470ced40bdc9690ddbdf7b437dc20c035c2198973b29b00563ec60ea55c027c6
              • Instruction Fuzzy Hash: 7D214F755097806FD712CB25DC40BE2BFBCEF47324F0880D6E9858B293D2649909C7B1
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: select
              • String ID:
              • API String ID: 1274211008-0
              • Opcode ID: bd9b274ed0a1cdeacd49f8ba30a45892eb46eba12d0586d84d2b34131b8552f2
              • Instruction ID: c26ca77bfe9cae503120dc5622bfdf981234fe05620b7efd0fdb19b9b70cad46
              • Opcode Fuzzy Hash: bd9b274ed0a1cdeacd49f8ba30a45892eb46eba12d0586d84d2b34131b8552f2
              • Instruction Fuzzy Hash: 82217C755093809FEB22CF25DC44B92FFF8EF0A214F0984DAE984CB162D225E949DB61
              APIs
              • RegSetValueExW.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 030AA4F8
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 9dcd789b041cd9081db46be0ddb73f7bad2d8f742165d8008918fb9ac8e75e8c
              • Instruction ID: c26d9586d6138fcf230b4cec3cb1ab37948d76fd645058cad5ac7aeefc9224f9
              • Opcode Fuzzy Hash: 9dcd789b041cd9081db46be0ddb73f7bad2d8f742165d8008918fb9ac8e75e8c
              • Instruction Fuzzy Hash: 3B21A1721057806FD722CF55DC44FA3BFB8EF46224F08849AE9858B692D364E448C7B1
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l
              • API String ID: 0-1731998491
              • Opcode ID: 608360efb9b2fb92792a00a0bec5269f77d8500ccab749b720df941924ee6528
              • Instruction ID: 5ff15c24e7d03c2ce4e31496f461d3f0a5a5aa306c34dc1d7e5c3b1233438015
              • Opcode Fuzzy Hash: 608360efb9b2fb92792a00a0bec5269f77d8500ccab749b720df941924ee6528
              • Instruction Fuzzy Hash: 2ED13F38A00208DFCB09EFB4F55099D77B6FFD8248B218569E81697764DF39AC46CB90
              APIs
              • WSASocketW.WS2_32(?,?,?,?,?), ref: 037E123A
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: Socket
              • String ID:
              • API String ID: 38366605-0
              • Opcode ID: 3fc51dd82ddacaf24567179df65a270d233b3290660f04d07d97a6ecced8c477
              • Instruction ID: 482402f53768ce9e334f906ad6597983f2c0a996aeb197a2b6bb3650a8bf3196
              • Opcode Fuzzy Hash: 3fc51dd82ddacaf24567179df65a270d233b3290660f04d07d97a6ecced8c477
              • Instruction Fuzzy Hash: 2E21D371405380AFD721CF51DC45F96FFB8EF09224F08889EE9898B652D375E408CBA1
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: FileView
              • String ID:
              • API String ID: 3314676101-0
              • Opcode ID: 5e880c10cf7ce9a041ed50b25443114066f56e2ac1eda486f9e6e67f5d56f0b2
              • Instruction ID: afb640ec403c2e8da750b9a446da0ebbed8a6b10cc4d6171ed67f31cbc8bf47a
              • Opcode Fuzzy Hash: 5e880c10cf7ce9a041ed50b25443114066f56e2ac1eda486f9e6e67f5d56f0b2
              • Instruction Fuzzy Hash: 8121B171405340AFE722CB55DC45F96FFF8EF49224F08849EE9898B252D375E508CBA1
              APIs
              • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 030AACD9
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: e6df39474a4a2b4e3392810bc737d4f7231bd6405223c7e5ba2d4f0eb933b91f
              • Instruction ID: 6bde4c2459e26bbeb9a874c02b5b0f460401374de36ca8548c9c74190235b5a0
              • Opcode Fuzzy Hash: e6df39474a4a2b4e3392810bc737d4f7231bd6405223c7e5ba2d4f0eb933b91f
              • Instruction Fuzzy Hash: 33218371601604AFE720CF69DD45BA6FBE8EF04214F08885DE9499B751D371E408CB71
              APIs
              • GetExitCodeProcess.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E0088
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: CodeExitProcess
              • String ID:
              • API String ID: 3861947596-0
              • Opcode ID: 2548d19d47cf8a2987922df8e385ada95bb39329cea1a5131b04c4b2c3847c80
              • Instruction ID: 2c7e2a7ef56550bcca8f461701a6879ade095214b031cf42f2c4d3a88695fec4
              • Opcode Fuzzy Hash: 2548d19d47cf8a2987922df8e385ada95bb39329cea1a5131b04c4b2c3847c80
              • Instruction Fuzzy Hash: 6521C5715093846FD712CB21DC84F96BFB8EF46214F0884DBE944DF292D365A548C7A1
              APIs
              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E90), ref: 037E166B
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: DescriptorSecurity$ConvertString
              • String ID:
              • API String ID: 3907675253-0
              • Opcode ID: 7c589b1f68c94b4de3e327e6bcd9752ba37f7b3c466f335e80a5637a43380fc1
              • Instruction ID: 167532389937e1803bce05aa2bda718d05f0fcd9e59b9a4a2ea571e7150a9f32
              • Opcode Fuzzy Hash: 7c589b1f68c94b4de3e327e6bcd9752ba37f7b3c466f335e80a5637a43380fc1
              • Instruction Fuzzy Hash: AA21D172600204AFEB20DF65DC46FAAFBACEF44614F08886AED45DB651D774E5088AB1
              APIs
              • RegQueryValueExW.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E1580
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: cbcbd06bd3d2726a5eb64388a174273260468b7249bfa362fdc35299f45ff52f
              • Instruction ID: 0b0da5909bb4b180faedf203c63013cb2db1bdfdee95eb178986a8dfcc89766c
              • Opcode Fuzzy Hash: cbcbd06bd3d2726a5eb64388a174273260468b7249bfa362fdc35299f45ff52f
              • Instruction Fuzzy Hash: BA21B272504780AFD721CF11CC45F97FFB8EF49210F08859AE9458B692D325E508CBB1
              APIs
              • RegOpenKeyExW.KERNEL32(?,00000E90), ref: 030AABD1
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: 2eeef6364177fe223ee0fbf94d1a9decf98bba0937832ae1eaa9227257d1c28a
              • Instruction ID: 857ecf3599b74001b060db2be0d32ee648461528d6a9acec410cf11470365098
              • Opcode Fuzzy Hash: 2eeef6364177fe223ee0fbf94d1a9decf98bba0937832ae1eaa9227257d1c28a
              • Instruction Fuzzy Hash: 8821A172600604AFE720DF95DC44FABFBFCEF08624F04845AE9458B692D764E548CAB1
              APIs
              • WriteFile.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 030AB151
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: FileWrite
              • String ID:
              • API String ID: 3934441357-0
              • Opcode ID: 55cba57f376bb885f26a9cc2f17c4765d1efcf111f6db0482eb8b1e809f16660
              • Instruction ID: fb7cdc37090b767bbfa544ddde4afb02d57721255ee583ddf4178870ec2d4e8c
              • Opcode Fuzzy Hash: 55cba57f376bb885f26a9cc2f17c4765d1efcf111f6db0482eb8b1e809f16660
              • Instruction Fuzzy Hash: E321C272405340BFE7228F55DC44FA7BBB8EF45224F04849AE9459B652D225A508CBB1
              APIs
              • SetProcessWorkingSetSize.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E3423
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 3b4538cc833f7188687eb4b14875a4d56fe5e8a7dd0a4c2c03932eb9b68d3443
              • Instruction ID: 9ff41d6f8a7e007bf93094594a34b2384101230ffa6093eada9f200be16dc728
              • Opcode Fuzzy Hash: 3b4538cc833f7188687eb4b14875a4d56fe5e8a7dd0a4c2c03932eb9b68d3443
              • Instruction Fuzzy Hash: 2A2192725053806FE712CF25DC45FA6BFB8EF46224F08849AE9499B252D374A508CBB5
              APIs
              • CreateMutexW.KERNEL32(?,?), ref: 030AA6B9
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: 9187dc85231c89bd5140cd66dc2e064ecb26f67de0e6de8ea7831247878a8d12
              • Instruction ID: 6b3f997d3d961b628f661a67864cc8f2d76b6c8f143c68a415bf18de2e3cf3c7
              • Opcode Fuzzy Hash: 9187dc85231c89bd5140cd66dc2e064ecb26f67de0e6de8ea7831247878a8d12
              • Instruction Fuzzy Hash: 8C219571601600AFE710CF65DD45BA6FBE8EF04214F088469ED498F781D771E809CA71
              APIs
              • shutdown.WS2_32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E1AA4
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: shutdown
              • String ID:
              • API String ID: 2510479042-0
              • Opcode ID: a842a4a704837a539362fb856d830392e936761905cd0322a31002312171c897
              • Instruction ID: ad838c49dbbd0868e8745aaa7271340dcb260879ca986b5d66a54d0c24a50c1f
              • Opcode Fuzzy Hash: a842a4a704837a539362fb856d830392e936761905cd0322a31002312171c897
              • Instruction Fuzzy Hash: 6E21A7B15093846FD712CB51DC45B96FFB8EF46224F0884DBE9889F252D368A548C7B1
              APIs
              • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 030ABC6A
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: LookupPrivilegeValue
              • String ID:
              • API String ID: 3899507212-0
              • Opcode ID: 7f9a9ab2e16b4f7e02c33d5ef817c7d44649c90e88ae3d572652038d3a0b8bb7
              • Instruction ID: 914a5f78b380a0a9239cd10b529498f9ab71cb33c45e76043f66744f47c77b24
              • Opcode Fuzzy Hash: 7f9a9ab2e16b4f7e02c33d5ef817c7d44649c90e88ae3d572652038d3a0b8bb7
              • Instruction Fuzzy Hash: 42216D715093805FDB62CF29DC54BA2BFF8EF46210F0884DAED85DB252D665E808DB61
              APIs
              • RegQueryValueExW.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 030AA40C
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: bf78ea80c3481dbf296e5464506113a25017ffde94c0593c4745d8bcdec02148
              • Instruction ID: a30526e1a8e8d6b335e690a829d5e9fcff7bcea24d5c1f71b7f2721d99d8eca2
              • Opcode Fuzzy Hash: bf78ea80c3481dbf296e5464506113a25017ffde94c0593c4745d8bcdec02148
              • Instruction Fuzzy Hash: 2F21C076201600AFEB20CF55DC84FA6F7ECEF44614F08849AFD498B691D364E848CAB1
              APIs
              • ioctlsocket.WS2_32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E318F
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: ioctlsocket
              • String ID:
              • API String ID: 3577187118-0
              • Opcode ID: e8b412cf3838ac057a2ced88ab4ecc25f15b2821d6dfb2438f89eafe91624ce9
              • Instruction ID: 584a1a8a5f14a74584222e410dc78c43da682cf40c703d96d616d1d44e449e81
              • Opcode Fuzzy Hash: e8b412cf3838ac057a2ced88ab4ecc25f15b2821d6dfb2438f89eafe91624ce9
              • Instruction Fuzzy Hash: 9921C3755097806FD722CF10DC84F96BFB8EF46214F08849BE9489B652D374A508C7B2
              APIs
              • FindCloseChangeNotification.KERNEL32(?,149329D5,00000000,?,?,?,?,?,?,?,?,6CEC3C58), ref: 030AA780
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: ChangeCloseFindNotification
              • String ID:
              • API String ID: 2591292051-0
              • Opcode ID: fabc28dfa34381da422533ffdea0ccf15fb2bd24c46a93050ba7c4479ca83670
              • Instruction ID: d95e28727e9fa22af67930750e5938c043ed63b752b8a2c2383a9f9871f2541d
              • Opcode Fuzzy Hash: fabc28dfa34381da422533ffdea0ccf15fb2bd24c46a93050ba7c4479ca83670
              • Instruction Fuzzy Hash: 4021F3755057809FD701CF25EC85B92BFB8EF02220F0984EAEC858B253D2259909DBA1
              APIs
              • WSASocketW.WS2_32(?,?,?,?,?), ref: 037E123A
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: Socket
              • String ID:
              • API String ID: 38366605-0
              • Opcode ID: df8cc7f234e3f13d1f2a63e775d9e40084750786c498961c7b2fe3837f2b2153
              • Instruction ID: 7996ffab3da694403876bb342734fd7b3685020687a57aca33e5a3a3b798a402
              • Opcode Fuzzy Hash: df8cc7f234e3f13d1f2a63e775d9e40084750786c498961c7b2fe3837f2b2153
              • Instruction Fuzzy Hash: 0A21A171501200AFEB21CF55DD45B96FBA8EF09324F04889EE9898B651D376E418CBB2
              APIs
              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 037E1F36
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: Connect
              • String ID:
              • API String ID: 3144859779-0
              • Opcode ID: 2de66da5951a4164c38258c65135acbbc787b0b12552718a3527c0e6ca357761
              • Instruction ID: 0673975e26ba39538a7cf3538bc8027512738eb7f3b846ee13d01f14bc0cf7fb
              • Opcode Fuzzy Hash: 2de66da5951a4164c38258c65135acbbc787b0b12552718a3527c0e6ca357761
              • Instruction Fuzzy Hash: 93219F71409380AFDB22CF61DC44B92FFB8EF0A310F0884DAE9858B163D335A819DB61
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: FileView
              • String ID:
              • API String ID: 3314676101-0
              • Opcode ID: 3cc41857b86c2d91326025dbe50048c5c8abdb65a4a5bed6e0503f03da33d31e
              • Instruction ID: 9ec57825546f6c28f3db5e43db7601a615dc1e1900dd524e04db680b696ab335
              • Opcode Fuzzy Hash: 3cc41857b86c2d91326025dbe50048c5c8abdb65a4a5bed6e0503f03da33d31e
              • Instruction Fuzzy Hash: 9E21F071500200AFEB21CF55DC85F96FBE8EF08324F04849EE9498B641D375E408CBB2
              APIs
              • SetFileAttributesW.KERNEL32(?,?,149329D5,00000000,?,?,?,?,?,?,?,?,6CEC3C58), ref: 030AB213
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: 0afe54ac2c5711d7b1c60ba0a1dbe3ae41de34591e35238dd6019eb82b67caf7
              • Instruction ID: 4effccb5a34fb1746067a4dcb80020c262a3d7e0d25fe6684608d38a7c27318d
              • Opcode Fuzzy Hash: 0afe54ac2c5711d7b1c60ba0a1dbe3ae41de34591e35238dd6019eb82b67caf7
              • Instruction Fuzzy Hash: DD21D1715097C05FDB12CB69DC95B96BFE8AF02324F0D80EAD8848F153D2259849CBA1
              APIs
              • RegSetValueExW.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 030AA4F8
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: efe8417f9a56477fe90a03a176ce9fbb4638e7e5b85ca755f5d042e1aaaabb0c
              • Instruction ID: fd5f5245f08c29b50f8e841d02b532e7eddd4609baeeead593b9a05303904948
              • Opcode Fuzzy Hash: efe8417f9a56477fe90a03a176ce9fbb4638e7e5b85ca755f5d042e1aaaabb0c
              • Instruction Fuzzy Hash: F711B172601600AFEB20CE55DC44FA6FBFCEF44624F08845AED498AA81D360E448CAB2
              APIs
              • RegQueryValueExW.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E1580
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: c333903ec95f274f21cdeeab75a2b091b731b716d4eeeb35a957c18b37f7ca69
              • Instruction ID: a0d53f0586a8db6d19a4546911f1aaa3b9f3da4ba341a868e15f264afa424e2c
              • Opcode Fuzzy Hash: c333903ec95f274f21cdeeab75a2b091b731b716d4eeeb35a957c18b37f7ca69
              • Instruction Fuzzy Hash: 20118E72600600AFEB21CF55DC85FA6FBE8EF48624F08859AE9568B751D370E548CBB1
              APIs
              • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 037E3771
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: LibraryLoadShim
              • String ID:
              • API String ID: 1475914169-0
              • Opcode ID: 56589db2a837bf7148ba05bdc95e15237977bfe632f2adadcdd5514070fe9b56
              • Instruction ID: c59b0c0af77aa95342ec32e4e49ecdd50858953ddcb4df51fc4165ca9f8f6565
              • Opcode Fuzzy Hash: 56589db2a837bf7148ba05bdc95e15237977bfe632f2adadcdd5514070fe9b56
              • Instruction Fuzzy Hash: 6A2193B55097809FD722CB25DC84B52FFF8EF46214F0980CEE9858B253D265E808DB71
              APIs
              • CopyFileW.KERNEL32(?,?,?,149329D5,00000000,?,?,?,?,?,?,?,?,6CEC3C58), ref: 030AB39A
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: CopyFile
              • String ID:
              • API String ID: 1304948518-0
              • Opcode ID: 9627f8a164e940cd3a104f83443c91ac2c7900fecd76d1fafa393ab23a1803a3
              • Instruction ID: d272d7733279f23a49c64ec8ea8f830d21821ea7657d0466c9816da64a5f66b5
              • Opcode Fuzzy Hash: 9627f8a164e940cd3a104f83443c91ac2c7900fecd76d1fafa393ab23a1803a3
              • Instruction Fuzzy Hash: CB11AF725057809FD761CF69DC85B96FFE8EF06220F0C84AAE849CB252D274E848CB61
              APIs
              • GetProcessTimes.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E1C7D
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: ProcessTimes
              • String ID:
              • API String ID: 1995159646-0
              • Opcode ID: f3d1fb7be1b15dfc8e797332d15e5c2b58112b0b7d844cd2ffcd1be99bf7c9d2
              • Instruction ID: caea541d07f02410346b26509bfdb68abb89b27dc08c2d5d04651bc78e350360
              • Opcode Fuzzy Hash: f3d1fb7be1b15dfc8e797332d15e5c2b58112b0b7d844cd2ffcd1be99bf7c9d2
              • Instruction Fuzzy Hash: 0311D371500200AFEB21CF55DC46BA6BBE8EF48224F04849AE945CA651D371E448CBB2
              APIs
              • GetProcessWorkingSetSize.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E333F
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 898e5caf36d548225aeec1efcead9a2901b03469878d4e577c080b1a8e4e1364
              • Instruction ID: d97cbd3ae792bc783c12aa7632380e7be31a8ae9de95369ae990bfbb05a6d39f
              • Opcode Fuzzy Hash: 898e5caf36d548225aeec1efcead9a2901b03469878d4e577c080b1a8e4e1364
              • Instruction Fuzzy Hash: D111BF75600200AFEB20CF55DC45FAABBA8EF48224F0884AAE9498B641D774A5488AB1
              APIs
              • SetProcessWorkingSetSize.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E3423
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 898e5caf36d548225aeec1efcead9a2901b03469878d4e577c080b1a8e4e1364
              • Instruction ID: e13373ecc34df70c53c3cb9247c5a25627f70b6fc73f6efc248d8b20e227d79a
              • Opcode Fuzzy Hash: 898e5caf36d548225aeec1efcead9a2901b03469878d4e577c080b1a8e4e1364
              • Instruction Fuzzy Hash: 9D112776500200AFEB11CF54DC44BB6F7A8EF45724F0884AAED49CB641D374E508CBB1
              APIs
              • GetExitCodeProcess.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E0088
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: CodeExitProcess
              • String ID:
              • API String ID: 3861947596-0
              • Opcode ID: 335d3f1e54b60a1595bdc92e3a681985b73f419d70fe7810a603ef148b8a8994
              • Instruction ID: d8def68add675f1fe39173791074199cdbb8715046f7c81a52b808ab5fcf5d3a
              • Opcode Fuzzy Hash: 335d3f1e54b60a1595bdc92e3a681985b73f419d70fe7810a603ef148b8a8994
              • Instruction Fuzzy Hash: 3F110271600204AFEB10CF55DC85BAABBACEF44325F1884AAED49DF641D7B4E5088BB1
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 037E0616
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 9d75e081b9c4745fc20e1c8a4629b6adb458a85c8eb26255390db1d0024b9e75
              • Instruction ID: 468496ed88aa954416db4acf2773610bb9a8179c86552ef37133b70599301331
              • Opcode Fuzzy Hash: 9d75e081b9c4745fc20e1c8a4629b6adb458a85c8eb26255390db1d0024b9e75
              • Instruction Fuzzy Hash: 122196314093809FCB228F51DC44B56FFB4EF46220F0988DEE9858B562D275A459DB61
              APIs
              • WriteFile.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 030AB151
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: FileWrite
              • String ID:
              • API String ID: 3934441357-0
              • Opcode ID: aad1378f17b25aab2ef2706b389cc90bf4e7c7a08779d625bf1d57f70137996a
              • Instruction ID: 581e3b79910c1a624f59b74e8a447e2e6593e5a36437355a426a3191da435460
              • Opcode Fuzzy Hash: aad1378f17b25aab2ef2706b389cc90bf4e7c7a08779d625bf1d57f70137996a
              • Instruction Fuzzy Hash: 7011B271500700AFEB21CF95DC44FA6FBA8EF44724F04889AE9499A651D375A5188BB1
              APIs
              • K32EnumProcesses.KERNEL32(?,?,?,149329D5,00000000,?,?,?,?,?,?,?,?,6CEC3C58), ref: 037E04A6
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: EnumProcesses
              • String ID:
              • API String ID: 84517404-0
              • Opcode ID: d80437192ddc328183d6ce3c87af44d6288b0b8005ed00d025774806c40e65a7
              • Instruction ID: 01acdc8285cf3ca8d9e6fe983931345478685c85e68e500cdbb914ce5d75c371
              • Opcode Fuzzy Hash: d80437192ddc328183d6ce3c87af44d6288b0b8005ed00d025774806c40e65a7
              • Instruction Fuzzy Hash: B5116D715053809FDB21CF65DC84B96BFA8EF06220F0984AAED49CB262D265A848CB61
              APIs
              • ioctlsocket.WS2_32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E318F
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: ioctlsocket
              • String ID:
              • API String ID: 3577187118-0
              • Opcode ID: e4ffa058f588e01832bb8855658b175897832b6eb055c5725f67c9da5a108a54
              • Instruction ID: e60a58d377ed09d4b33110947486c2bd2e0af69ecaa91c8045ec742a8206c4ce
              • Opcode Fuzzy Hash: e4ffa058f588e01832bb8855658b175897832b6eb055c5725f67c9da5a108a54
              • Instruction Fuzzy Hash: 6811E075500600AFEB20CF50DC84BA6FBA8EF48324F18C4AEED499B641D374A5088BB6
              APIs
              • shutdown.WS2_32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 037E1AA4
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: shutdown
              • String ID:
              • API String ID: 2510479042-0
              • Opcode ID: cbb4b6abf0107ad226f3b8f605be5bbdfd6d2c5956637cc16c014b6a90cb1e91
              • Instruction ID: 5079d0edc8861bbd94bcbb1a0b4e8a4611dd42419b23416cb565696ce4312019
              • Opcode Fuzzy Hash: cbb4b6abf0107ad226f3b8f605be5bbdfd6d2c5956637cc16c014b6a90cb1e91
              • Instruction Fuzzy Hash: 55112571500200AFEB20CF51DC85BAAFBA8EF44324F08C49AED099F741D374A548CBB1
              APIs
              • SetErrorMode.KERNEL32(?,149329D5,00000000,?,?,?,?,?,?,?,?,6CEC3C58), ref: 030AA330
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: 6a2ee59f2d8063935c52bc08fd4457dec4deed877ebbae0e27054ecbf243c8c2
              • Instruction ID: 36d2983b69a0c3b36de7115237d508f93a48a32eacd90269784d52fd591e9e91
              • Opcode Fuzzy Hash: 6a2ee59f2d8063935c52bc08fd4457dec4deed877ebbae0e27054ecbf243c8c2
              • Instruction Fuzzy Hash: 4511827150A7C05FD7128B15DC54662BFB4DF47224F0C80CBED858B163D265A818D772
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: Initialize
              • String ID:
              • API String ID: 2538663250-0
              • Opcode ID: 589396d35dc42b222502d51734c230bdab9750092b04b21e5c42b6a29cb5a1e7
              • Instruction ID: 7abaf7ac5f7b12390c13dbca18e45bce9c24ace052822d165066da190af65b21
              • Opcode Fuzzy Hash: 589396d35dc42b222502d51734c230bdab9750092b04b21e5c42b6a29cb5a1e7
              • Instruction Fuzzy Hash: 51115B715093C09FDB12CB65DC54B92BFB4EF47220F0984DADD898F163C265A848DB62
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: select
              • String ID:
              • API String ID: 1274211008-0
              • Opcode ID: c3b15917d60a03ca3f6f8429b481d17d1682219b310c78b9f491270802194162
              • Instruction ID: de0bde879d49ea1b193fdfa89408fcd1bbbf72d976df8219ca0ef8ed1c0724c7
              • Opcode Fuzzy Hash: c3b15917d60a03ca3f6f8429b481d17d1682219b310c78b9f491270802194162
              • Instruction Fuzzy Hash: 521151756003409FEB20CF55D884F92FBECEF08620F0884AADD89CB651D335E548DB61
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: send
              • String ID:
              • API String ID: 2809346765-0
              • Opcode ID: 74071402aae2cfb74ddad54250fa12e963f06b65e7e076ebc14fdc0d49b2df81
              • Instruction ID: 25fbc3fc08f86b732bd741460f64313c158e7625f08ed33c498a44a1d3a9a5b4
              • Opcode Fuzzy Hash: 74071402aae2cfb74ddad54250fa12e963f06b65e7e076ebc14fdc0d49b2df81
              • Instruction Fuzzy Hash: FC11BF71409780AFCB22CF55DC44F52FFB4EF46224F0884DEED848B562C275A458DB62
              APIs
              • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 030ABC6A
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: LookupPrivilegeValue
              • String ID:
              • API String ID: 3899507212-0
              • Opcode ID: 87abb07efc7a06b6e265a0889b113b64e0fdca2f2c47915297bf9b3a52a74344
              • Instruction ID: 083808d437199f5e1f8f0be2f3c7118cfdddd1ff0e00ae0f6402b666bc4f7a15
              • Opcode Fuzzy Hash: 87abb07efc7a06b6e265a0889b113b64e0fdca2f2c47915297bf9b3a52a74344
              • Instruction Fuzzy Hash: 8D11A1B1A017009FDB60CF69EC85B56FBE8EF04220F08C4AEDC49CB751DA75E404CA62
              APIs
              • CopyFileW.KERNEL32(?,?,?,149329D5,00000000,?,?,?,?,?,?,?,?,6CEC3C58), ref: 030AB39A
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: CopyFile
              • String ID:
              • API String ID: 1304948518-0
              • Opcode ID: 87abb07efc7a06b6e265a0889b113b64e0fdca2f2c47915297bf9b3a52a74344
              • Instruction ID: 8d2da501a4f80d3098773ec3e4bdc2bbf41d6f4486480189ab619531992b9671
              • Opcode Fuzzy Hash: 87abb07efc7a06b6e265a0889b113b64e0fdca2f2c47915297bf9b3a52a74344
              • Instruction Fuzzy Hash: 8D11A1726017009FDB60CFA9EC85B56FBE8EF05220F0884AADC49CB742D7B1E444CB62
              APIs
              • GetFileType.KERNEL32(?,00000E90,149329D5,00000000,00000000,00000000,00000000), ref: 030AADC5
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: 2ec4ba64faeba0b03b1ce8270dd747b63cd8991a4afdc392601d97592b60c51e
              • Instruction ID: 609d98b8a99ae67568a1f543e76467580a810c6530eac03ee65e30f2e5e4db21
              • Opcode Fuzzy Hash: 2ec4ba64faeba0b03b1ce8270dd747b63cd8991a4afdc392601d97592b60c51e
              • Instruction Fuzzy Hash: 6101D675601700AFE710CB55DC44BAAFBA8DF45625F18809AED4A8B781D374E548CAB2
              APIs
              • FindClose.KERNEL32(?,149329D5,00000000,?,?,?,?,?,?,?,?,6CEC3C58), ref: 030AB4E0
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: CloseFind
              • String ID:
              • API String ID: 1863332320-0
              • Opcode ID: d23df6de29aeff1a4d0972ba20f4e7bbf70595221382b0b440183da0dd9fb921
              • Instruction ID: 850a45002c3e14c9d5ec9e75ab571858e5d259ecd6badfcc191b779be8baae8f
              • Opcode Fuzzy Hash: d23df6de29aeff1a4d0972ba20f4e7bbf70595221382b0b440183da0dd9fb921
              • Instruction Fuzzy Hash: D511E1715097809FCB128F25EC84B52FFB4EF47220F0880DFED858B262D265A848CB62
              APIs
              • WaitForInputIdle.USER32(?,?), ref: 030AAA3B
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: IdleInputWait
              • String ID:
              • API String ID: 2200289081-0
              • Opcode ID: b712893b9f93f59d941d4e02a028e7125b295c57475e8e78a71469daf616ea9a
              • Instruction ID: 3fe16ba4f7828c2bfa173ff49ac0706b9532fc8f4433741e533bd1420d5d1551
              • Opcode Fuzzy Hash: b712893b9f93f59d941d4e02a028e7125b295c57475e8e78a71469daf616ea9a
              • Instruction Fuzzy Hash: 47119E714097809FDB11CF55DD84B52BFA4EF46220F0984DAED858F262D275A849CB62
              APIs
              • K32EnumProcesses.KERNEL32(?,?,?,149329D5,00000000,?,?,?,?,?,?,?,?,6CEC3C58), ref: 037E04A6
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: EnumProcesses
              • String ID:
              • API String ID: 84517404-0
              • Opcode ID: 130554f15f98413714ecf476e4f5fc63ad99b38195ade708d5f24cc7cb4ef2e8
              • Instruction ID: 373e3bfeddb9d640d559b4fe8a02ea0ea072bb9f9b98262326b0891ecec3cb78
              • Opcode Fuzzy Hash: 130554f15f98413714ecf476e4f5fc63ad99b38195ade708d5f24cc7cb4ef2e8
              • Instruction Fuzzy Hash: C911A1726002009FDB20CF66D984B56FBE4EF0A220F0884AEDD49CF651D3B5E454DB62
              APIs
              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 037E1F36
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: Connect
              • String ID:
              • API String ID: 3144859779-0
              • Opcode ID: 34dde4a5b600989ecf6971479f196b8c61e397765a5804a0b4cfb999f837c5f1
              • Instruction ID: ea99aea9280c5eb9967de59ca015172342433b5f09a81c73e5d3fc7fb01d691e
              • Opcode Fuzzy Hash: 34dde4a5b600989ecf6971479f196b8c61e397765a5804a0b4cfb999f837c5f1
              • Instruction Fuzzy Hash: 10117C31501700DFDB20CF55D845B96FBE4EF08720F4888AAED898B622D331E458DFA2
              APIs
              • DispatchMessageA.USER32(?), ref: 037E0EE4
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: DispatchMessage
              • String ID:
              • API String ID: 2061451462-0
              • Opcode ID: a642b7ede680a93793d8016767877d88e6af738252e81f2af480399361532c91
              • Instruction ID: f9d64897f563f07d40fbb4320f3dfd65ad9ff68c13f880f65ee198f74de51833
              • Opcode Fuzzy Hash: a642b7ede680a93793d8016767877d88e6af738252e81f2af480399361532c91
              • Instruction Fuzzy Hash: 8611A171409380AFD7128F15DC44B62FFB8EF47224F0880CAED858B252D265A858CB72
              APIs
              • SetFileAttributesW.KERNEL32(?,?,149329D5,00000000,?,?,?,?,?,?,?,?,6CEC3C58), ref: 030AB213
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: 8ee4ee45eccc554443ddeca682a70a343e17c23cec2cf0c0cf7923a694c10918
              • Instruction ID: 518c13ebe57ec205ad0fb2c0ba3e8d6c4ccfe189f58fbedb6215b12c9b0d4447
              • Opcode Fuzzy Hash: 8ee4ee45eccc554443ddeca682a70a343e17c23cec2cf0c0cf7923a694c10918
              • Instruction Fuzzy Hash: E50192716016009FDB50CF69E98576AFBE8EF45220F08C4ABDC49CB751D675E444CFA1
              APIs
              • EnumWindows.USER32(?,00000E90,?,?), ref: 030AA1C2
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: EnumWindows
              • String ID:
              • API String ID: 1129996299-0
              • Opcode ID: 795ee74ec0731b4ebec23de5fe26e7a567344865a94181239c6c80c4cca127b4
              • Instruction ID: 0b0d7ece650a8980a47424d601d63b63fa3c184b3d62af025bdc657f80f30e6a
              • Opcode Fuzzy Hash: 795ee74ec0731b4ebec23de5fe26e7a567344865a94181239c6c80c4cca127b4
              • Instruction Fuzzy Hash: 6201DF71900200AFD310DF16DC86B66FBA8FF88A20F14816AEC089BB41D731F915CBE5
              APIs
              • GetVolumeInformationA.KERNEL32(?,00000E90,?,?), ref: 037E2036
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: InformationVolume
              • String ID:
              • API String ID: 2039140958-0
              • Opcode ID: c7055341b1f97d732f863394f218f096b17d3e7b28017c2b32d6b035dbd48474
              • Instruction ID: 412a15e3172486ca45cb959b5b087ba5e25e40b59fdf79fdfb7c5c2fbfa8fb7c
              • Opcode Fuzzy Hash: c7055341b1f97d732f863394f218f096b17d3e7b28017c2b32d6b035dbd48474
              • Instruction Fuzzy Hash: ED01BC71900200AFD310DF16DC86B66FBA8FB88A20F14816AEC089BB41D731F915CBE5
              APIs
              • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 037E3771
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: LibraryLoadShim
              • String ID:
              • API String ID: 1475914169-0
              • Opcode ID: 35d9a11384ca183972554d1ccf722d85babec1aaff2d2ff4d95182817426976e
              • Instruction ID: 3850427d781f639778004f1408b522d582a95c4ef3358036feb1705794bcdc59
              • Opcode Fuzzy Hash: 35d9a11384ca183972554d1ccf722d85babec1aaff2d2ff4d95182817426976e
              • Instruction Fuzzy Hash: B40192BA5046009FEB20CF29D984B52FBE8EF09624F0C809EDD498B752D371E408DF62
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 037E0616
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 6bdcbe24158081db9536b2a5dd870fb7bfecfd5a2f63678f44688352ebb06c26
              • Instruction ID: a4fb639707139f4b9990708b2e375c018bbe0360bbb62812706508309cdded48
              • Opcode Fuzzy Hash: 6bdcbe24158081db9536b2a5dd870fb7bfecfd5a2f63678f44688352ebb06c26
              • Instruction Fuzzy Hash: 6A016D324007409FDB21CF95D944B56FBE4FF49721F08889EDD494A612D376E418DF62
              APIs
              • FindCloseChangeNotification.KERNEL32(?,149329D5,00000000,?,?,?,?,?,?,?,?,6CEC3C58), ref: 030AA780
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: ChangeCloseFindNotification
              • String ID:
              • API String ID: 2591292051-0
              • Opcode ID: b61f7ef985dbb49c9a4577bf4c9bfaaf0909105836640c9c2e95a972bf5ec998
              • Instruction ID: 456c7e1ef95f0e4f06aeadda4880109c9c4c5907335dbad60b8e20e7cdc31306
              • Opcode Fuzzy Hash: b61f7ef985dbb49c9a4577bf4c9bfaaf0909105836640c9c2e95a972bf5ec998
              • Instruction Fuzzy Hash: AB01DF716016009FDB50CF69ED857ABFBA4EF01221F08C4ABDC498F792D275E448CEA2
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l
              • API String ID: 0-1731998491
              • Opcode ID: 19557b399679a06c6e4a585a51dac3f8e327f5a02d722aa586bf076c147ef9c1
              • Instruction ID: 8051338fee709c0ee201e56b966876cf37e94b042b293b23572925b066283e06
              • Opcode Fuzzy Hash: 19557b399679a06c6e4a585a51dac3f8e327f5a02d722aa586bf076c147ef9c1
              • Instruction Fuzzy Hash: C2B15D38A00208DFCB09DFB4F550A9D77B2FFD9258B218469E806977A4DF399C46CB91
              APIs
              • RegQueryValueExW.KERNEL32(?,00000E90,?,?), ref: 037E1182
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 301b34f01edb8f3d3d5d22b8b07a77fd084c7319f9206739243c1a12b348be1c
              • Instruction ID: d113e902f9e392c3227d6abdb5905188f462487b92147f553fe697efaa827e9f
              • Opcode Fuzzy Hash: 301b34f01edb8f3d3d5d22b8b07a77fd084c7319f9206739243c1a12b348be1c
              • Instruction Fuzzy Hash: 5D01AD71600200ABD210DF16DC86B66FBA8FB89A24F14815AEC089BB41D771F915CBE6
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: send
              • String ID:
              • API String ID: 2809346765-0
              • Opcode ID: 6c8cd950320fe00a2b9392d3e1adaad77ef67e03f37a5ca5eb85bf9b1c060700
              • Instruction ID: 1845dfa92b74c6b24eea6a12984e24e865435b75e690b266134c38b80cc000a9
              • Opcode Fuzzy Hash: 6c8cd950320fe00a2b9392d3e1adaad77ef67e03f37a5ca5eb85bf9b1c060700
              • Instruction Fuzzy Hash: 0501DE315007409FDB20CF99E844B55FBE0EF04324F08889ADD498B652D331E058DBA2
              APIs
              • WaitForInputIdle.USER32(?,?), ref: 030AAA3B
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: IdleInputWait
              • String ID:
              • API String ID: 2200289081-0
              • Opcode ID: bb5b6fbffffebdcbf24728c3e6620ef1f9ebe430cf23734a9e1201887e0ff9f0
              • Instruction ID: ad089d304e6417fdb035d76b0427c40f3c0f4d62ee67c4d549be3618188ae6f9
              • Opcode Fuzzy Hash: bb5b6fbffffebdcbf24728c3e6620ef1f9ebe430cf23734a9e1201887e0ff9f0
              • Instruction Fuzzy Hash: 06018F319016809FDB10CF59EA84B66FBE4EF05625F08C8AEDD498F652D375E448CFA2
              APIs
              • FindClose.KERNEL32(?,149329D5,00000000,?,?,?,?,?,?,?,?,6CEC3C58), ref: 030AB4E0
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: CloseFind
              • String ID:
              • API String ID: 1863332320-0
              • Opcode ID: 26b7fdd27ef75e6af2b89af212c41cf47a747dfd342e870524c883d50036b1ee
              • Instruction ID: 3a46ea7572c0c3387a64211533c0592409512c618406273504c3e13c9c614587
              • Opcode Fuzzy Hash: 26b7fdd27ef75e6af2b89af212c41cf47a747dfd342e870524c883d50036b1ee
              • Instruction Fuzzy Hash: C401AD356016409FDB20CF59E9847A5FBA4EF05224F08C0AADD098BB52D375E448CEA2
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: Initialize
              • String ID:
              • API String ID: 2538663250-0
              • Opcode ID: 1da469a2f139277e42ae8757916c012b4312d19d21137ed13d8d25bcb2426131
              • Instruction ID: c843741d1ca52017fc62a6b9f55d2fe38a5bf594668003e0ab3524357eaaf47f
              • Opcode Fuzzy Hash: 1da469a2f139277e42ae8757916c012b4312d19d21137ed13d8d25bcb2426131
              • Instruction Fuzzy Hash: 5801AD31A016409FDB50CF59E9847A6FBE4EF05225F08C8EADD498F652D375E448CEA2
              APIs
              • SetErrorMode.KERNEL32(?,149329D5,00000000,?,?,?,?,?,?,?,?,6CEC3C58), ref: 030AA330
              Memory Dump Source
              • Source File: 00000002.00000002.4661288028.00000000030AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030AA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30aa000_windows process.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: 327dcf4750e84cf1d4ef5654fc64bc4ba796b7e6bdc552338cc95f63c72a74c5
              • Instruction ID: 37bf1b56d6501fe2601bb01e9aad52ba44fbb81fee96d06c60135eab1394552f
              • Opcode Fuzzy Hash: 327dcf4750e84cf1d4ef5654fc64bc4ba796b7e6bdc552338cc95f63c72a74c5
              • Instruction Fuzzy Hash: 3AF08C36A05A409FDB10CF49E988765FBA4EF05625F08C0DAED494B792D275E448CAA2
              APIs
              • DispatchMessageA.USER32(?), ref: 037E0EE4
              Memory Dump Source
              • Source File: 00000002.00000002.4661963354.00000000037E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_37e0000_windows process.jbxd
              Similarity
              • API ID: DispatchMessage
              • String ID:
              • API String ID: 2061451462-0
              • Opcode ID: 5bf65fd81d39b6a376a3fec9474ee1b3b8fd472715d741fdbd107f8bbdcc02d3
              • Instruction ID: d1d607492baa2dc0524324c52bd04b0b227abe14dc0eab7556e44b84f1f6d302
              • Opcode Fuzzy Hash: 5bf65fd81d39b6a376a3fec9474ee1b3b8fd472715d741fdbd107f8bbdcc02d3
              • Instruction Fuzzy Hash: 83F08C35900240DFDB10DF16D988761FBA4EF09629F08C0EADD094B756D3B5E458CAA2
              APIs
              • KiUserCallbackDispatcher.NTDLL ref: 00752058
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: CallbackDispatcherUser
              • String ID:
              • API String ID: 2492992576-0
              • Opcode ID: e20b4dcbcc2e540e8773a70457cc7e874608c9df2f1d0c47d2b2fb7112564f9f
              • Instruction ID: be176b6b6fa2249b24d1f95b1eddd5433bb6b3a3c05ef9df4f302a9f8e49b0c3
              • Opcode Fuzzy Hash: e20b4dcbcc2e540e8773a70457cc7e874608c9df2f1d0c47d2b2fb7112564f9f
              • Instruction Fuzzy Hash: 10B092B2506204AA92005B74FC488797BA8B2A2312360C832F826568A6E7BA4424AF10
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l
              • API String ID: 0-1731998491
              • Opcode ID: 93ec0e3823bd75aa7a1b34e2755a71397b79cb9fd53ff3ad65fe26ecb96fa512
              • Instruction ID: aa6131737213a06e9fb836d273e20274fb3756157262fefd2862ecd6e0de5e40
              • Opcode Fuzzy Hash: 93ec0e3823bd75aa7a1b34e2755a71397b79cb9fd53ff3ad65fe26ecb96fa512
              • Instruction Fuzzy Hash: 8B912D38A00208DFCB09DFB4F550A9D77B2FFD8258B218569E816977A4DF399C46CB50
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l
              • API String ID: 0-1731998491
              • Opcode ID: b2bcc1d3d3a218a15b0bcd241f6afd68690c7b4e2f8052fabdc71382cf12d95a
              • Instruction ID: 60754c7c4a45c954aa14a0c6e77d7022c4048f3492f9339490b96e80e35ae6e1
              • Opcode Fuzzy Hash: b2bcc1d3d3a218a15b0bcd241f6afd68690c7b4e2f8052fabdc71382cf12d95a
              • Instruction Fuzzy Hash: 97812B38A00208DFCB09DFB4F550AAD77B2FFD8258B218569E811977A4DF399C46CB90
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l
              • API String ID: 0-1731998491
              • Opcode ID: 88230451558dc12bf1f310f11ba7ee3ab8942a74fc8e488285f882645382d7c6
              • Instruction ID: 0d1719173edbac31efef6fb4d9f4db33def80894d1dec10147fe747d180f2df0
              • Opcode Fuzzy Hash: 88230451558dc12bf1f310f11ba7ee3ab8942a74fc8e488285f882645382d7c6
              • Instruction Fuzzy Hash: A4812A38A00208DFCB09DFB4F550AAD77B2FFD8258B218569E811977A4DF399C46CB90
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l
              • API String ID: 0-1731998491
              • Opcode ID: ba67360fb7cf20e2d8e76548af56be95c96e8585fa0db1224c0922daf01b1661
              • Instruction ID: 4cde253b5a35cfdba6f69b4f8c0fb1dac3ed20e85159a8bb863b0d41b1e2f9cf
              • Opcode Fuzzy Hash: ba67360fb7cf20e2d8e76548af56be95c96e8585fa0db1224c0922daf01b1661
              • Instruction Fuzzy Hash: F571BF38700214CFDB08EB78E550B6D77E2EBD8318B2581ADE4058B794DF39AC86CB51
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l
              • API String ID: 0-1731998491
              • Opcode ID: 0bec0eaa5c275267e1cb666fa387e793c7dc41241418c8b7cb8bbef6c40543d5
              • Instruction ID: 88535fb42c50ceb30f8b06e5456167a428626b5d2e072253e87a89fae97b3348
              • Opcode Fuzzy Hash: 0bec0eaa5c275267e1cb666fa387e793c7dc41241418c8b7cb8bbef6c40543d5
              • Instruction Fuzzy Hash: FC713938A00208DBCB19DF74F550AAD77B2FBD8258B218469E811977A4DF399C46CB90
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l
              • API String ID: 0-1731998491
              • Opcode ID: 717b6ed7520913eb38d07be41cc18881e5d5e1c8dd919bb1652ee696f5daa11b
              • Instruction ID: 16d3738509ff1a966c737e12b4443911fcdef40f8e83f2545713ab8375cbc3a8
              • Opcode Fuzzy Hash: 717b6ed7520913eb38d07be41cc18881e5d5e1c8dd919bb1652ee696f5daa11b
              • Instruction Fuzzy Hash: 7A517338B002089BDB18DFB4E550AAD73B2FFD4258F218569E811977A4DF399C46CB90
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: :@2l
              • API String ID: 0-1731998491
              • Opcode ID: c774b8bc0e7a855f1e4204bf6f61dd1b4f2ed14796dc8a94353d55a806e29a16
              • Instruction ID: f6a36a08b82035e4ea42d41ba953e17a79c41c2fa1c5ed963472a6e5ec1cfce1
              • Opcode Fuzzy Hash: c774b8bc0e7a855f1e4204bf6f61dd1b4f2ed14796dc8a94353d55a806e29a16
              • Instruction Fuzzy Hash: F2318438B002189BDB04DBB4F510AAD73B7FBD8248F21806EE81597754DF399C46CBA1
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: L.Yl
              • API String ID: 0-3978860573
              • Opcode ID: 67d506488296b93fe041b3c4d505b6f212595f48d74dabf3a7f87b70b59cf81a
              • Instruction ID: e03b69a9258c0c91d66e21a616611aaa20051783c8e17e81572695115f5d8133
              • Opcode Fuzzy Hash: 67d506488296b93fe041b3c4d505b6f212595f48d74dabf3a7f87b70b59cf81a
              • Instruction Fuzzy Hash: C6116339F012189BDB14EA79D954BFEB7FAAFC8210F148539E506AB780DF349D4187A0
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID: \OYl
              • API String ID: 0-4096028309
              • Opcode ID: 54ecc974671b7327dc615c878556f03feed0b725b48d9510775386e98f539168
              • Instruction ID: 1616c02b799469b4f17ab49f0e1f0552e868bfb45c74bdcdde488e6326511a5f
              • Opcode Fuzzy Hash: 54ecc974671b7327dc615c878556f03feed0b725b48d9510775386e98f539168
              • Instruction Fuzzy Hash: F3214F34B111549FCB04DBB8E494DEDB3F2BFD8258B1181A9E4069B764CF31AC45CB91
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d6b32d711fcfd327f4b0749a838e067dda8cadf10573d6d97578e30dd5f38255
              • Instruction ID: 59c073055cb2aa39e055ba7e63acbc526ea4c804c9f1bea89f437846099d5312
              • Opcode Fuzzy Hash: d6b32d711fcfd327f4b0749a838e067dda8cadf10573d6d97578e30dd5f38255
              • Instruction Fuzzy Hash: D371453411A3C98FC701DB78F9959857BB1EFE224831585EAD0448B267EF3C5D8ACB62
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b544af45515c70b6afaaff60feef5e91a670ac6ad536c93d172034e43012dc64
              • Instruction ID: f523afee747f71d6c6269f79d3f5f591be0a213305af82ad856c936e9f1727e1
              • Opcode Fuzzy Hash: b544af45515c70b6afaaff60feef5e91a670ac6ad536c93d172034e43012dc64
              • Instruction Fuzzy Hash: E6614B39B00214CFCB09DF78E654A69B7A2EBD8258B1541B9D9019B3A4DF3DDC86CB60
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4caeb51c9b7ab44bf83a000f21606817eb3cf8fac5dadefeec5036de9d2aa6b2
              • Instruction ID: 73f114d80a6b2ddb823c9d1f56febd80779655d6ff15554fe2a1aaf3b71e96f3
              • Opcode Fuzzy Hash: 4caeb51c9b7ab44bf83a000f21606817eb3cf8fac5dadefeec5036de9d2aa6b2
              • Instruction Fuzzy Hash: 3A51AE38700214CFCB14EB74F554A6D77A2EBD9218B1541BDE4058B794EF39EC86CB60
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fc15c7696bd7e2dfade9552ce8671952366927bb5b5bd39247ed17f52dc54ac8
              • Instruction ID: b1cfd739bcd414c1953f98dc7c3c09919dd495a4f3878b062882e70e47735d64
              • Opcode Fuzzy Hash: fc15c7696bd7e2dfade9552ce8671952366927bb5b5bd39247ed17f52dc54ac8
              • Instruction Fuzzy Hash: 6A519034A05205DEDB14DF36EA447E977E6AF8A351F5842A4E411DA3D0EF38DE86CB20
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ba12234b52788bb0aec1905358ef84775e7a26bef31c56e5f98d57a43ef83651
              • Instruction ID: 03d85e2a9be272396f7c33bc44a81d98226c09d43d24410e7d3af704eb4efda9
              • Opcode Fuzzy Hash: ba12234b52788bb0aec1905358ef84775e7a26bef31c56e5f98d57a43ef83651
              • Instruction Fuzzy Hash: 40514B39700208CFCB09DF74F654A6977A3EBD825471541A9D9019B3A4DF3EEC86CBA0
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dca0b03f6e5f26da4cfa0c0a753cd99017e2966b8d20f6943a891b3dd621ebc6
              • Instruction ID: 4be3eb389a17a3ed06a4ceb9f165ca5b8c68c9648e734bcca88111433edcdef9
              • Opcode Fuzzy Hash: dca0b03f6e5f26da4cfa0c0a753cd99017e2966b8d20f6943a891b3dd621ebc6
              • Instruction Fuzzy Hash: 56510638A00214CFCB54EB34C9A8BADB7F6AF89205F1441E9E40A9B761DF75AD85CF41
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 769aae09435349c328e1840b1531b926904b43e44b54c2b13e8119f7be6fe333
              • Instruction ID: 7988b05b18144c0951846831b0a2e6d2336ed9d2bceae247faffdb63cb87f68f
              • Opcode Fuzzy Hash: 769aae09435349c328e1840b1531b926904b43e44b54c2b13e8119f7be6fe333
              • Instruction Fuzzy Hash: FD418F34A01205CEDB14DF36EA047E876E6AB86365F1842A9D411DA3D0EF38DEC6CB20
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 36bfb3baee024e8919f176364c4186a17c1fa4d5222a37f381ada9626ce5c3a7
              • Instruction ID: 01bf209e52c0b5fb01d8a48f41b08394a9471d772681ba094e20ccce9d750cc4
              • Opcode Fuzzy Hash: 36bfb3baee024e8919f176364c4186a17c1fa4d5222a37f381ada9626ce5c3a7
              • Instruction Fuzzy Hash: 4B419E38700214CFDB14EB78F654AAD77E2EBD8218B154169E4058B794EF39EC8ACB60
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3b58543575103e74eb5062caeeea6eb1f81a2cf2687457737ef3e2333338ad34
              • Instruction ID: 8f84982af18e0b1fe7104c0c00a3954ab5ea71ab807a416fd860520190e1fe3a
              • Opcode Fuzzy Hash: 3b58543575103e74eb5062caeeea6eb1f81a2cf2687457737ef3e2333338ad34
              • Instruction Fuzzy Hash: 3B418235B012058FCB04EF74D9945AEB7E6AF85204B188079D805DB79AEF38DE85C7A0
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 891213debfdb2556d637820afac5a29f8191b43ea8809ba815fe93f3b9cce227
              • Instruction ID: 492fbff2ce4c36647683392dda8bb3eaad8d7a30448ee8d1bb782648483503f3
              • Opcode Fuzzy Hash: 891213debfdb2556d637820afac5a29f8191b43ea8809ba815fe93f3b9cce227
              • Instruction Fuzzy Hash: 9D419131A012018FCB04DF34D9946AEB7F6AF85244B188479D805DF79AEF38DD85CBA0
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 384c6455fc740995b8ebe801cc9ffc8e775eb59ecbb6cce40fef782868be0174
              • Instruction ID: 0483d1a98e905f6bcabcd136926967381a3efe6ed10f2c4b70da580f661e43fb
              • Opcode Fuzzy Hash: 384c6455fc740995b8ebe801cc9ffc8e775eb59ecbb6cce40fef782868be0174
              • Instruction Fuzzy Hash: 6531AE38B002059FDB04DF75D954BAEBBF6AF88614F248179E405EB3A0DF749C5A8B90
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ad361d0f88e6438af08fd3788712edde81cff0bf6dd081ce77d86455b30f9e36
              • Instruction ID: 69ffec21a8d1b34a45f496e8838f9faf1fddc6239d47bd2a4a9a7a40926ce351
              • Opcode Fuzzy Hash: ad361d0f88e6438af08fd3788712edde81cff0bf6dd081ce77d86455b30f9e36
              • Instruction Fuzzy Hash: 6931A438B001148BDB14EB78F914BAD77E2EBC8208B154169D415CB794EF39EC4ACB60
              Memory Dump Source
              • Source File: 00000002.00000002.4662065239.0000000003DA0000.00000040.00000020.00020000.00000000.sdmp, Offset: 03DA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3da0000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 19c96e71e04b9e002a5ccccf56022ae483066ac2129c77e709343cb4ad324bfa
              • Instruction ID: fb62d41f46e7af4d1261c4914e45f0c48c149465fd7db8f161881c6c5b4ff419
              • Opcode Fuzzy Hash: 19c96e71e04b9e002a5ccccf56022ae483066ac2129c77e709343cb4ad324bfa
              • Instruction Fuzzy Hash: 0021793510D7C09FDB03CB24D990B51BF72AB47608F1D85DAD4888B6A3C32AC916DB92
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d9f49cb29d58d49386dda2b38cf8cf4cb03573ac52ea065a785249a44395d765
              • Instruction ID: 484f397a4326de3330fe64d706bfa794faf89bc0da4c64086f3679a1f4108db3
              • Opcode Fuzzy Hash: d9f49cb29d58d49386dda2b38cf8cf4cb03573ac52ea065a785249a44395d765
              • Instruction Fuzzy Hash: 43210839700208CFCB09DF74F25496973A3EBE925871641ADD9059B7A4DF3EAC86CB90
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0f628ca6e58d70e7506e301d5fed835ae2f0c0d5054e57d10f1504ba00d6c30d
              • Instruction ID: b2ebcfc478ce080100b56f181d4c9782d007d803c8081bc490f58c66f512596f
              • Opcode Fuzzy Hash: 0f628ca6e58d70e7506e301d5fed835ae2f0c0d5054e57d10f1504ba00d6c30d
              • Instruction Fuzzy Hash: 6611A238B112248FDB14EB79F6506ACB7F2AF84218B248469E415DB384EF39D885CB60
              Memory Dump Source
              • Source File: 00000002.00000002.4664811646.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6610000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2f40844d49fc75e9277ab3e298d3b8a80870a0fca0cde0ff7cc7f135e8d90911
              • Instruction ID: 388d08cf0337f6671969c8a746d833d81b009625cc97db5d53fbc801f87beca4
              • Opcode Fuzzy Hash: 2f40844d49fc75e9277ab3e298d3b8a80870a0fca0cde0ff7cc7f135e8d90911
              • Instruction Fuzzy Hash: 5211BAB5A08341AFD340CF19D840A5BFBE4FB88664F14896EF998D7311D231E9188FA2
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 40d3064f7a5e8949af50cc00b0648f9331b61053dd1c5ad9b9d9f2b8bc346862
              • Instruction ID: 2f9cd90fdbbc9ab6ef29f7868affa942732ff392a1a66b85c91b08d3465a7946
              • Opcode Fuzzy Hash: 40d3064f7a5e8949af50cc00b0648f9331b61053dd1c5ad9b9d9f2b8bc346862
              • Instruction Fuzzy Hash: DE11E132F403049BEF00EAB9C9906EEB7E6EFC4314F540871EA04D7384EB75D65286A2
              Memory Dump Source
              • Source File: 00000002.00000002.4662065239.0000000003DA0000.00000040.00000020.00020000.00000000.sdmp, Offset: 03DA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3da0000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 22c565cbc469745acfa49e2de009e9259056843e08af22d8841aa6ed6482318b
              • Instruction ID: 24891d01b8cbdaef15cc0ea06370b65e0d0d6a9cd8967826cd0fe76dd493fdaf
              • Opcode Fuzzy Hash: 22c565cbc469745acfa49e2de009e9259056843e08af22d8841aa6ed6482318b
              • Instruction Fuzzy Hash: 53110631208B80DFD701CB14DA80B26FBA5EB89B08F28C99CE4894B782C377D913DA41
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b06b880e9911d109105ed59fa6e1e6f9f7957b1915044f7bfadade22486a4e17
              • Instruction ID: 2eb65ece3e04e720ec7d0c26afcaef81e97b9282d5e8de6b35dafcc7338f6077
              • Opcode Fuzzy Hash: b06b880e9911d109105ed59fa6e1e6f9f7957b1915044f7bfadade22486a4e17
              • Instruction Fuzzy Hash: CE11E536E002148BCF00EBB8DD109EE77F5EF88244B1509A5E441EB351DB39EE15CBA0
              Memory Dump Source
              • Source File: 00000002.00000002.4661329999.00000000030BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030BA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30ba000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5efb4b24ca2533948f2ef6b962160edc3bdf2dfc4301f732803aaf8a12d7ab83
              • Instruction ID: ab88e4c804ddfb020f8bb5c40818f72d7c5e81b2f3da05dd01ed8bc5bd52ca57
              • Opcode Fuzzy Hash: 5efb4b24ca2533948f2ef6b962160edc3bdf2dfc4301f732803aaf8a12d7ab83
              • Instruction Fuzzy Hash: 22110CB5A08301AFD350CF09DC40E5BFBE8EB88660F14896EF95997711D231E908CFA2
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 447e09c012e549e4be08775ce533239f6bcb89dca6eb4cb9506ba1233e92f301
              • Instruction ID: 61ea4a6a9a4b399a480e0fde551f7964cb5fcd45a7bb8a848804263afe6de356
              • Opcode Fuzzy Hash: 447e09c012e549e4be08775ce533239f6bcb89dca6eb4cb9506ba1233e92f301
              • Instruction Fuzzy Hash: 4C11FE71D1110CAFDB04DFA9E880CDEBBF9EFC8354F10852AE115A3210EB306A05CB50
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7492db6ccadc83dd2e9c84d53acd3cbb677970b6af576bdfb250a9f7f04acba2
              • Instruction ID: 2dbf5280f759a0820b860a5b4cab77857ceba0c08a03ea362a71055d9fafeb2e
              • Opcode Fuzzy Hash: 7492db6ccadc83dd2e9c84d53acd3cbb677970b6af576bdfb250a9f7f04acba2
              • Instruction Fuzzy Hash: C0018C31F002088F8B54DBB8A90499EBBFAEBC925472140BDC409E3351EF359E46CB90
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b68228bafa9233126db7b152c1fa09844888c4eda955236e1fd932aeeb91ec13
              • Instruction ID: 5fef8d3c3e76c9d3a10bcd14efc8914ab5bad050dffec1aeaf76ee9a2a6da120
              • Opcode Fuzzy Hash: b68228bafa9233126db7b152c1fa09844888c4eda955236e1fd932aeeb91ec13
              • Instruction Fuzzy Hash: 4101AD35B002048FCB15DFB8E94489DBBE2AB8A21872480BDC405E7751EF359D46CB80
              Memory Dump Source
              • Source File: 00000002.00000002.4662065239.0000000003DA0000.00000040.00000020.00020000.00000000.sdmp, Offset: 03DA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3da0000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7dd6f1c7f71d1fb3e1c931ad5423c675738743c4a1243430050b5b75342c3f9d
              • Instruction ID: 6b2c2904549512a1c226c3ee05782b38cb07b5dce96e76a70fad8506341b645d
              • Opcode Fuzzy Hash: 7dd6f1c7f71d1fb3e1c931ad5423c675738743c4a1243430050b5b75342c3f9d
              • Instruction Fuzzy Hash: E40186765097806FD7118F16EC44862FFB8EF8663071984DFEC898B612D225B809CBB2
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7a3fd89d7b0e1d0d6a43d78c7474e3b459ea5093d9d0c932a51cf839fb6df47a
              • Instruction ID: 7531123023ac51f8136900d1f910165511c0da8fd06e5636ec305ce3ba729244
              • Opcode Fuzzy Hash: 7a3fd89d7b0e1d0d6a43d78c7474e3b459ea5093d9d0c932a51cf839fb6df47a
              • Instruction Fuzzy Hash: 4E015A38A01214CFCB18EFB9E2545ACB7F2FF88219B548479E4159B380EF39C881CB60
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5c3cdd1b954ecb7a92a2acf3452500c88fae7cb5581854e38dc0ff8c5ec86616
              • Instruction ID: 6087b0936a08f131f6c8a7cdab0d737dcfd9fae68fae5db92818d1b78a8a634f
              • Opcode Fuzzy Hash: 5c3cdd1b954ecb7a92a2acf3452500c88fae7cb5581854e38dc0ff8c5ec86616
              • Instruction Fuzzy Hash: A6015E3860634ADFCB00FB74E1594997BF1EFC1208B00892DE4458B355EF369848DB53
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 497823f9b06a4c4f03bf0c926b6c42d6ff31694d956e136564c6120406580e41
              • Instruction ID: 1565618e8695a96974dac446436547eaee82cbb602c90c9f63099657e0ebd7da
              • Opcode Fuzzy Hash: 497823f9b06a4c4f03bf0c926b6c42d6ff31694d956e136564c6120406580e41
              • Instruction Fuzzy Hash: 64F01DB1E012089FCF40EFB888416DEBBF5EB89354F60447AD618E7241F7369A018BA1
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b5b536ed752a7b74f965087c1b59cea7be802c1d0b8ac78f76a12722149e0eb4
              • Instruction ID: 3d39b627524dbecfb559c8dbdfe45d3fccee0449590fb4315847113895f58c80
              • Opcode Fuzzy Hash: b5b536ed752a7b74f965087c1b59cea7be802c1d0b8ac78f76a12722149e0eb4
              • Instruction Fuzzy Hash: 00F019B1E012099FCF40DFB998416DFBBF9EB89214F50407AD619E7240F7365A058BA5
              Memory Dump Source
              • Source File: 00000002.00000002.4662065239.0000000003DA0000.00000040.00000020.00020000.00000000.sdmp, Offset: 03DA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3da0000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e688d466f81438e4200f8fd76d8625fe577cca3db3c4452d967b0a8c1c81d4f3
              • Instruction ID: 81e0972387d1a0e65e6985c7630a8d16015d524e985d7ffa4f9e1aa2e9cf26d5
              • Opcode Fuzzy Hash: e688d466f81438e4200f8fd76d8625fe577cca3db3c4452d967b0a8c1c81d4f3
              • Instruction Fuzzy Hash: 51F01D35108644DFC705CB04D680B16FBA6EB89718F24CAADE9490B752C337E913DA81
              Memory Dump Source
              • Source File: 00000002.00000002.4662065239.0000000003DA0000.00000040.00000020.00020000.00000000.sdmp, Offset: 03DA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3da0000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8644f7f209893539a071490182d1f88a1435111a6b0c44896a5e1706d90b5611
              • Instruction ID: 5d62c7bc306ed48ab5ced39f2872f0a617406d75f4e229c7aee9aeeed8931d02
              • Opcode Fuzzy Hash: 8644f7f209893539a071490182d1f88a1435111a6b0c44896a5e1706d90b5611
              • Instruction Fuzzy Hash: 29E092766007004F9650CF0AFC41452F7A4EB84630B18C07FDC0D8BB01E236B509CAA5
              Memory Dump Source
              • Source File: 00000002.00000002.4664811646.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6610000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d626ecb56ad84013b454908627925510f16881889414f35db5605f4451ebe235
              • Instruction ID: 9e6e8ad802644fa0206737f430e846395d3403140e95892de26ad818a43bd051
              • Opcode Fuzzy Hash: d626ecb56ad84013b454908627925510f16881889414f35db5605f4451ebe235
              • Instruction Fuzzy Hash: 41E0D8B250030067D2108F06EC45F53FB58DB81A31F48C46BED091B701E172B514CAE1
              Memory Dump Source
              • Source File: 00000002.00000002.4664811646.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6610000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a3fd0207c24b89cbdd319e55b660de4c0299406678b7a8711981d3d670aa6472
              • Instruction ID: c3f0f4df3d210df90686f0e43f8624db09488ca3591fb28b403088b684720caf
              • Opcode Fuzzy Hash: a3fd0207c24b89cbdd319e55b660de4c0299406678b7a8711981d3d670aa6472
              • Instruction Fuzzy Hash: 4AE0D8B254030067D2108F06EC45F52FB58DB84A31F44C46BED181B741E172B5188AE2
              Memory Dump Source
              • Source File: 00000002.00000002.4661329999.00000000030BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 030BA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30ba000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c92689a6f8477ff88b4667f43eb60ad4558ed32e9d702accf1605f724e2b9fd3
              • Instruction ID: 4d254cb786b385ba58a77916c7178015235f4e48b1361d73c4e6304cb03f9617
              • Opcode Fuzzy Hash: c92689a6f8477ff88b4667f43eb60ad4558ed32e9d702accf1605f724e2b9fd3
              • Instruction Fuzzy Hash: F9E0D8B254030467D2108F06EC45F52FB58DB41A31F04C56BED195B701E172B5148AF1
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 77638be3cd7992ffce0e1bb8a4738c04e6c5eabe0b7eb67218ff0dc59ee919ee
              • Instruction ID: 3117d6a84bdc0fa5a770ebe93835741a176a84cfcf8fae54ae0e4641810b3e41
              • Opcode Fuzzy Hash: 77638be3cd7992ffce0e1bb8a4738c04e6c5eabe0b7eb67218ff0dc59ee919ee
              • Instruction Fuzzy Hash: 7AE0C2302092D96FCB55AB68BA058C83B7D9F82250349869FE808DF147CF204D89E397
              Memory Dump Source
              • Source File: 00000002.00000002.4661275002.00000000030A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 030A2000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30a2000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1e4251c5e95c74caba5eb087f06791307a5c8e0d493778b948d918acea856ea8
              • Instruction ID: 53119cedfd549ef146ebd6a4c779bbaaf17055acb789a7314c42e136ff587e83
              • Opcode Fuzzy Hash: 1e4251c5e95c74caba5eb087f06791307a5c8e0d493778b948d918acea856ea8
              • Instruction Fuzzy Hash: C2D05EB9205AC14FE316CA1CD1A4F9577E8AB51708F4A48FDA8008BBA3C768D9D2D200
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 970fda6adfc6184e099c6f8a9f7415acea1bd1377ef51d1b0c8f5402a6e878d0
              • Instruction ID: 03c5584fabddbcc12806feea5a34383c645f7aebc24284d01be50e179c9c8a30
              • Opcode Fuzzy Hash: 970fda6adfc6184e099c6f8a9f7415acea1bd1377ef51d1b0c8f5402a6e878d0
              • Instruction Fuzzy Hash: 56D0A73480E384AFCB07DBB498340E97F75DA0620472444EED449C7AA2E53609048715
              Memory Dump Source
              • Source File: 00000002.00000002.4661275002.00000000030A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 030A2000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_30a2000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 73ab8ce3451af2e09b8a90bab68cb71f89addb3b8ab05526bfcc904764f56c86
              • Instruction ID: c1c6db916874632e5e9494dcabdd5ec90547bd18f36b962f922f69d4f4ef407e
              • Opcode Fuzzy Hash: 73ab8ce3451af2e09b8a90bab68cb71f89addb3b8ab05526bfcc904764f56c86
              • Instruction Fuzzy Hash: 51D05E352016814BDB15DA0CD2D4F5977E8AB41704F1A48FCAC108B7A2C3B8D981CA00
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d83bd4bec50ef46c526809d508043d6e7d7bfcfa1347284cc75bdbc59bfed7b6
              • Instruction ID: f23c1346d357abe7b420c68eaa8db0508e151c12507cdc6d1447e77e119fb4ca
              • Opcode Fuzzy Hash: d83bd4bec50ef46c526809d508043d6e7d7bfcfa1347284cc75bdbc59bfed7b6
              • Instruction Fuzzy Hash: B7C08C34D0130CBBCB04EBE1D8154EDBB7CDA04110B2004EDE80A83340EE312E008690
              Memory Dump Source
              • Source File: 00000002.00000002.4661860339.0000000003640000.00000040.00000800.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_3640000_windows process.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 445f2fe048586805854e828994a4cf03fc3cfb57d7505faa8ddb4a596c2d312c
              • Instruction ID: cebc31bd15aaad0377c4fc41700533d97ecec626bc26fdd2962cc92169ae37b6
              • Opcode Fuzzy Hash: 445f2fe048586805854e828994a4cf03fc3cfb57d7505faa8ddb4a596c2d312c
              • Instruction Fuzzy Hash: 6AD0C92140D3D44FC713C7358CB26627FB06C0B20039D0ADAC0858F1A7D1189410DF56
              APIs
              • NtQueryDirectoryFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 0074F3C4
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: DirectoryFileQuery
              • String ID:
              • API String ID: 3295332484-0
              • Opcode ID: 9dceccf9a44aabb2be698831e98a78414bac3d439b3026c29d39ba623b992913
              • Instruction ID: 895a6963ad45f40f18160ed4f6ddd9e7bcd7acf1cc3689f6df0f17e4ff7a44ce
              • Opcode Fuzzy Hash: 9dceccf9a44aabb2be698831e98a78414bac3d439b3026c29d39ba623b992913
              • Instruction Fuzzy Hash: FD019AB2205289BF9B00CE9ADCC4DEBBBADFF9E254B484055FA5897202C234AC51C770
              APIs
              • NtCreateUserProcess.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 0074ED50
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: CreateProcessUser
              • String ID:
              • API String ID: 2217836671-0
              • Opcode ID: e7f9c7d7958acced94d7c35f7d3ad14122034ac72a893c4c50fa84ec892b8509
              • Instruction ID: 0a45d84564014322b3c8f6ac11effa4d4a8f3f26fbab7f3d39893ba01bb1b1cb
              • Opcode Fuzzy Hash: e7f9c7d7958acced94d7c35f7d3ad14122034ac72a893c4c50fa84ec892b8509
              • Instruction Fuzzy Hash: 2D0151B6604249BF9B10CE8ADCC4DDB7BACFB8D7A4B444405FB1897241C274AC51CBB0
              APIs
              • NtNotifyChangeKey.NTDLL(?,?,?,?,?,?,?,?,?,?), ref: 0074F1D0
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: ChangeNotify
              • String ID:
              • API String ID: 3893256919-0
              • Opcode ID: bf962154a396e9f18836c2455da795c322e65a39c3f79bc07339c3f119e50049
              • Instruction ID: d9f26fbd7514b7e974ca27c19c13a44d611e8a1eb663dfe228f363f140399aeb
              • Opcode Fuzzy Hash: bf962154a396e9f18836c2455da795c322e65a39c3f79bc07339c3f119e50049
              • Instruction Fuzzy Hash: 0C01BBA6205189BF9B108F9ADCC5DEBBF6DFB9E364B484015BA5883201D220AC50C7B0
              APIs
              • NtLockFile.NTDLL(?,?,?,?,?,?,?,?,?,?), ref: 0074F4DC
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: FileLock
              • String ID:
              • API String ID: 3169042693-0
              • Opcode ID: 994fdd23d9ace57a19280f67599e9ca0f661f72f8494cbbd5a4cf1879edc8641
              • Instruction ID: f185c3ae438be5a318f86b28fb7fad58952d54a7ee358b1779c7e2e530ed94d7
              • Opcode Fuzzy Hash: 994fdd23d9ace57a19280f67599e9ca0f661f72f8494cbbd5a4cf1879edc8641
              • Instruction Fuzzy Hash: FB01C2A62051997F97108E9ADCC5DFBBFACFB5E254B444055FA5883201C2309C50C7B0
              APIs
              • NtMapViewOfSection.NTDLL(?,?,?,?,?,?,?,?,?,?), ref: 0074F5DC
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: SectionView
              • String ID:
              • API String ID: 1323581903-0
              • Opcode ID: 3231cb98501c2f9731616dd074efbcbedbc8fb622db5c9189f6f1fc8bc895f52
              • Instruction ID: 2386ea2486379959938593ffbf33b9477fde64e780870e0fc7c0f99374443762
              • Opcode Fuzzy Hash: 3231cb98501c2f9731616dd074efbcbedbc8fb622db5c9189f6f1fc8bc895f52
              • Instruction Fuzzy Hash: 8B0166B6204259BF9B10CE9ADCC8DEBBB6CFB8D794B454015BB1997202C374AC50CBB0
              APIs
              • NtFsControlFile.NTDLL(?,?,?,?,?,?,?,?,?,?), ref: 0074EEBC
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: ControlFile
              • String ID:
              • API String ID: 1795486800-0
              • Opcode ID: 42bfea279d75941fa0be9936aea145f0fb2d62704a216209f4f0c6cfab2db6a4
              • Instruction ID: 4c7bb3f109d18d467ff27cda3ba89602feeb41ac91a19f71b65fbe46d21a0dc4
              • Opcode Fuzzy Hash: 42bfea279d75941fa0be9936aea145f0fb2d62704a216209f4f0c6cfab2db6a4
              • Instruction Fuzzy Hash: 4F016BB6204259BF9B10CE8ADCC4DEBBB6CFB9D6A4F444415BB1897202C374AC508BB0
              APIs
              • NtWriteFile.NTDLL(?,?,?,?,?,?,?,?,?), ref: 0074F328
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: FileWrite
              • String ID:
              • API String ID: 3934441357-0
              • Opcode ID: ce7f35b511648737cc99a85e6db47d0dc509ca15a70e6c8d8faef682f012aceb
              • Instruction ID: 6b9a4f19041568330d538483c186de46d223c812169c2f0edb72aa9a763cdbc4
              • Opcode Fuzzy Hash: ce7f35b511648737cc99a85e6db47d0dc509ca15a70e6c8d8faef682f012aceb
              • Instruction Fuzzy Hash: 60F097B6204249BF9B10CE8ADCC8DEB7B6CFB8D7A4B548015BA1897211C374AD54CBB0
              APIs
              • NtCreateProcessEx.NTDLL(?,?,?,?,?,?,?,?,?), ref: 0074ECE8
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: CreateProcess
              • String ID:
              • API String ID: 963392458-0
              • Opcode ID: ea3303586ede5852601575eabeb5e559f9706b33bd1bc3938a922dce35d6e2cf
              • Instruction ID: 54f6d5520ca1adab70b65083ffd36c967d5b1d2a8baa72205ecc5101fdc1b416
              • Opcode Fuzzy Hash: ea3303586ede5852601575eabeb5e559f9706b33bd1bc3938a922dce35d6e2cf
              • Instruction Fuzzy Hash: 79F09CB6100259BF9710CE9ADCC4DEB7B6CFB8D7A0B548415BA1887241C274AD50C7B0
              APIs
              • NtNotifyChangeDirectoryFile.NTDLL(?,?,?,?,?,?,?,?,?), ref: 0074EE5C
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: ChangeDirectoryFileNotify
              • String ID:
              • API String ID: 1357473996-0
              • Opcode ID: 1cdd55662be96ca070b920d911f96fea05d4916ca6bed7a6193b65112a45ea00
              • Instruction ID: 47b9adf11cdb05576a030426473b4a8416cd0850fd6080b1d998b523619d2702
              • Opcode Fuzzy Hash: 1cdd55662be96ca070b920d911f96fea05d4916ca6bed7a6193b65112a45ea00
              • Instruction Fuzzy Hash: 39F0AFB61052997F9710CE9ADCC4DEB7B6CFF9D664F448005BA5897201C230AD50C7B0
              APIs
              • NtCreateThread.NTDLL(?,?,?,?,?,?,?,?), ref: 0074EC24
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: CreateThread
              • String ID:
              • API String ID: 2422867632-0
              • Opcode ID: a43510e3e6d4200b3049bffae7690b66bedc41ea600e016bf7d2cbdc3addd0dc
              • Instruction ID: 569971553bee48ccc5f9d694b6dc2b60b505de07d9f44fc95c60be959c2c9d8c
              • Opcode Fuzzy Hash: a43510e3e6d4200b3049bffae7690b66bedc41ea600e016bf7d2cbdc3addd0dc
              • Instruction Fuzzy Hash: A3F0DAA62151487F9B109F9ADCC8DEBBFACFB8E6A4F448415FA5887211C270AD50C7B0
              APIs
              • NtCreateProcess.NTDLL(?,?,?,?,?,?,?,?), ref: 0074EC90
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: CreateProcess
              • String ID:
              • API String ID: 963392458-0
              • Opcode ID: aff355a04b26d1c9766d1221f13758d45dc72099c1b7ff3b0e9e72d9eb39a9f5
              • Instruction ID: f16cea8bda4365a8a7b81fdf3b715766bf43209e0a261e575480268542e86993
              • Opcode Fuzzy Hash: aff355a04b26d1c9766d1221f13758d45dc72099c1b7ff3b0e9e72d9eb39a9f5
              • Instruction Fuzzy Hash: 36F0DAB6200249BF9B10DE9ADCC8DEB7BACFB8D7A0B448415BA0887251C330AC50C7B0
              APIs
              • NtAccessCheck.NTDLL(?,?,?,?,?,?,?,?), ref: 0074EF44
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: AccessCheck
              • String ID:
              • API String ID: 3492747997-0
              • Opcode ID: 48b8f5ffef68aeb919dfc220d1932a6184cd9ad479753cb05255aa6ba5a6c8ad
              • Instruction ID: c5af50c69fca5a37da60577dec750f7d49d64814bb2ff44bd887eba0f5032031
              • Opcode Fuzzy Hash: 48b8f5ffef68aeb919dfc220d1932a6184cd9ad479753cb05255aa6ba5a6c8ad
              • Instruction Fuzzy Hash: 9CF0B7B6101249BF9710CE8ADCC8DEB7B6CFBAD7A4B448005FA1887211C370AC50C7B0
              APIs
              • NtDuplicateObject.NTDLL(?,?,?,?,?,?,?), ref: 0074F42C
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: DuplicateObject
              • String ID:
              • API String ID: 3677547684-0
              • Opcode ID: 12a41606f450e2a04aad0fb8d15a47661bb2e77ef62db5ed572b04d2b0061356
              • Instruction ID: 70a9208cf495abcbae85fc014d753f023bf4364389ddda8a4c53868151837a52
              • Opcode Fuzzy Hash: 12a41606f450e2a04aad0fb8d15a47661bb2e77ef62db5ed572b04d2b0061356
              • Instruction Fuzzy Hash: B7F01CB62002587FA7109A8ADC88DEB7B6CFF8A7A0B408025FA0887101C770AD05C7B0
              APIs
              • NtCreateKey.NTDLL(?,?,?,?,?,?,?), ref: 0074F060
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: eb479f5294fb8e7aaea5be2a94377adae1d33a26bde3be0a63fa76b3dd5e7082
              • Instruction ID: b4e849288d42f96fa1dabb991e7623746400cc2e6807e765af29c54bd7850cee
              • Opcode Fuzzy Hash: eb479f5294fb8e7aaea5be2a94377adae1d33a26bde3be0a63fa76b3dd5e7082
              • Instruction Fuzzy Hash: 4EF0ACB6604258BFA7108A86EC88DEB7B6DEBC97A5F408015FA1887112D371AD50D7B4
              APIs
              • NtCreateSection.NTDLL(?,?,?,?,?,?,?), ref: 0074F624
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: CreateSection
              • String ID:
              • API String ID: 2449625523-0
              • Opcode ID: fe358f6ca57536f6ffcc425476803333102425cabd84da9f1cc0607173e87d41
              • Instruction ID: bcd91c143d749d01e161ab024fbf80fd2e085a2575990e6532a9e71799408653
              • Opcode Fuzzy Hash: fe358f6ca57536f6ffcc425476803333102425cabd84da9f1cc0607173e87d41
              • Instruction Fuzzy Hash: 1CF0A5B6100258BFA7109B9AEC98DEB7B6CEF8A7A4B418415FA0887251D370AD40C7B1
              APIs
              • NtEnumerateValueKey.NTDLL(?,?,?,?,?,?), ref: 0074EFA4
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: EnumerateValue
              • String ID:
              • API String ID: 1749906896-0
              • Opcode ID: 16d7cda33c20d288e97c2550f9532ec8f1d4874cf052436e6ea7500fca41aebe
              • Instruction ID: 319544e573be7f546898740d4f5bd85b3e3b0f8043fd8e07cf40edcac74fb07f
              • Opcode Fuzzy Hash: 16d7cda33c20d288e97c2550f9532ec8f1d4874cf052436e6ea7500fca41aebe
              • Instruction Fuzzy Hash: 21E0EDA2114158BFE7108A9ADC8DDF77FACEBCA7A4B008419F91587241C370AC54C7B0
              APIs
              • NtEnumerateKey.NTDLL(?,?,?,?,?,?), ref: 0074F0A0
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Enumerate
              • String ID:
              • API String ID: 304946047-0
              • Opcode ID: 20131b3360344e7cf031fd30c33f4a7b2019684ac137faa498df259cd46e7868
              • Instruction ID: 82428d54da301d805bd520354182fac05e2b321adf1e0dd2924869f2e7baba4c
              • Opcode Fuzzy Hash: 20131b3360344e7cf031fd30c33f4a7b2019684ac137faa498df259cd46e7868
              • Instruction Fuzzy Hash: D6E0EDA2505158BFA6108A96EC49DE77F2CEFC67A4B00C019F50487152D3716C50C7B4
              APIs
              • NtSetValueKey.NTDLL(?,?,?,?,?,?), ref: 0074F0E0
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: c3c8c6776afffe656816feded6e409f42157b05e0cd7a63fbba49479adf4326a
              • Instruction ID: 08676759e224eba807b9adbdabb43e963ab13f59b673bfca3ea77aeec5131032
              • Opcode Fuzzy Hash: c3c8c6776afffe656816feded6e409f42157b05e0cd7a63fbba49479adf4326a
              • Instruction Fuzzy Hash: 68E0EDB6104158BFA7108A96DC48DE77F2CEFCA7A4B048019F60887112C371AC40C6B0
              APIs
              • NtQueryMultipleValueKey.NTDLL(?,?,?,?,?,?), ref: 0074F210
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: MultipleQueryValue
              • String ID:
              • API String ID: 23559346-0
              • Opcode ID: 087f87fc67c7ee9f7bf17b18eb2c227aab4df4c7b9f0c24d3f91539cf3804a5e
              • Instruction ID: bfc656f92e06305152a7e8d3de474f50390c028e5a6bfc2596fc52aacbe7ffb4
              • Opcode Fuzzy Hash: 087f87fc67c7ee9f7bf17b18eb2c227aab4df4c7b9f0c24d3f91539cf3804a5e
              • Instruction Fuzzy Hash: 92E01AB6101158BFA7108B96EC88DEBBF2DEFCA7A4B008019FA1887151C370AD40C7B0
              APIs
              • NtOpenFile.NTDLL(?,?,?,?,?,?), ref: 0074F7A8
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: FileOpen
              • String ID:
              • API String ID: 2669468079-0
              • Opcode ID: c9522aa2243e9f6efdfc2d185e2b0e4532baff655829ed580d9c96c1a31e58b5
              • Instruction ID: 555f0c691184c08a883f62f620bcdcdce1a6d280f3e9f32b4c277848d5e395cf
              • Opcode Fuzzy Hash: c9522aa2243e9f6efdfc2d185e2b0e4532baff655829ed580d9c96c1a31e58b5
              • Instruction Fuzzy Hash: 64E0E5A6105158BFA6209A96DC8CDFB7F6CEBCA7B4B018429FA0987250D274AC40C6B0
              APIs
              • NtQueryValueKey.NTDLL(?,?,?,?,?,?), ref: 0074F018
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 2ec19a6df20d17a5f293a18b8b6af39552113390bc13dc01680c87e3ce591e58
              • Instruction ID: afdf791e988b3a9c90e651fb579b37ad9baee05a34b81f53488beb8e2411f754
              • Opcode Fuzzy Hash: 2ec19a6df20d17a5f293a18b8b6af39552113390bc13dc01680c87e3ce591e58
              • Instruction Fuzzy Hash: 8EE0E5A2100158BFA7109B86EC88DEB7F6CEBCA7A4B04C029FA0987112C271AC40D6B0
              APIs
              • NtQuerySecurityObject.NTDLL(?,?,?,?,?), ref: 0074EE07
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: ObjectQuerySecurity
              • String ID:
              • API String ID: 718582247-0
              • Opcode ID: 64e61bd3ca7a232cc1f500c97b21e2581a4573e585f168dfb21e15f2fc79902f
              • Instruction ID: 5d1b1ce16d662d4846571fec687020ebffa499cf8cf2496951f1f63a66800217
              • Opcode Fuzzy Hash: 64e61bd3ca7a232cc1f500c97b21e2581a4573e585f168dfb21e15f2fc79902f
              • Instruction Fuzzy Hash: C6E0ECA1200164BFA710569BAC0DDF77FADEFE67B1F048419B519D2151D364AD44C6F0
              APIs
              • NtQueryObject.NTDLL(?,?,?,?,?), ref: 0074F35F
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: ObjectQuery
              • String ID:
              • API String ID: 2748340528-0
              • Opcode ID: c7a1a8fd30babe6ac5375796a77beb4101554226c450bb0d218fd2b4e141c64b
              • Instruction ID: e867b350014521df970bd2451d063b5f30c1188aad368f652894d9b6dca357f1
              • Opcode Fuzzy Hash: c7a1a8fd30babe6ac5375796a77beb4101554226c450bb0d218fd2b4e141c64b
              • Instruction Fuzzy Hash: 09E012A21011547EEB205B9AAC0DEEB7F6CEFE67B1B058139F509D3110D374AC48D2B0
              APIs
              • NtQueryVolumeInformationFile.NTDLL(?,?,?,?,?), ref: 0074F463
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: FileInformationQueryVolume
              • String ID:
              • API String ID: 634242254-0
              • Opcode ID: b552eb1d2e1016d1c993804ca22560a6af851a7c29d34bf6b55257844bdbe6aa
              • Instruction ID: c6aee38d6904ca8734c39b8e7f0a01ca0f8f7ef90296bc9b5a32618889bcbcf0
              • Opcode Fuzzy Hash: b552eb1d2e1016d1c993804ca22560a6af851a7c29d34bf6b55257844bdbe6aa
              • Instruction Fuzzy Hash: 9EE0ECA51041547AA620569B9C0CEEB7F6CEFC67B0B058029F50892110D774AD44C2B0
              APIs
              • NtUnlockFile.NTDLL(?,?,?,?,?), ref: 0074F513
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: FileUnlock
              • String ID:
              • API String ID: 45017762-0
              • Opcode ID: 2414a8018d93fd4b81c9dc1225fd85226b2729003f82b4638b0a6c0cde14c607
              • Instruction ID: 1af05c9dad491d5ca5594c1b64c7d98b61b32b05ffd9c3e081d57c856051f661
              • Opcode Fuzzy Hash: 2414a8018d93fd4b81c9dc1225fd85226b2729003f82b4638b0a6c0cde14c607
              • Instruction Fuzzy Hash: 80E0ECB5504158BFE7105BABAC0CDE7BFACEFC67B0B188029F519D2210D364AD64C2B0
              APIs
              • NtQuerySection.NTDLL(?,?,?,?,?), ref: 0074F57F
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: QuerySection
              • String ID:
              • API String ID: 1985485932-0
              • Opcode ID: 203c52bc8a24852bedbefc5fa4e994fd29759a3a5b3ec96e5460e600cfaf7550
              • Instruction ID: 1a73383347dfd0c79120c2fcec629d2cee1f4bd9c74af5d8fdcd84b1f7ee4213
              • Opcode Fuzzy Hash: 203c52bc8a24852bedbefc5fa4e994fd29759a3a5b3ec96e5460e600cfaf7550
              • Instruction Fuzzy Hash: D3E0ECA15001547A96215B9A9C0DEE7BF6CEFD67B1F05812AF509D3110D364AE54C2B0
              APIs
              • NtSetVolumeInformationFile.NTDLL(?,?,?,?,?), ref: 0074EDB3
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: FileInformationVolume
              • String ID:
              • API String ID: 2893123674-0
              • Opcode ID: 7bebf177fb47fc3ec98af132035969c6f6ca554e69c72c6607cfd59b9c3ce440
              • Instruction ID: f96d7a78b1c4ef2b8ad39f7d81c704b1380af77c6ccdcb43909ce4ac0d1c107e
              • Opcode Fuzzy Hash: 7bebf177fb47fc3ec98af132035969c6f6ca554e69c72c6607cfd59b9c3ce440
              • Instruction Fuzzy Hash: 35E08CA16041587FE720568AAC0CDE77F2CEFC67B1B048419B94893150C360AC40C6B0
              APIs
              • NtQueryInformationFile.NTDLL(?,?,?,?,?), ref: 0074F6AB
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: FileInformationQuery
              • String ID:
              • API String ID: 365787318-0
              • Opcode ID: 3952c7a9bba53f61e4d99dc36cc895d8b16e4d9b12db75f9f0000919c0ba9a1e
              • Instruction ID: e56972135622ce2dbd2b69b85de4fbc5a6f59db391b9d50f7c7ab4ee99097a9e
              • Opcode Fuzzy Hash: 3952c7a9bba53f61e4d99dc36cc895d8b16e4d9b12db75f9f0000919c0ba9a1e
              • Instruction Fuzzy Hash: EFE08CA25001147ED620568ADC0CEE77F2CEFCA7B0B008029F418D3110C360AC44C2B0
              APIs
              • NtQueryKey.NTDLL(?,?,?,?,?), ref: 0074EFDB
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Query
              • String ID:
              • API String ID: 3850148591-0
              • Opcode ID: 1e798dd78036bf734f356856a0ae4294999c04017efa3826e77a587b47791efc
              • Instruction ID: 8755f2b0f4ff8619ee87b8be7139f38b13c5e0b637edaebac8779f66cad0f2d3
              • Opcode Fuzzy Hash: 1e798dd78036bf734f356856a0ae4294999c04017efa3826e77a587b47791efc
              • Instruction Fuzzy Hash: 72E0ECA15041587ED7609A9B9C0CEE77F6CFFC67B0B14811AB51992210D364AC55C2B0
              APIs
              • NtSetInformationKey.NTDLL(?,?,?,?), ref: 0074F29D
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Information
              • String ID:
              • API String ID: 2951059284-0
              • Opcode ID: 1b8f00d1b4d5ffd873ad0e03bfabe00a5f35ee774b53df8f49123601bb345188
              • Instruction ID: bfe3764c561b3b53917910064743f4be5d0b3fc1055300374e94b14b99c4619f
              • Opcode Fuzzy Hash: 1b8f00d1b4d5ffd873ad0e03bfabe00a5f35ee774b53df8f49123601bb345188
              • Instruction Fuzzy Hash: 16D052E18122247FE20053AAEC0EEFBBE5CEF967A0F008229F108D2040C3A46C80C2F0
              APIs
              • NtOpenKeyEx.NTDLL(?,?,?,?), ref: 0074ED81
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: 1f506d1b4b641a6688ca9a6772fd0507baeae530b5ab4bb0cc771cef84a2c050
              • Instruction ID: 58166b89c7e8494047b4d3a4f7c1a85491ad01f45fb1aecfaa8157ba03f7f774
              • Opcode Fuzzy Hash: 1f506d1b4b641a6688ca9a6772fd0507baeae530b5ab4bb0cc771cef84a2c050
              • Instruction Fuzzy Hash: F2D052A19001687FE70053AAAC0CEF33E9CEFC63B0F40882AB109D30A0D3A4AC40C6B0
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Restore
              • String ID:
              • API String ID: 1214912099-0
              • Opcode ID: 80ff65ff05d74f6f65c9156c17df35c75e8befe8d18cac501a5c256c080b88d5
              • Instruction ID: e73b9d55bd3beaa5717bfd7867b89467c57e58bc1ee6c4e1e3ac5f6729e293b1
              • Opcode Fuzzy Hash: 80ff65ff05d74f6f65c9156c17df35c75e8befe8d18cac501a5c256c080b88d5
              • Instruction Fuzzy Hash: 0EC002D06141903EFA0997A89E1DEF7699EEBC4706F0485987105C1050DBA45C449730
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Load
              • String ID:
              • API String ID: 2234796835-0
              • Opcode ID: 1840a49e50a6f0272cf9123605e6fd301dc8d0656720261ecb1310f15c8dc8a1
              • Instruction ID: d09bffd4ab033712430f50835ac029d962288f6b437a839252c14681490b5e0c
              • Opcode Fuzzy Hash: 1840a49e50a6f0272cf9123605e6fd301dc8d0656720261ecb1310f15c8dc8a1
              • Instruction Fuzzy Hash: 42C04CD0505154AEEF0193BC5C0DBF6255EEBC8701F04C4987145C2150D71548449221
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: DeleteValue
              • String ID:
              • API String ID: 1108222502-0
              • Opcode ID: 29567f31620e639e316f0ddb9b5fe5234c2abd4d6111f5fea49e9a97c831e9ab
              • Instruction ID: 48c7292f64d00d48c6ba0f17ef53c6eaaf8ef222e5573937d46a7326dc443952
              • Opcode Fuzzy Hash: 29567f31620e639e316f0ddb9b5fe5234c2abd4d6111f5fea49e9a97c831e9ab
              • Instruction Fuzzy Hash: 2DC04CD06041506EEF0153B89E0CBB6265EABC4702F04C4947215C2056CB1848849338
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Save
              • String ID:
              • API String ID: 4115961312-0
              • Opcode ID: 0a0248d357cd05a2ab5e30879e7fa2803b3bebdc6564548ef627c2c6d0b01802
              • Instruction ID: 1b2962fea179f582f7c11657666c145b14b38f37822862ee36db3ce0cd1941d2
              • Opcode Fuzzy Hash: 0a0248d357cd05a2ab5e30879e7fa2803b3bebdc6564548ef627c2c6d0b01802
              • Instruction Fuzzy Hash: 31C04CD0A001906EEF0157B89C0CBE71AAFABC4705F0485687151D1050CB544D849624
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: ProcessTerminate
              • String ID:
              • API String ID: 560597551-0
              • Opcode ID: 7b64e2f6d7421c39214a9a2991e80aa2030075dd20b6d156b710d32e73492a96
              • Instruction ID: b10004f0c7c2daca1befe7c81c10fac938024d2ac1bda76b8468e40f18035d34
              • Opcode Fuzzy Hash: 7b64e2f6d7421c39214a9a2991e80aa2030075dd20b6d156b710d32e73492a96
              • Instruction Fuzzy Hash: C9C04CD0600180BEEF1553B85D0CBB625DCEFC4705F04C4587165C1251C7584854D220
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Key2Load
              • String ID:
              • API String ID: 2615624000-0
              • Opcode ID: 49683d51d9e5d4dd55c03ffc60192aff9e66d9958e708e3558480b02e58b45df
              • Instruction ID: 83c3e7f4de7fd242993d30345dc219bb9cdbb4ade083bdd64395c5f0b75c2fa1
              • Opcode Fuzzy Hash: 49683d51d9e5d4dd55c03ffc60192aff9e66d9958e708e3558480b02e58b45df
              • Instruction Fuzzy Hash: 319002E09501006EAD0457619E0DCB7292DF9C07113008548700581410EA6458008530
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Replace
              • String ID:
              • API String ID: 3273661913-0
              • Opcode ID: 34b2debde56d6449957e96d7b5999e46d54e0bb84ce565de92d3ba7fbc8a621b
              • Instruction ID: 62fb754f33badf4f0cc97e6f30cc446a5c5cd12ef477d250c63fb01b25a7f2d0
              • Opcode Fuzzy Hash: 34b2debde56d6449957e96d7b5999e46d54e0bb84ce565de92d3ba7fbc8a621b
              • Instruction Fuzzy Hash: 449002E08101446EAD055B609E0DCB7352EF9C570131485487001C2010E66458008630
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: OpenSection
              • String ID:
              • API String ID: 1950954290-0
              • Opcode ID: c5c3426a0673326febfe37a3f8c19f1fb1e74364a8e6743c170b7ffc3ab5956a
              • Instruction ID: 7326366a1d38b3b8e04e0a5295ef220e4b7172dfe162163f23a8a980b0e6233f
              • Opcode Fuzzy Hash: c5c3426a0673326febfe37a3f8c19f1fb1e74364a8e6743c170b7ffc3ab5956a
              • Instruction Fuzzy Hash: 1E9002E08111006EED055B609E0DC7B252CE9C1701300C54CB00183110DA7458048630
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: ObjectSecurity
              • String ID:
              • API String ID: 2240786066-0
              • Opcode ID: 62bc3350713cd1eba259dcd495ef708be428570813ce83556ccab8217d6901e0
              • Instruction ID: bfb7560554b3c8f205f4d24edf533b027aa6fbf2d26abe8c5cac9d678fdc1f22
              • Opcode Fuzzy Hash: 62bc3350713cd1eba259dcd495ef708be428570813ce83556ccab8217d6901e0
              • Instruction Fuzzy Hash: 2C9002E08103006FED0457719D0DC77252CE9C0701300C948700181160D66458408530
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: 64b701ab406f5a5fe42d2231a71698be80c0dbc201c7d529a3a82b45105c8645
              • Instruction ID: bdc46adb075ebcffa8fff0737ba8ba38947b0f868073232cdbc9f08536af3942
              • Opcode Fuzzy Hash: 64b701ab406f5a5fe42d2231a71698be80c0dbc201c7d529a3a82b45105c8645
              • Instruction Fuzzy Hash: 219002E08102006EAD4557609E0DD77266CE9C1B0130085487011C5118D66458508630
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: ResumeThread
              • String ID:
              • API String ID: 947044025-0
              • Opcode ID: 3fcc48839cb491598d5f998b879b11d42b3fccc331f15cf97bb789dd3e9fbc4d
              • Instruction ID: dfc155750c78d384761bd5f3aff20bd19da6c693e4b375ef7440b8dd5f941e12
              • Opcode Fuzzy Hash: 3fcc48839cb491598d5f998b879b11d42b3fccc331f15cf97bb789dd3e9fbc4d
              • Instruction Fuzzy Hash:
              APIs
              • NtUnmapViewOfSection.NTDLL ref: 0074F551
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: SectionUnmapView
              • String ID:
              • API String ID: 498011366-0
              • Opcode ID: 6acc4d18f3dcb9df8290c13e0265de1173fa43ea7c3d183de9fcb68a7d07d43f
              • Instruction ID: 9c25d457437feb80c80d3efa4ec2350578bd42540ad0ad7bbcb8c92d7f6e07aa
              • Opcode Fuzzy Hash: 6acc4d18f3dcb9df8290c13e0265de1173fa43ea7c3d183de9fcb68a7d07d43f
              • Instruction Fuzzy Hash:
              APIs
              • NtQueryFullAttributesFile.NTDLL ref: 0074F535
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: AttributesFileFullQuery
              • String ID:
              • API String ID: 3545844373-0
              • Opcode ID: 9945b04b6430838d335960ff8771af2c1ba4ea27faeb56eb0c515a15678471d4
              • Instruction ID: 9fe3d005275f6e7df552375b0a14790d5fb6ffa43685dd433074c8616c3bbd8b
              • Opcode Fuzzy Hash: 9945b04b6430838d335960ff8771af2c1ba4ea27faeb56eb0c515a15678471d4
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: ExtendSection
              • String ID:
              • API String ID: 1258755343-0
              • Opcode ID: adcb7966e507f3f61323334dfe6404192f25fb8371ae8744928c226db365f9aa
              • Instruction ID: dfd26ccc713ee12a8b73a78c8d0be32104d3a29fde0637dfe4663274eee63591
              • Opcode Fuzzy Hash: adcb7966e507f3f61323334dfe6404192f25fb8371ae8744928c226db365f9aa
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: BuffersFileFlush
              • String ID:
              • API String ID: 1685522069-0
              • Opcode ID: a17994cf75b0cde79f47ff98525649992b5987b22c99503ce213f18894c0356b
              • Instruction ID: 0b3112bdfdffe8684523e0fd352cd617154df4e4a14adcfc16ee802633544e90
              • Opcode Fuzzy Hash: a17994cf75b0cde79f47ff98525649992b5987b22c99503ce213f18894c0356b
              • Instruction Fuzzy Hash:
              APIs
              • NtQueryAttributesFile.NTDLL ref: 0074F7CD
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: AttributesFileQuery
              • String ID:
              • API String ID: 2106648053-0
              • Opcode ID: 5c7a028cf1e35fa13f7e848efbc8eb5b58075b41217e01d9cf279a30d87f31a4
              • Instruction ID: b69ff8b1695d66b436a3e90e98b3e54df15ff70e5691ee0d918da5eab01eae8c
              • Opcode Fuzzy Hash: 5c7a028cf1e35fa13f7e848efbc8eb5b58075b41217e01d9cf279a30d87f31a4
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Flush
              • String ID:
              • API String ID: 1965063083-0
              • Opcode ID: 532c77ae30292d0135c2db535fbbdb82f69c51132a31c5b8ab6af50c50a1ec80
              • Instruction ID: 1e472f924afb77d1421f98b8b15d48cb711d8626e4d7545382c18ceac500d921
              • Opcode Fuzzy Hash: 532c77ae30292d0135c2db535fbbdb82f69c51132a31c5b8ab6af50c50a1ec80
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Delete
              • String ID:
              • API String ID: 1035893169-0
              • Opcode ID: b1d0cac2044fb9bce4035bc97c8acd9c7316ff7469cc35688ff9ab9a6e5dca98
              • Instruction ID: 56fd7fe198a4c2e698864dc865a3fae0ea6f43c3a19fb485f0185c3a23892fe6
              • Opcode Fuzzy Hash: b1d0cac2044fb9bce4035bc97c8acd9c7316ff7469cc35688ff9ab9a6e5dca98
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: Unload
              • String ID:
              • API String ID: 3485584074-0
              • Opcode ID: e357df45381d87e3c11279cbd358f826f6bb42912ad8c93bca2d340a626ddc86
              • Instruction ID: 9cd055e7ac8d9d71f7f99fa221e31d93eb060d7ac8eec3b3076687341f42d401
              • Opcode Fuzzy Hash: e357df45381d87e3c11279cbd358f826f6bb42912ad8c93bca2d340a626ddc86
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: DeleteFile
              • String ID:
              • API String ID: 4033686569-0
              • Opcode ID: f882743d965a4131494fef5849de232766eae3fc540e80f1604ec57b9f5c02f6
              • Instruction ID: 0f76e332d346f7f8a8d9bcfd739b544999536a586b5c6d6ee21fda0757a3065f
              • Opcode Fuzzy Hash: f882743d965a4131494fef5849de232766eae3fc540e80f1604ec57b9f5c02f6
              • Instruction Fuzzy Hash:
              APIs
              • GetSystemMetrics.USER32(00000000), ref: 00752109
              • GetSystemMetrics.USER32(00000001), ref: 00752115
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.4660226910.000000000074B000.00000040.00000001.01000000.00000007.sdmp, Offset: 006E0000, based on PE: true
              • Associated: 00000002.00000002.4660197478.00000000006E0000.00000002.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660212688.00000000006EA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072D000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000072F000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000735000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000745000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007BA000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007DC000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.00000000007E6000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000812000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000821000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000082E000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000836000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000083B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000085B000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000867000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000871000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000875000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000877000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000087A000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000882000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000962000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.0000000000965000.00000040.00000001.01000000.00000007.sdmpDownload File
              • Associated: 00000002.00000002.4660226910.000000000097A000.00000040.00000001.01000000.00000007.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6e0000_windows process.jbxd
              Similarity
              • API ID: MetricsSystem
              • String ID: MonitorFromRect
              • API String ID: 4116985748-4033241945
              • Opcode ID: 62f22e8f8526996303d96e27160382d9da9a9c9720d07c55a3a5070e0966da90
              • Instruction ID: 7399ba5af2ef1934f1f6e57b7bbbd758c999fdaebb873e92b99951f411307747
              • Opcode Fuzzy Hash: 62f22e8f8526996303d96e27160382d9da9a9c9720d07c55a3a5070e0966da90
              • Instruction Fuzzy Hash: 2701A231604108FFD7108F19D989B97B7A5E78A317F548465FE04CB247D2BADC4A8BB0