Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
Analysis ID:1482888
MD5:3ac2ab389629ee685878da77c511f359
SHA1:05a6ccb19d32aa653a942dea5d6401249bb8f7d2
SHA256:5cb06070e2428b600080a8b4a21fde3ed5d773ca0a1cf3bea381ce96c1fa305d
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe (PID: 7016 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe" MD5: 3AC2AB389629EE685878DA77C511F359)
    • powershell.exe (PID: 6400 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7240 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 2496 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • UTiPLNuHYu.exe (PID: 7176 cmdline: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe MD5: 3AC2AB389629EE685878DA77C511F359)
    • schtasks.exe (PID: 7408 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpBDCA.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • UTiPLNuHYu.exe (PID: 7460 cmdline: "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe" MD5: 3AC2AB389629EE685878DA77C511F359)
    • UTiPLNuHYu.exe (PID: 7468 cmdline: "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe" MD5: 3AC2AB389629EE685878DA77C511F359)
    • UTiPLNuHYu.exe (PID: 7476 cmdline: "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe" MD5: 3AC2AB389629EE685878DA77C511F359)
  • mpTrle.exe (PID: 7596 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: 3AC2AB389629EE685878DA77C511F359)
    • schtasks.exe (PID: 7804 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpDED0.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • mpTrle.exe (PID: 7856 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: 3AC2AB389629EE685878DA77C511F359)
  • mpTrle.exe (PID: 8064 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: 3AC2AB389629EE685878DA77C511F359)
    • schtasks.exe (PID: 8148 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpFE1F.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 8156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • mpTrle.exe (PID: 6452 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: 3AC2AB389629EE685878DA77C511F359)
    • mpTrle.exe (PID: 6280 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: 3AC2AB389629EE685878DA77C511F359)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "wethem@aklaneah-sa.com", "Password": "Password:  )NYyffR0   "}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2980248436.00000000032BC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000018.00000002.2980111716.0000000002EEC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000D.00000002.1936939570.000000000347A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000D.00000002.1936939570.000000000347A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000013.00000002.2979395334.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 34 entries
            SourceRuleDescriptionAuthorStrings
            20.2.mpTrle.exe.3dba728.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              20.2.mpTrle.exe.3dba728.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                20.2.mpTrle.exe.3dba728.4.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x31bd0:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x31c42:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x31ccc:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x31d5e:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x31dc8:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x31e3a:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x31ed0:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31f60:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                6.2.UTiPLNuHYu.exe.42a9c70.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  6.2.UTiPLNuHYu.exe.42a9c70.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 43 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, ParentProcessId: 7016, ParentProcessName: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe", ProcessId: 6400, ProcessName: powershell.exe
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, ProcessId: 6784, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mpTrle
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, ParentProcessId: 7016, ParentProcessName: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe", ProcessId: 6400, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpBDCA.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpBDCA.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe, ParentImage: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe, ParentProcessId: 7176, ParentProcessName: UTiPLNuHYu.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpBDCA.tmp", ProcessId: 7408, ProcessName: schtasks.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 208.91.198.143, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, Initiated: true, ProcessId: 6784, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, ParentProcessId: 7016, ParentProcessName: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp", ProcessId: 2496, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, ParentProcessId: 7016, ParentProcessName: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe", ProcessId: 6400, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, ParentProcessId: 7016, ParentProcessName: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp", ProcessId: 2496, ProcessName: schtasks.exe
                    No Snort rule has matched
                    Timestamp:2024-07-26T10:29:01.890339+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49744
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T10:28:23.350688+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49734
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeAvira: detection malicious, Label: HEUR/AGEN.1308640
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeAvira: detection malicious, Label: HEUR/AGEN.1308640
                    Source: 20.2.mpTrle.exe.3df5748.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "wethem@aklaneah-sa.com", "Password": "Password: )NYyffR0 "}
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeReversingLabs: Detection: 63%
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeVirustotal: Detection: 59%Perma Link
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeReversingLabs: Detection: 63%
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeVirustotal: Detection: 59%Perma Link
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeVirustotal: Detection: 59%Perma Link
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeReversingLabs: Detection: 63%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeJoe Sandbox ML: detected
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeJoe Sandbox ML: detected
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49732 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49735 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49742 version: TLS 1.2
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 208.91.198.143:587
                    Source: Joe Sandbox ViewIP Address: 208.91.198.143 208.91.198.143
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 208.91.198.143:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: us2.smtp.mailhostbox.com
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1790616281.00000000031EE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000005.00000002.2980248436.0000000003241000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 00000006.00000002.1849930169.0000000003287000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 0000000C.00000002.2980306612.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000D.00000002.1935054356.0000000002457000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000013.00000002.2979395334.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000014.00000002.2009322632.0000000002D9A000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000018.00000002.2980111716.0000000002E7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000005.00000002.2980248436.00000000032BC000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 0000000C.00000002.2980306612.000000000303A000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000013.00000002.2979395334.0000000002EFC000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000018.00000002.2980111716.0000000002EEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1791421661.0000000004179000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 00000006.00000002.1851368813.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 0000000C.00000002.2971486884.0000000000436000.00000040.00000400.00020000.00000000.sdmp, mpTrle.exe, 0000000D.00000002.1936939570.000000000347A000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000014.00000002.2015893720.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1791421661.0000000004179000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000005.00000002.2980248436.0000000003241000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 00000006.00000002.1851368813.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 0000000C.00000002.2980306612.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000D.00000002.1936939570.000000000347A000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000013.00000002.2979395334.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000014.00000002.2015893720.0000000003DBA000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000018.00000002.2971496563.0000000000435000.00000040.00000400.00020000.00000000.sdmp, mpTrle.exe, 00000018.00000002.2980111716.0000000002E7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000005.00000002.2980248436.0000000003241000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 0000000C.00000002.2980306612.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000013.00000002.2979395334.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000018.00000002.2980111716.0000000002E7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000005.00000002.2980248436.0000000003241000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 0000000C.00000002.2980306612.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000013.00000002.2979395334.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000018.00000002.2980111716.0000000002E7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49732 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49735 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49742 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, 3DlgK9re6m.cs.Net Code: sIJKyc
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4179208.1.raw.unpack, 3DlgK9re6m.cs.Net Code: sIJKyc

                    System Summary

                    barindex
                    Source: 20.2.mpTrle.exe.3dba728.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 6.2.UTiPLNuHYu.exe.42a9c70.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 6.2.UTiPLNuHYu.exe.42e4c90.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4179208.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 13.2.mpTrle.exe.34b5788.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 20.2.mpTrle.exe.3df5748.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 13.2.mpTrle.exe.347a768.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 13.2.mpTrle.exe.34b5788.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 6.2.UTiPLNuHYu.exe.42e4c90.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 20.2.mpTrle.exe.3df5748.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 13.2.mpTrle.exe.347a768.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 20.2.mpTrle.exe.3dba728.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 6.2.UTiPLNuHYu.exe.42a9c70.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4179208.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.57a0000.5.raw.unpack, SizeParameters.csLarge array initialization: : array initializer size 15921
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.3132f7c.0.raw.unpack, SizeParameters.csLarge array initialization: : array initializer size 15921
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 0_2_016ADEA40_2_016ADEA4
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 0_2_01716C4A0_2_01716C4A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 0_2_017108300_2_01710830
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 0_2_017128A00_2_017128A0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 0_2_017133100_2_01713310
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 0_2_017133010_2_01713301
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 0_2_01710C680_2_01710C68
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 0_2_017124680_2_01712468
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 0_2_017124580_2_01712458
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_0182E3E05_2_0182E3E0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_01824AD05_2_01824AD0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_01823EB85_2_01823EB8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_0182F1BB5_2_0182F1BB
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_0182B3085_2_0182B308
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_018242005_2_01824200
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06DDE2F15_2_06DDE2F1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06DDC5185_2_06DDC518
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06DDB3EC5_2_06DDB3EC
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06DD9DB85_2_06DD9DB8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06E434885_2_06E43488
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06E465E05_2_06E465E0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06E455C85_2_06E455C8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06E4C5685_2_06E4C568
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06E4B2115_2_06E4B211
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06E45CD75_2_06E45CD7
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06E47D685_2_06E47D68
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06E476885_2_06E47688
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06E4E7885_2_06E4E788
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06E400405_2_06E40040
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06E400065_2_06E40006
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 6_2_03214B016_2_03214B01
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 6_2_0321DEA46_2_0321DEA4
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 6_2_05295F186_2_05295F18
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 6_2_052924686_2_05292468
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 6_2_052924586_2_05292458
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 6_2_052933016_2_05293301
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 6_2_052933106_2_05293310
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 6_2_05290C686_2_05290C68
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 6_2_05295F086_2_05295F08
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 6_2_052908306_2_05290830
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 6_2_052908186_2_05290818
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 6_2_052928A06_2_052928A0
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_0127B30812_2_0127B308
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_0127AB4012_2_0127AB40
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_01274AD012_2_01274AD0
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_01273EB812_2_01273EB8
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_0127420012_2_01274200
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06B7C51812_2_06B7C518
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06B79DB812_2_06B79DB8
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06BD238012_2_06BD2380
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06BD61E012_2_06BD61E0
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06BD51C812_2_06BD51C8
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06BDC16812_2_06BDC168
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06BDAE2012_2_06BDAE20
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06BD58E812_2_06BD58E8
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06BD796812_2_06BD7968
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06BD728812_2_06BD7288
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06BDE38812_2_06BDE388
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06BD000612_2_06BD0006
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06BD004012_2_06BD0040
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 13_2_0088DEA413_2_0088DEA4
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 13_2_04465F1813_2_04465F18
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 13_2_0446245813_2_04462458
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 13_2_04460C6813_2_04460C68
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 13_2_0446246813_2_04462468
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 13_2_04465F0813_2_04465F08
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 13_2_0446083013_2_04460830
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 13_2_044628A013_2_044628A0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 13_2_0446330113_2_04463301
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 13_2_0446331013_2_04463310
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_01464AD019_2_01464AD0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_0146EAD819_2_0146EAD8
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_01463EB819_2_01463EB8
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_0146420019_2_01464200
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_0146AD0819_2_0146AD08
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C1A8B419_2_06C1A8B4
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C1A59819_2_06C1A598
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C1DBF019_2_06C1DBF0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C2349019_2_06C23490
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C255D019_2_06C255D0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C265E819_2_06C265E8
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C2B22019_2_06C2B220
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C2C17819_2_06C2C178
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C27D7019_2_06C27D70
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C2769019_2_06C27690
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C2E39819_2_06C2E398
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C2004019_2_06C20040
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C25CDF19_2_06C25CDF
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_0119DEA420_2_0119DEA4
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_02BC5F1820_2_02BC5F18
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_02BC331020_2_02BC3310
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_02BC330120_2_02BC3301
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_02BC246820_2_02BC2468
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_02BC245820_2_02BC2458
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_02BC28A020_2_02BC28A0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_02BC083020_2_02BC0830
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_02BC5F0820_2_02BC5F08
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_02BC0C6820_2_02BC0C68
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_013DEAD824_2_013DEAD8
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_013D4AD024_2_013D4AD0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_013D3EB824_2_013D3EB8
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_013D420024_2_013D4200
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_013DAD0824_2_013DAD08
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_06B6A8B424_2_06B6A8B4
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_06B6A59824_2_06B6A598
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_06B6DBF024_2_06B6DBF0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_06B7349024_2_06B73490
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_06B765E824_2_06B765E8
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_06B755D024_2_06B755D0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_06B7B22024_2_06B7B220
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_06B7C17824_2_06B7C178
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_06B77D7024_2_06B77D70
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_06B7769024_2_06B77690
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_06B7E39824_2_06B7E398
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_06B7004024_2_06B70040
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_06B75CDF24_2_06B75CDF
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1790616281.00000000031EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename64af20ca-f267-4570-b8a1-6b375e9c5566.exe4 vs SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1793676399.00000000057A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMML.dll2 vs SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1794443006.0000000006210000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1788213845.000000000140E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1791421661.0000000004179000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename64af20ca-f267-4570-b8a1-6b375e9c5566.exe4 vs SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1790616281.0000000003111000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMML.dll2 vs SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1791421661.00000000042EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000000.1727124968.0000000000C92000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameVphj.exe< vs SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000005.00000002.2972695779.0000000001359000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeBinary or memory string: OriginalFilenameVphj.exe< vs SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 20.2.mpTrle.exe.3dba728.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 6.2.UTiPLNuHYu.exe.42a9c70.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 6.2.UTiPLNuHYu.exe.42e4c90.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4179208.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 13.2.mpTrle.exe.34b5788.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 20.2.mpTrle.exe.3df5748.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 13.2.mpTrle.exe.347a768.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 13.2.mpTrle.exe.34b5788.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 6.2.UTiPLNuHYu.exe.42e4c90.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 20.2.mpTrle.exe.3df5748.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 13.2.mpTrle.exe.347a768.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 20.2.mpTrle.exe.3dba728.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 6.2.UTiPLNuHYu.exe.42a9c70.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4179208.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: UTiPLNuHYu.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, slKb.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, mAKJ.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, xQRSe0Fg.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, n3rhMa.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, MQzE4FWn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, nSmgRyX5a1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, xh7Ze27jhlR7wxiGEu.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, xh7Ze27jhlR7wxiGEu.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, GtmOKRoEt31uvVTiMJ.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, GtmOKRoEt31uvVTiMJ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, GtmOKRoEt31uvVTiMJ.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, GtmOKRoEt31uvVTiMJ.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, GtmOKRoEt31uvVTiMJ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, GtmOKRoEt31uvVTiMJ.csSecurity API names: _0020.AddAccessRule
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@34/16@2/2
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeFile created: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMutant created: \Sessions\1\BaseNamedObjects\ZmZrUStTlFuSGnSBmOSiag
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3684:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7416:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8156:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4324:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7816:120:WilError_03
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA5DD.tmpJump to behavior
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeVirustotal: Detection: 59%
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeReversingLabs: Detection: 63%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe:Zone.IdentifierJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpBDCA.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess created: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess created: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess created: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpDED0.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpFE1F.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpBDCA.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess created: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess created: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess created: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpDED0.tmp"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpFE1F.tmp"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: ntmarta.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: apphelp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windowscodecs.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windowscodecs.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, StatGrapher.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                    Source: UTiPLNuHYu.exe.0.dr, StatGrapher.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.57a0000.5.raw.unpack, bg.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.3132f7c.0.raw.unpack, bg.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, GtmOKRoEt31uvVTiMJ.cs.Net Code: vK6WDEejOI System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, GtmOKRoEt31uvVTiMJ.cs.Net Code: vK6WDEejOI System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 0_2_01716170 pushad ; iretd 0_2_01716171
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 0_2_01719D8D push FFFFFF8Bh; iretd 0_2_01719D8F
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06DD4D80 push esp; retf 5_2_06DD4D8D
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeCode function: 5_2_06DD5B0F push es; ret 5_2_06DD5B10
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 6_2_0529910D push FFFFFF8Bh; iretd 6_2_0529910F
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_01270C55 push edi; retf 12_2_01270C7A
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeCode function: 12_2_06B75B00 push es; ret 12_2_06B75B10
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 13_2_0446904D push FFFFFF8Bh; iretd 13_2_0446904F
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_01460C55 push edi; retf 19_2_01460C7A
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 19_2_06C1FEF3 push es; ret 19_2_06C1FEF4
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_0119E52C push edi; ret 20_2_0119E536
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_0119EE58 pushad ; ret 20_2_0119EE66
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_0119CEA8 pushad ; ret 20_2_0119CEBA
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 20_2_02BC910D push FFFFFF8Bh; iretd 20_2_02BC910F
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 24_2_013D0C55 push edi; retf 24_2_013D0C7A
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeStatic PE information: section name: .text entropy: 7.946917722198967
                    Source: UTiPLNuHYu.exe.0.drStatic PE information: section name: .text entropy: 7.946917722198967
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, qS6WaQz3rud4pOOkZg.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'KU6jcZvdKA', 'UKQjLUO19W', 'rI6jUVD6T8', 'CJfja9kWyy', 'PUwjhtLiTe', 'wxkjjfDd2g', 'cWEjluLMvS'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, GtmOKRoEt31uvVTiMJ.csHigh entropy of concatenated method names: 'QTpiqTJhN6', 'qqjiv3oIab', 'snWi2PIDVj', 'jn3iwu1k5j', 'QyZinCpHCC', 'TKtiyM4QDu', 'Rthi6I5SQL', 'NMDios7nub', 'KgCiYuKjQ9', 'hOWitWVQJY'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, l1TjgJZiaP4TqC4fZXW.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'VUvlVR2qWL', 'kJ9lfcFvy7', 'ejTlp87H0G', 'l2ilk8opXE', 'mCRlCfIC0f', 'pF3lNXBpvZ', 'wUQlRo8PRw'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, patFjKwYbrr7wnCu49.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'SsIO3P09Py', 'QD2OJw1hUg', 'ffqOzRmZHm', 'wwYi05rcR3', 'zFGiZRHv0j', 'Lx3iOdFBKy', 'SXPiiPyrao', 'mUXGH4Aj0dCq4vPXTfp'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, B0d25wsUG0HDI2Z8f8.csHigh entropy of concatenated method names: 'SfJc7juv1n', 'Wo4cgO9Eji', 'XkocHwidoe', 'bGlcSpvgOL', 'WraceKQYZ2', 'fd9crJHTQS', 'y9KcGL5umA', 'bSKcI6bbvC', 'Ep0cBMt4QM', 'Rj1cuL7uIQ'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, GOUe7IJpeNc4mvuYIT.csHigh entropy of concatenated method names: 'BogjZ2JSpy', 'jAIjirK3Po', 'H9ljWUCR0P', 'LvDjvceM3U', 'ecej23Qreo', 'PykjnALCVm', 'SkQjy9PBad', 'KbshRRUtj5', 'GBHh1jtWdr', 'x5Uh3KNtdu'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, XkVF3D2BeXftFo8cqK.csHigh entropy of concatenated method names: 'Dispose', 'T7JZ3rLmni', 'IBBOSUvXcj', 'PEmKKTXPy0', 'LLnZJw1c6S', 'BEnZzjsxQd', 'ProcessDialogKey', 'xnlO0piE59', 'kCoOZeWlSc', 'hr6OOHOUe7'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, Rx5caJN7xQ5cxLjRmN.csHigh entropy of concatenated method names: 'i57a1JQBeW', 'btMaJu7JqH', 'KmYh0YwZ1Q', 'JC4hZJVv3K', 'uEtauybbgY', 'cAjammBEAc', 'O7NasV1aY5', 'AI3aVqcoFM', 'JZoafVDiyY', 'thbapTMOgq'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, xh7Ze27jhlR7wxiGEu.csHigh entropy of concatenated method names: 'WM82VKZOnW', 'Lir2fftbVN', 'Bgy2pARvFY', 'jqh2kKVTs4', 'bUw2CI37xu', 'MGT2Nn8toI', 'Gph2RTvlbO', 'uNA21vEhCp', 's1A23Ic8aL', 'kL62JfJ02F'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, CfVLeRZ0fCPbwTRpXVX.csHigh entropy of concatenated method names: 'v6tjPJ7ktR', 'XvBjK79vQu', 'JYdjDteQDX', 'AvMjbCNiND', 'xw9jAga9Xy', 'G4mj5LWXWU', 'TdTjMDe2Bb', 'eD9j7C5No9', 'jYLjgBnx8d', 'G2cjxiplKP'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, pnw1c61SAEnjsxQdPn.csHigh entropy of concatenated method names: 'zJHhvQUFCf', 'QnEh2xsrA5', 'vn9hwIXfIX', 'Tj3hnnqc99', 'QZghyYueIY', 'WBOh6gQLuG', 'X9hhoHr2yL', 'UT7hY0QtAY', 'QHIht9wyKy', 'Ycvh4rYZa4'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, LdkFnaEUNvG12q8J5f.csHigh entropy of concatenated method names: 'xOC6PDv41j', 'JeW6K9lrlt', 'jyJ6Dgsn37', 'qgY6bFXcfJ', 'YUX6A5shuj', 'QQB65sGpEA', 'rwn6MoVKJp', 'OBm673sC77', 'AbP6grk3Nl', 'ccm6xba3ZZ'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, Kke9OiWaQ5u3N9S7Qf.csHigh entropy of concatenated method names: 'vAPZ6h7Ze2', 'rhlZoR7wxi', 'zD5Zt4raG1', 'JIKZ4PK5Cm', 'rQEZLvkq4F', 'RytZUnnGx4', 'z2w7f5LtkjJL9RwtfM', 'TD8ZHiqHYu1Y0sZGJu', 'DnnZZSJgdj', 'BVVZi20yB7'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, I43C61GjeNqdxOqCmZ.csHigh entropy of concatenated method names: 'der6vFPyIO', 'e1r6wj5VKZ', 'hyp6yVxn70', 'pRCyJnZ8tr', 'MdlyzXgCwj', 'wQ2608P3t8', 'EGj6ZRXblQ', 'lsm6OdGsLu', 'gpc6iSwIVI', 'U2S6WkBvoe'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, QEq4NDgD54raG1rIKP.csHigh entropy of concatenated method names: 'tSewbGkxCx', 'jj5w5ow8ne', 'GpGw7NHbAB', 'rUNwgpCpxc', 'JH4wLWpHiY', 'o8KwUuEoKC', 'XBEwakOiuU', 'QNYwh5AAEH', 'Gt5wjIikFn', 'TNBwljQMFd'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, aruLftOc4Rd1lvxZI5.csHigh entropy of concatenated method names: 'cq8DlZGFp', 'YS4bf678C', 'HbU5q7DrJ', 'pRlMQMqid', 'k8ngDqOK9', 'Goyx5OxQm', 'Bxhkj2MK4R9rKhqFOr', 'L6gTpI7WU9jjUWYTmp', 'zyLhwuNax', 'IL2la3YiS'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.6210000.8.raw.unpack, e4FfytHnnGx4LF5gSR.csHigh entropy of concatenated method names: 'F32yqq3hUN', 'MUny2ORTYZ', 'gQiynqSNWw', 'cbYy6hjhSo', 'cNkyobeHf9', 'zT6nCnybpM', 'bBdnNjet9h', 'XoKnRvcpxY', 'TpQn17jZXR', 'FQ6n352csQ'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, qS6WaQz3rud4pOOkZg.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'KU6jcZvdKA', 'UKQjLUO19W', 'rI6jUVD6T8', 'CJfja9kWyy', 'PUwjhtLiTe', 'wxkjjfDd2g', 'cWEjluLMvS'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, GtmOKRoEt31uvVTiMJ.csHigh entropy of concatenated method names: 'QTpiqTJhN6', 'qqjiv3oIab', 'snWi2PIDVj', 'jn3iwu1k5j', 'QyZinCpHCC', 'TKtiyM4QDu', 'Rthi6I5SQL', 'NMDios7nub', 'KgCiYuKjQ9', 'hOWitWVQJY'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, l1TjgJZiaP4TqC4fZXW.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'VUvlVR2qWL', 'kJ9lfcFvy7', 'ejTlp87H0G', 'l2ilk8opXE', 'mCRlCfIC0f', 'pF3lNXBpvZ', 'wUQlRo8PRw'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, patFjKwYbrr7wnCu49.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'SsIO3P09Py', 'QD2OJw1hUg', 'ffqOzRmZHm', 'wwYi05rcR3', 'zFGiZRHv0j', 'Lx3iOdFBKy', 'SXPiiPyrao', 'mUXGH4Aj0dCq4vPXTfp'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, B0d25wsUG0HDI2Z8f8.csHigh entropy of concatenated method names: 'SfJc7juv1n', 'Wo4cgO9Eji', 'XkocHwidoe', 'bGlcSpvgOL', 'WraceKQYZ2', 'fd9crJHTQS', 'y9KcGL5umA', 'bSKcI6bbvC', 'Ep0cBMt4QM', 'Rj1cuL7uIQ'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, GOUe7IJpeNc4mvuYIT.csHigh entropy of concatenated method names: 'BogjZ2JSpy', 'jAIjirK3Po', 'H9ljWUCR0P', 'LvDjvceM3U', 'ecej23Qreo', 'PykjnALCVm', 'SkQjy9PBad', 'KbshRRUtj5', 'GBHh1jtWdr', 'x5Uh3KNtdu'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, XkVF3D2BeXftFo8cqK.csHigh entropy of concatenated method names: 'Dispose', 'T7JZ3rLmni', 'IBBOSUvXcj', 'PEmKKTXPy0', 'LLnZJw1c6S', 'BEnZzjsxQd', 'ProcessDialogKey', 'xnlO0piE59', 'kCoOZeWlSc', 'hr6OOHOUe7'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, Rx5caJN7xQ5cxLjRmN.csHigh entropy of concatenated method names: 'i57a1JQBeW', 'btMaJu7JqH', 'KmYh0YwZ1Q', 'JC4hZJVv3K', 'uEtauybbgY', 'cAjammBEAc', 'O7NasV1aY5', 'AI3aVqcoFM', 'JZoafVDiyY', 'thbapTMOgq'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, xh7Ze27jhlR7wxiGEu.csHigh entropy of concatenated method names: 'WM82VKZOnW', 'Lir2fftbVN', 'Bgy2pARvFY', 'jqh2kKVTs4', 'bUw2CI37xu', 'MGT2Nn8toI', 'Gph2RTvlbO', 'uNA21vEhCp', 's1A23Ic8aL', 'kL62JfJ02F'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, CfVLeRZ0fCPbwTRpXVX.csHigh entropy of concatenated method names: 'v6tjPJ7ktR', 'XvBjK79vQu', 'JYdjDteQDX', 'AvMjbCNiND', 'xw9jAga9Xy', 'G4mj5LWXWU', 'TdTjMDe2Bb', 'eD9j7C5No9', 'jYLjgBnx8d', 'G2cjxiplKP'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, pnw1c61SAEnjsxQdPn.csHigh entropy of concatenated method names: 'zJHhvQUFCf', 'QnEh2xsrA5', 'vn9hwIXfIX', 'Tj3hnnqc99', 'QZghyYueIY', 'WBOh6gQLuG', 'X9hhoHr2yL', 'UT7hY0QtAY', 'QHIht9wyKy', 'Ycvh4rYZa4'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, LdkFnaEUNvG12q8J5f.csHigh entropy of concatenated method names: 'xOC6PDv41j', 'JeW6K9lrlt', 'jyJ6Dgsn37', 'qgY6bFXcfJ', 'YUX6A5shuj', 'QQB65sGpEA', 'rwn6MoVKJp', 'OBm673sC77', 'AbP6grk3Nl', 'ccm6xba3ZZ'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, Kke9OiWaQ5u3N9S7Qf.csHigh entropy of concatenated method names: 'vAPZ6h7Ze2', 'rhlZoR7wxi', 'zD5Zt4raG1', 'JIKZ4PK5Cm', 'rQEZLvkq4F', 'RytZUnnGx4', 'z2w7f5LtkjJL9RwtfM', 'TD8ZHiqHYu1Y0sZGJu', 'DnnZZSJgdj', 'BVVZi20yB7'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, I43C61GjeNqdxOqCmZ.csHigh entropy of concatenated method names: 'der6vFPyIO', 'e1r6wj5VKZ', 'hyp6yVxn70', 'pRCyJnZ8tr', 'MdlyzXgCwj', 'wQ2608P3t8', 'EGj6ZRXblQ', 'lsm6OdGsLu', 'gpc6iSwIVI', 'U2S6WkBvoe'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, QEq4NDgD54raG1rIKP.csHigh entropy of concatenated method names: 'tSewbGkxCx', 'jj5w5ow8ne', 'GpGw7NHbAB', 'rUNwgpCpxc', 'JH4wLWpHiY', 'o8KwUuEoKC', 'XBEwakOiuU', 'QNYwh5AAEH', 'Gt5wjIikFn', 'TNBwljQMFd'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, aruLftOc4Rd1lvxZI5.csHigh entropy of concatenated method names: 'cq8DlZGFp', 'YS4bf678C', 'HbU5q7DrJ', 'pRlMQMqid', 'k8ngDqOK9', 'Goyx5OxQm', 'Bxhkj2MK4R9rKhqFOr', 'L6gTpI7WU9jjUWYTmp', 'zyLhwuNax', 'IL2la3YiS'
                    Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4479aa0.4.raw.unpack, e4FfytHnnGx4LF5gSR.csHigh entropy of concatenated method names: 'F32yqq3hUN', 'MUny2ORTYZ', 'gQiynqSNWw', 'cbYy6hjhSo', 'cNkyobeHf9', 'zT6nCnybpM', 'bBdnNjet9h', 'XoKnRvcpxY', 'TpQn17jZXR', 'FQ6n352csQ'
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeFile created: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeJump to dropped file
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeFile created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run mpTrleJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run mpTrleJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeFile opened: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeFile opened: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe:Zone.Identifier read attributes | delete
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe PID: 7016, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: UTiPLNuHYu.exe PID: 7176, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 7596, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeMemory allocated: 16A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeMemory allocated: 3110000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeMemory allocated: 16C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeMemory allocated: 6520000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeMemory allocated: 7520000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeMemory allocated: 7660000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeMemory allocated: 8660000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeMemory allocated: 1820000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeMemory allocated: 3240000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeMemory allocated: 5240000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeMemory allocated: 3200000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeMemory allocated: 3240000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeMemory allocated: 5240000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeMemory allocated: 6640000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeMemory allocated: 7640000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeMemory allocated: 7880000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeMemory allocated: 8880000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeMemory allocated: 1270000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeMemory allocated: 2FA0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeMemory allocated: 15A0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 850000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 2410000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 4410000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 57B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 67B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 57B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 1460000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 2E80000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 2C90000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 1190000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 2D50000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 2B70000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 5FB0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 6FB0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 71E0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 81E0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 13D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 2E70000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 4E70000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7951Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1257Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeWindow / User API: threadDelayed 3012Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeWindow / User API: threadDelayed 6808Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeWindow / User API: threadDelayed 3290
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeWindow / User API: threadDelayed 6550
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWindow / User API: threadDelayed 4249
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWindow / User API: threadDelayed 5594
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWindow / User API: threadDelayed 2286
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWindow / User API: threadDelayed 7560
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7064Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3684Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6448Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep count: 37 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -34126476536362649s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7308Thread sleep count: 3012 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -99875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -99766s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7308Thread sleep count: 6808 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -99641s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -99532s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -99407s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -99278s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -99172s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -99047s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -98936s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -98828s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -98719s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -98594s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -98409s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -98072s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -97969s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -97860s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -97735s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -97610s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -97485s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -97360s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -97235s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -97110s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -96985s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -96860s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -96732s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -96625s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -96513s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -96407s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -96282s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -96157s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -96047s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -95937s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -95789s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -95563s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -95421s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -95312s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -95204s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -95079s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -94954s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -94829s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -94704s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -94579s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -94454s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -94329s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -94204s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -94079s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -93954s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -93829s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -93704s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -93579s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe TID: 7304Thread sleep time: -93422s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7220Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep count: 44 > 30
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -40582836962160988s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7580Thread sleep count: 3290 > 30
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -99889s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7580Thread sleep count: 6550 > 30
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -99781s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -99672s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -99540s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -99287s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -99172s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -99063s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -98922s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -98813s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -98703s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -98594s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -98485s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -98360s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -98235s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -98110s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -97985s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -97860s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -97735s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -97535s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -97407s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -97286s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -97117s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -96726s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -96624s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -96515s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -96404s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -96296s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -96187s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -96078s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -95968s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -95859s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -95749s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -95640s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -95531s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -95416s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -95310s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -95201s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -95094s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -94984s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -94875s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -94764s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -93791s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -93651s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -93547s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -93434s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -93328s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -93218s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -93109s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -92976s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe TID: 7576Thread sleep time: -92875s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7620Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep count: 38 > 30
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -35048813740048126s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 8004Thread sleep count: 4249 > 30
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -99828s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -99693s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -99562s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -99451s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 8004Thread sleep count: 5594 > 30
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -99343s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -99231s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -99111s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -98990s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -98859s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -98747s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -98640s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -98530s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -98421s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -98312s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -98202s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -98091s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -97984s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -97875s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -97765s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -97655s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -97512s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -97250s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -97124s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -97015s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -96906s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -96796s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -96687s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -96578s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -96468s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -96359s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -96250s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -96140s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -96031s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -95921s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -95812s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -95703s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -95593s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -95484s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -95375s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -95265s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -95156s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -95044s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -94926s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -94797s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -94672s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -94562s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -94449s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -94343s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -94234s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7992Thread sleep time: -94116s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 8084Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep count: 33 > 30
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -30437127721620741s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7160Thread sleep count: 2286 > 30
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -99890s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -99611s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -99484s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 7160Thread sleep count: 7560 > 30
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -99374s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -99265s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -99156s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -99046s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -98937s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -98827s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -98718s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -98609s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -98494s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -98374s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -98265s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -98151s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -98046s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -97937s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -97828s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -97718s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -97609s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -97497s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -97380s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -97222s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -97079s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -96968s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -96859s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -96749s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -96640s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -96531s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -96419s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -96312s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -96203s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -96093s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -95984s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -95874s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -95765s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -95656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -95546s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -95437s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -95328s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -95218s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -95109s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -94999s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -94890s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -94781s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -94671s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -94562s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -94453s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -94343s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -94234s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6252Thread sleep time: -94124s >= -30000s
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 99641Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 99532Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 99407Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 99278Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 99172Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 99047Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 98936Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 98828Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 98719Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 98594Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 98409Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 98072Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 97969Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 97860Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 97735Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 97610Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 97485Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 97360Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 97235Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 97110Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 96985Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 96860Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 96732Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 96625Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 96513Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 96407Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 96282Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 96157Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 96047Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 95937Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 95789Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 95563Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 95421Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 95312Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 95204Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 95079Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 94954Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 94829Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 94704Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 94579Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 94454Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 94329Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 94204Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 94079Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 93954Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 93829Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 93704Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 93579Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeThread delayed: delay time: 93422Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 99889
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 99781
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 99672
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 99540
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 99287
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 99172
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 99063
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 98922
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 98813
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 98703
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 98594
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 98485
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 98360
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 98235
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 98110
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 97985
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 97860
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 97735
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 97535
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 97407
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 97286
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 97117
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 96726
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 96624
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 96515
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 96404
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 96296
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 96187
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 96078
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 95968
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 95859
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 95749
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 95640
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 95531
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 95416
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 95310
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 95201
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 95094
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 94984
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 94875
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 94764
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 93791
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 93651
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 93547
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 93434
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 93328
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 93218
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 93109
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 92976
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeThread delayed: delay time: 92875
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99828
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99693
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99562
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99451
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99343
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99231
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99111
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98990
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98859
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98747
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98640
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98530
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98421
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98312
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98202
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98091
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97984
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97875
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97765
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97655
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97512
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97250
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97124
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97015
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96906
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96796
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96687
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96578
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96468
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96359
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96250
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96140
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96031
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95921
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95812
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95703
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95593
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95484
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95375
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95265
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95156
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95044
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94926
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94797
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94672
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94562
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94449
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94343
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94234
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94116
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99890
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99611
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99484
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99374
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99265
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99156
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99046
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98937
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98827
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98718
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98609
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98494
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98374
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98265
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98151
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98046
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97937
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97828
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97718
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97609
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97497
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97380
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97222
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97079
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96968
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96859
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96749
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96640
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96531
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96419
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96312
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96203
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 96093
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95984
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95874
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95765
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95656
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95546
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95437
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95328
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95218
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 95109
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94999
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94890
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94781
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94671
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94562
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94453
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94343
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94234
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 94124
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1788451149.0000000001443000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: mpTrle.exe, 0000000D.00000002.1941705028.0000000004E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
                    Source: mpTrle.exe, 0000000D.00000002.1933428401.0000000000652000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\ G
                    Source: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000005.00000002.2976264466.0000000001501000.00000004.00000020.00020000.00000000.sdmp, UTiPLNuHYu.exe, 0000000C.00000002.2975332345.0000000001350000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000013.00000002.2974398040.00000000013E5000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000018.00000002.2972918560.0000000001064000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeMemory written: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory written: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory written: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpBDCA.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess created: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess created: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeProcess created: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpDED0.tmp"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpFE1F.tmp"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeQueries volume information: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeQueries volume information: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 20.2.mpTrle.exe.3dba728.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.UTiPLNuHYu.exe.42a9c70.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.UTiPLNuHYu.exe.42e4c90.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4179208.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.mpTrle.exe.34b5788.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.mpTrle.exe.3df5748.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.mpTrle.exe.347a768.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.mpTrle.exe.34b5788.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.UTiPLNuHYu.exe.42e4c90.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.mpTrle.exe.3df5748.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.mpTrle.exe.347a768.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.mpTrle.exe.3dba728.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.UTiPLNuHYu.exe.42a9c70.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4179208.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000002.2980248436.00000000032BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2980111716.0000000002EEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.1936939570.000000000347A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2979395334.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2979395334.0000000002EFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2015893720.0000000003DBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1791421661.0000000004179000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2980306612.000000000303A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2980111716.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2980306612.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1851368813.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.2980248436.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe PID: 7016, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe PID: 6784, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: UTiPLNuHYu.exe PID: 7176, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: UTiPLNuHYu.exe PID: 7476, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 7596, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 7856, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 8064, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 6280, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\FTP Navigator\Ftplist.txt
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: Yara matchFile source: 20.2.mpTrle.exe.3dba728.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.UTiPLNuHYu.exe.42a9c70.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.UTiPLNuHYu.exe.42e4c90.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4179208.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.mpTrle.exe.34b5788.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.mpTrle.exe.3df5748.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.mpTrle.exe.347a768.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.mpTrle.exe.34b5788.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.UTiPLNuHYu.exe.42e4c90.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.mpTrle.exe.3df5748.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.mpTrle.exe.347a768.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.mpTrle.exe.3dba728.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.UTiPLNuHYu.exe.42a9c70.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4179208.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.1936939570.000000000347A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2979395334.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2015893720.0000000003DBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1791421661.0000000004179000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2980111716.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2980306612.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1851368813.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.2980248436.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe PID: 7016, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe PID: 6784, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: UTiPLNuHYu.exe PID: 7176, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: UTiPLNuHYu.exe PID: 7476, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 7596, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 7856, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 8064, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 6280, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 20.2.mpTrle.exe.3dba728.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.UTiPLNuHYu.exe.42a9c70.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.UTiPLNuHYu.exe.42e4c90.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4179208.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.mpTrle.exe.34b5788.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.mpTrle.exe.3df5748.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.mpTrle.exe.347a768.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.mpTrle.exe.34b5788.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.41b4228.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.UTiPLNuHYu.exe.42e4c90.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.mpTrle.exe.3df5748.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.mpTrle.exe.347a768.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.mpTrle.exe.3dba728.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.UTiPLNuHYu.exe.42a9c70.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.4179208.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000002.2980248436.00000000032BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2980111716.0000000002EEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.1936939570.000000000347A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2979395334.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2979395334.0000000002EFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2015893720.0000000003DBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1791421661.0000000004179000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2980306612.000000000303A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2980111716.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2980306612.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1851368813.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.2980248436.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe PID: 7016, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe PID: 6784, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: UTiPLNuHYu.exe PID: 7176, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: UTiPLNuHYu.exe PID: 7476, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 7596, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 7856, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 8064, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 6280, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt1
                    Registry Run Keys / Startup Folder
                    1
                    Scheduled Task/Job
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                    Registry Run Keys / Startup Folder
                    12
                    Software Packing
                    NTDS211
                    Security Software Discovery
                    Distributed Component Object Model1
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Process Discovery
                    SSHKeylogging23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Hidden Files and Directories
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1482888 Sample: SecuriteInfo.com.Trojan.Pac... Startdate: 26/07/2024 Architecture: WINDOWS Score: 100 63 us2.smtp.mailhostbox.com 2->63 65 api.ipify.org 2->65 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 Antivirus / Scanner detection for submitted sample 2->75 77 10 other signatures 2->77 8 SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe 7 2->8         started        12 UTiPLNuHYu.exe 5 2->12         started        14 mpTrle.exe 2->14         started        16 mpTrle.exe 2->16         started        signatures3 process4 file5 55 C:\Users\user\AppData\...\UTiPLNuHYu.exe, PE32 8->55 dropped 57 C:\Users\...\UTiPLNuHYu.exe:Zone.Identifier, ASCII 8->57 dropped 59 C:\Users\user\AppData\Local\...\tmpA5DD.tmp, XML 8->59 dropped 61 SecuriteInfo.com.T...8.1574.9831.exe.log, ASCII 8->61 dropped 91 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->91 93 Uses schtasks.exe or at.exe to add and modify task schedules 8->93 95 Adds a directory exclusion to Windows Defender 8->95 18 SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe 16 5 8->18         started        23 powershell.exe 23 8->23         started        25 schtasks.exe 1 8->25         started        97 Antivirus detection for dropped file 12->97 99 Multi AV Scanner detection for dropped file 12->99 101 Machine Learning detection for dropped file 12->101 27 UTiPLNuHYu.exe 12->27         started        35 3 other processes 12->35 103 Injects a PE file into a foreign processes 14->103 29 mpTrle.exe 14->29         started        31 schtasks.exe 14->31         started        33 mpTrle.exe 16->33         started        37 2 other processes 16->37 signatures6 process7 dnsIp8 67 us2.smtp.mailhostbox.com 208.91.198.143, 49731, 49733, 49738 PUBLIC-DOMAIN-REGISTRYUS United States 18->67 69 api.ipify.org 172.67.74.152, 443, 49730, 49732 CLOUDFLARENETUS United States 18->69 51 C:\Users\user\AppData\Roaming\...\mpTrle.exe, PE32 18->51 dropped 53 C:\Users\user\...\mpTrle.exe:Zone.Identifier, ASCII 18->53 dropped 79 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->79 81 Tries to steal Mail credentials (via file / registry access) 18->81 83 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->83 85 Loading BitLocker PowerShell Module 23->85 39 WmiPrvSE.exe 23->39         started        41 conhost.exe 23->41         started        43 conhost.exe 25->43         started        45 conhost.exe 31->45         started        87 Tries to harvest and steal ftp login credentials 33->87 89 Tries to harvest and steal browser information (history, passwords, etc) 33->89 47 conhost.exe 35->47         started        49 conhost.exe 37->49         started        file9 signatures10 process11

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe59%VirustotalBrowse
                    SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe63%ReversingLabsByteCode-MSIL.Spyware.Negasteal
                    SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe100%AviraHEUR/AGEN.1308640
                    SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe100%AviraHEUR/AGEN.1308640
                    C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe100%AviraHEUR/AGEN.1308640
                    C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe63%ReversingLabsWin32.Trojan.AgentTesla
                    C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe59%VirustotalBrowse
                    C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe63%ReversingLabsWin32.Trojan.AgentTesla
                    C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe59%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    us2.smtp.mailhostbox.com1%VirustotalBrowse
                    api.ipify.org0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    https://api.ipify.org/t0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://us2.smtp.mailhostbox.com0%Avira URL Cloudsafe
                    http://us2.smtp.mailhostbox.com1%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    us2.smtp.mailhostbox.com
                    208.91.198.143
                    truetrueunknown
                    api.ipify.org
                    172.67.74.152
                    truefalseunknown
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.orgSecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1791421661.0000000004179000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000005.00000002.2980248436.0000000003241000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 00000006.00000002.1851368813.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 0000000C.00000002.2980306612.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000D.00000002.1936939570.000000000347A000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000013.00000002.2979395334.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000014.00000002.2015893720.0000000003DBA000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000018.00000002.2971496563.0000000000435000.00000040.00000400.00020000.00000000.sdmp, mpTrle.exe, 00000018.00000002.2980111716.0000000002E7C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://account.dyn.com/SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1791421661.0000000004179000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 00000006.00000002.1851368813.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 0000000C.00000002.2971486884.0000000000436000.00000040.00000400.00020000.00000000.sdmp, mpTrle.exe, 0000000D.00000002.1936939570.000000000347A000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000014.00000002.2015893720.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ipify.org/tSecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000005.00000002.2980248436.0000000003241000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 0000000C.00000002.2980306612.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000013.00000002.2979395334.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000018.00000002.2980111716.0000000002E7C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://us2.smtp.mailhostbox.comSecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000005.00000002.2980248436.00000000032BC000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 0000000C.00000002.2980306612.000000000303A000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000013.00000002.2979395334.0000000002EFC000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000018.00000002.2980111716.0000000002EEC000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000000.00000002.1790616281.00000000031EE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe, 00000005.00000002.2980248436.0000000003241000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 00000006.00000002.1849930169.0000000003287000.00000004.00000800.00020000.00000000.sdmp, UTiPLNuHYu.exe, 0000000C.00000002.2980306612.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000D.00000002.1935054356.0000000002457000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000013.00000002.2979395334.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000014.00000002.2009322632.0000000002D9A000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000018.00000002.2980111716.0000000002E7C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    208.91.198.143
                    us2.smtp.mailhostbox.comUnited States
                    394695PUBLIC-DOMAIN-REGISTRYUStrue
                    172.67.74.152
                    api.ipify.orgUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1482888
                    Start date and time:2024-07-26 10:27:05 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 9m 55s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:26
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@34/16@2/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 369
                    • Number of non-executed functions: 28
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtCreateKey calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    04:28:02API Interceptor174x Sleep call for process: SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe modified
                    04:28:06API Interceptor19x Sleep call for process: powershell.exe modified
                    04:28:09API Interceptor161x Sleep call for process: UTiPLNuHYu.exe modified
                    04:28:17API Interceptor385x Sleep call for process: mpTrle.exe modified
                    09:28:06Task SchedulerRun new task: UTiPLNuHYu path: C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
                    09:28:09AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run mpTrle C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                    09:28:17AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run mpTrle C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    208.91.198.143ynhHNexysa.exeGet hashmaliciousAgentTeslaBrowse
                      2FBexXRCHR.rtfGet hashmaliciousAgentTeslaBrowse
                        file.exeGet hashmaliciousSystemBCBrowse
                          file.exeGet hashmaliciousSystemBCBrowse
                            LisectAVT_2403002A_52.exeGet hashmaliciousAgentTeslaBrowse
                              SecuriteInfo.com.Win32.PWSX-gen.14778.18726.exeGet hashmaliciousAgentTeslaBrowse
                                8hOkq9mMQu.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  Order List Pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    payment order.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      Mt103.exeGet hashmaliciousAgentTeslaBrowse
                                        172.67.74.152golang-modules.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        SecuriteInfo.com.Trojan.Win64.Agent.14415.19839.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        242764.exeGet hashmaliciousFicker Stealer, Rusty StealerBrowse
                                        • api.ipify.org/?format=wef
                                        K8mzlntJVN.msiGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        stub.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        stub.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                        • api.ipify.org/?format=json
                                        Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/?format=json
                                        Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/?format=json
                                        Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                                        • api.ipify.org/?format=json
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        us2.smtp.mailhostbox.comynhHNexysa.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.225
                                        2FBexXRCHR.rtfGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.224
                                        file.exeGet hashmaliciousSystemBCBrowse
                                        • 208.91.199.224
                                        file.exeGet hashmaliciousSystemBCBrowse
                                        • 208.91.199.223
                                        LisectAVT_2403002A_124.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.225
                                        LisectAVT_2403002A_52.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.198.143
                                        SWIFT COPY.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.224
                                        LisectAVT_2403002B_465.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.224
                                        jRlq1fSUW5.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.225
                                        SecuriteInfo.com.Win32.PWSX-gen.14778.18726.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.198.143
                                        api.ipify.orgynhHNexysa.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        2FBexXRCHR.rtfGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        https://pub-bc1e99c17d21413c8c62ead228907d1f.r2.dev/auth_gen.html?folder=inf0gudkij&module&user-agent=Mozilla/5.0+(Windows+NT+10.0;+Win64;+x64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/86.0.4240.75+Safari/537.36Get hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                                        • 104.26.13.205
                                        https://b14d.lnsd.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                        • 104.26.13.205
                                        LisectAVT_2403002A_124.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        LisectAVT_2403002A_127.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.13.205
                                        LisectAVT_2403002A_133.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        LisectAVT_2403002A_2.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        LisectAVT_2403002A_460.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.13.205
                                        LisectAVT_2403002A_481.exeGet hashmaliciousLuna Grabber, Luna LoggerBrowse
                                        • 104.26.12.205
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        PUBLIC-DOMAIN-REGISTRYUSynhHNexysa.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.224
                                        2FBexXRCHR.rtfGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.224
                                        file.exeGet hashmaliciousSystemBCBrowse
                                        • 103.50.162.156
                                        file.exeGet hashmaliciousSystemBCBrowse
                                        • 103.50.162.156
                                        LisectAVT_2403002A_124.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.225
                                        LisectAVT_2403002A_16.exeGet hashmaliciousAgentTeslaBrowse
                                        • 199.79.62.115
                                        LisectAVT_2403002A_52.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.198.143
                                        SWIFT COPY.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.224
                                        LisectAVT_2403002B_290.exeGet hashmaliciousBdaejecBrowse
                                        • 74.119.239.234
                                        LisectAVT_2403002B_465.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.223
                                        CLOUDFLARENETUShttps://r.emails.wellbeingontheweb.com/mk/cl/f/sh/7nVU1aA2nfuMScRuip3UF1TWed6PxdT/DQvTpig-WhJjGet hashmaliciousUnknownBrowse
                                        • 104.17.25.14
                                        Quotation.xlsGet hashmaliciousRemcosBrowse
                                        • 188.114.96.3
                                        invoice.docx.docGet hashmaliciousFormBookBrowse
                                        • 188.114.96.3
                                        zKXXNr7f2e.exeGet hashmaliciousBabadedaBrowse
                                        • 172.64.41.3
                                        https://cloudflare-ipfs.com/ipfs/QmZe2ELun5aFwHyi9wE3DpfuUQM8RqExLq66jv64aV8BQd/#info@royaletruckservices.com.auGet hashmaliciousHTMLPhisherBrowse
                                        • 104.17.64.14
                                        new order 00041221.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        JGKjBsQrMc.exeGet hashmaliciousAmadey, Babadeda, RedLine, Stealc, VidarBrowse
                                        • 172.64.41.3
                                        zKXXNr7f2e.exeGet hashmaliciousBabadedaBrowse
                                        • 162.159.61.3
                                        N#U00b0025498563-.pdfGet hashmaliciousUnknownBrowse
                                        • 172.64.41.3
                                        #U00d6DEME TAVS#U0130YES#U0130.xlsGet hashmaliciousRemcosBrowse
                                        • 188.114.97.3
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        3b5074b1b5d032e5620f69f9f700ff0ehttp://cs9.bizGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        https://cloudflare-ipfs.com/ipfs/QmZe2ELun5aFwHyi9wE3DpfuUQM8RqExLq66jv64aV8BQd/#info@royaletruckservices.com.auGet hashmaliciousHTMLPhisherBrowse
                                        • 172.67.74.152
                                        new order 00041221.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 172.67.74.152
                                        ynhHNexysa.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        7Y18r(191).exeGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        7Y18r(169).exeGet hashmaliciousCryptOneBrowse
                                        • 172.67.74.152
                                        7Y18r(191).exeGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        xptRc4P9NV.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        fps-booster.exeGet hashmaliciousStormKittyBrowse
                                        • 172.67.74.152
                                        https://metamaskwalletexetention.webflow.io/Get hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        No context
                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:true
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:false
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:false
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):2232
                                        Entropy (8bit):5.380134126512796
                                        Encrypted:false
                                        SSDEEP:48:+WSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMuge//YUyus:+LHxvIIwLgZ2KRHWLOug8s
                                        MD5:5317422AE0D4B4DCC96C903A5FCB88E8
                                        SHA1:D47E15FF7709A633E231BF182B20B8C6A29C277D
                                        SHA-256:5AB27086EE94EF2E6553D3D751F5C19D226F68373E56DEF21590BCFBC1BA40F3
                                        SHA-512:92C2E6533B2B61C6C7394B30A0E69AE7D4B57D6A99FC90A25D3BDB829299D3EEB0AAC73C64D340C87B98FAF3C16C9FFAA427A1C6384C12F419CDEB18FFB3CABB
                                        Malicious:false
                                        Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                                        File Type:XML 1.0 document, ASCII text
                                        Category:dropped
                                        Size (bytes):1576
                                        Entropy (8bit):5.113709183189339
                                        Encrypted:false
                                        SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtapBwxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTiBAv
                                        MD5:A54F38F2C73AF18632FF5C4A4DC5F6A0
                                        SHA1:8AA6A1EF72C930E6365026E4C8BBBA2A1A046262
                                        SHA-256:18D969B4B292B6DA8E97598FA6BFFCDC57B1D12B0AB66888B877904559C6EFE9
                                        SHA-512:1F7A13B71142633BDD15092AC0BCB865C53F4658DEEFAB06084FA7719A0EF6C6D83021206225ADBCC9F969CC7887F32AFD635F0260C0E261E4F7F6D06179E65C
                                        Malicious:true
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                        Process:C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
                                        File Type:XML 1.0 document, ASCII text
                                        Category:dropped
                                        Size (bytes):1576
                                        Entropy (8bit):5.113709183189339
                                        Encrypted:false
                                        SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtapBwxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTiBAv
                                        MD5:A54F38F2C73AF18632FF5C4A4DC5F6A0
                                        SHA1:8AA6A1EF72C930E6365026E4C8BBBA2A1A046262
                                        SHA-256:18D969B4B292B6DA8E97598FA6BFFCDC57B1D12B0AB66888B877904559C6EFE9
                                        SHA-512:1F7A13B71142633BDD15092AC0BCB865C53F4658DEEFAB06084FA7719A0EF6C6D83021206225ADBCC9F969CC7887F32AFD635F0260C0E261E4F7F6D06179E65C
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                        Process:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        File Type:XML 1.0 document, ASCII text
                                        Category:dropped
                                        Size (bytes):1576
                                        Entropy (8bit):5.113709183189339
                                        Encrypted:false
                                        SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtapBwxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTiBAv
                                        MD5:A54F38F2C73AF18632FF5C4A4DC5F6A0
                                        SHA1:8AA6A1EF72C930E6365026E4C8BBBA2A1A046262
                                        SHA-256:18D969B4B292B6DA8E97598FA6BFFCDC57B1D12B0AB66888B877904559C6EFE9
                                        SHA-512:1F7A13B71142633BDD15092AC0BCB865C53F4658DEEFAB06084FA7719A0EF6C6D83021206225ADBCC9F969CC7887F32AFD635F0260C0E261E4F7F6D06179E65C
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                        Process:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        File Type:XML 1.0 document, ASCII text
                                        Category:dropped
                                        Size (bytes):1576
                                        Entropy (8bit):5.113709183189339
                                        Encrypted:false
                                        SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtapBwxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTiBAv
                                        MD5:A54F38F2C73AF18632FF5C4A4DC5F6A0
                                        SHA1:8AA6A1EF72C930E6365026E4C8BBBA2A1A046262
                                        SHA-256:18D969B4B292B6DA8E97598FA6BFFCDC57B1D12B0AB66888B877904559C6EFE9
                                        SHA-512:1F7A13B71142633BDD15092AC0BCB865C53F4658DEEFAB06084FA7719A0EF6C6D83021206225ADBCC9F969CC7887F32AFD635F0260C0E261E4F7F6D06179E65C
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):764416
                                        Entropy (8bit):7.786014042943944
                                        Encrypted:false
                                        SSDEEP:12288:nuSSY+aZrwr+vBDpXNbPi26ZQ/Zn4iRSt5p0DNuJVbVipE07bj:L/4rYBLPilQR5wt5euJVUE0/j
                                        MD5:3AC2AB389629EE685878DA77C511F359
                                        SHA1:05A6CCB19D32AA653A942DEA5D6401249BB8F7D2
                                        SHA-256:5CB06070E2428B600080A8B4A21FDE3ED5D773CA0A1CF3BEA381CE96C1FA305D
                                        SHA-512:1CD1C127F994AAAEF44D6A774EB133CDFAE48B6D609519E6A99DB32B96A3EC1FC902CA6ECA8D62DF0B51B253B544E4C5DAD550C13E2FEE208A683B32165E0CDC
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Avira, Detection: 100%
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 63%
                                        • Antivirus: Virustotal, Detection: 59%, Browse
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....O.f..............0................. ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H.......@z...Q......?...X...@...........................................^..}.....(.......(.....*.0..+.........,..{.......+....,...{....o........(.....*..0...........s.....s.....s..........(....s......s....}.....s ...}.....{....o!.....{....o!.....(".....{.....o#.....{.....o$.....{.....o%.....{.....o&.....{......s'...o(.....{........s)...o*.....{....r...po+.....{.... .... I...s,...o-.....{.....o......r...po/.....{....o0....o1.....r1..po/.....{....o2....o3.....{..... ..s'...o(..
                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):764416
                                        Entropy (8bit):7.786014042943944
                                        Encrypted:false
                                        SSDEEP:12288:nuSSY+aZrwr+vBDpXNbPi26ZQ/Zn4iRSt5p0DNuJVbVipE07bj:L/4rYBLPilQR5wt5euJVUE0/j
                                        MD5:3AC2AB389629EE685878DA77C511F359
                                        SHA1:05A6CCB19D32AA653A942DEA5D6401249BB8F7D2
                                        SHA-256:5CB06070E2428B600080A8B4A21FDE3ED5D773CA0A1CF3BEA381CE96C1FA305D
                                        SHA-512:1CD1C127F994AAAEF44D6A774EB133CDFAE48B6D609519E6A99DB32B96A3EC1FC902CA6ECA8D62DF0B51B253B544E4C5DAD550C13E2FEE208A683B32165E0CDC
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Avira, Detection: 100%
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 63%
                                        • Antivirus: Virustotal, Detection: 59%, Browse
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....O.f..............0................. ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H.......@z...Q......?...X...@...........................................^..}.....(.......(.....*.0..+.........,..{.......+....,...{....o........(.....*..0...........s.....s.....s..........(....s......s....}.....s ...}.....{....o!.....{....o!.....(".....{.....o#.....{.....o$.....{.....o%.....{.....o&.....{......s'...o(.....{........s)...o*.....{....r...po+.....{.... .... I...s,...o-.....{.....o......r...po/.....{....o0....o1.....r1..po/.....{....o2....o3.....{..... ..s'...o(..
                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:modified
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.786014042943944
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                                        File size:764'416 bytes
                                        MD5:3ac2ab389629ee685878da77c511f359
                                        SHA1:05a6ccb19d32aa653a942dea5d6401249bb8f7d2
                                        SHA256:5cb06070e2428b600080a8b4a21fde3ed5d773ca0a1cf3bea381ce96c1fa305d
                                        SHA512:1cd1c127f994aaaef44d6a774eb133cdfae48b6d609519e6a99db32b96a3ec1fc902ca6eca8d62df0b51b253b544e4c5dad550c13e2fee208a683b32165e0cdc
                                        SSDEEP:12288:nuSSY+aZrwr+vBDpXNbPi26ZQ/Zn4iRSt5p0DNuJVbVipE07bj:L/4rYBLPilQR5wt5euJVUE0/j
                                        TLSH:CDF4F112AAD55B62D8A502F7943439CC23B46949CD43E7B91EBCA5DDCD337C2EE88603
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....O.f..............0.................. ........@.. ....................................@................................
                                        Icon Hash:d3d0deeae2f2c6c2
                                        Entrypoint:0x4ab7ea
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x66A04F2E [Wed Jul 24 00:47:42 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xab7980x4f.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x10c84.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xbe0000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000xa97f00xa980057306169d10743aad52f5de442e2fd35False0.9512741403945427data7.946917722198967IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0xac0000x10c840x10e0047f02870c96b3a14563d0acaa3ad6783False0.07346643518518518DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 36028797018963968.0000003.7650138975345664IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0xbe0000xc0x200f092646082c91f7d627e364144fe6ecfFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0xac1180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 60472 x 60472 px/m0.06794924878741275
                                        RT_GROUP_ICON0xbc9400x14data1.0
                                        RT_GROUP_ICON0xbc9540x14data1.05
                                        RT_VERSION0xbc9680x31cdata0.44472361809045224
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                        2024-07-26T10:29:01.890339+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434974452.165.165.26192.168.2.4
                                        2024-07-26T10:28:23.350688+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973452.165.165.26192.168.2.4
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jul 26, 2024 10:28:07.357225895 CEST49730443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:07.357266903 CEST44349730172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:07.357482910 CEST49730443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:07.368529081 CEST49730443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:07.368542910 CEST44349730172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:07.897007942 CEST44349730172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:07.897263050 CEST49730443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:07.902987957 CEST49730443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:07.903006077 CEST44349730172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:07.903450012 CEST44349730172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:07.945703030 CEST49730443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:07.989890099 CEST49730443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:08.036544085 CEST44349730172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:08.101270914 CEST44349730172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:08.101358891 CEST44349730172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:08.101492882 CEST49730443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:08.109962940 CEST49730443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:09.267921925 CEST49731587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:09.298062086 CEST58749731208.91.198.143192.168.2.4
                                        Jul 26, 2024 10:28:09.298219919 CEST49731587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:13.956007004 CEST49732443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:13.956048965 CEST44349732172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:13.956135988 CEST49732443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:13.960438967 CEST49732443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:13.960448027 CEST44349732172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:14.460807085 CEST44349732172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:14.460979939 CEST49732443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:14.463366032 CEST49732443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:14.463371038 CEST44349732172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:14.463593006 CEST44349732172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:14.508318901 CEST49732443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:14.567496061 CEST49732443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:14.612498999 CEST44349732172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:14.683533907 CEST44349732172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:14.683585882 CEST44349732172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:14.683649063 CEST49732443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:14.686403036 CEST49732443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:15.361036062 CEST49733587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:15.399586916 CEST58749733208.91.198.143192.168.2.4
                                        Jul 26, 2024 10:28:15.399698973 CEST49733587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:21.981889963 CEST49735443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:21.981975079 CEST44349735172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:21.982151985 CEST49735443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:21.986254930 CEST49735443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:21.986287117 CEST44349735172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:22.545628071 CEST44349735172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:22.545713902 CEST49735443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:22.547679901 CEST49735443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:22.547688007 CEST44349735172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:22.548033953 CEST44349735172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:22.601962090 CEST49735443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:22.608293056 CEST49735443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:22.652533054 CEST44349735172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:22.730940104 CEST44349735172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:22.731143951 CEST44349735172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:22.731211901 CEST49735443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:22.734321117 CEST49735443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:23.338251114 CEST49738587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:23.345628023 CEST58749738208.91.198.143192.168.2.4
                                        Jul 26, 2024 10:28:23.345716000 CEST49738587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:29.204468012 CEST49742443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:29.204591990 CEST44349742172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:29.204674006 CEST49742443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:29.229950905 CEST49742443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:29.230010033 CEST44349742172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:29.737904072 CEST44349742172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:29.738014936 CEST49742443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:29.741949081 CEST49742443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:29.741956949 CEST44349742172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:29.742269993 CEST44349742172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:29.789503098 CEST49742443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:29.793167114 CEST49742443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:29.840512991 CEST44349742172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:29.905651093 CEST44349742172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:29.905720949 CEST44349742172.67.74.152192.168.2.4
                                        Jul 26, 2024 10:28:29.905788898 CEST49742443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:29.919408083 CEST49742443192.168.2.4172.67.74.152
                                        Jul 26, 2024 10:28:30.467200041 CEST49743587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:30.472403049 CEST58749743208.91.198.143192.168.2.4
                                        Jul 26, 2024 10:28:30.472507000 CEST49743587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:30.690905094 CEST58749731208.91.198.143192.168.2.4
                                        Jul 26, 2024 10:28:30.691093922 CEST49731587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:30.730467081 CEST49731587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:30.737837076 CEST58749731208.91.198.143192.168.2.4
                                        Jul 26, 2024 10:28:36.843528032 CEST58749733208.91.198.143192.168.2.4
                                        Jul 26, 2024 10:28:36.843871117 CEST49733587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:36.845586061 CEST49733587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:36.850517035 CEST58749733208.91.198.143192.168.2.4
                                        Jul 26, 2024 10:28:44.801218987 CEST58749738208.91.198.143192.168.2.4
                                        Jul 26, 2024 10:28:44.801403999 CEST49738587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:44.802932978 CEST49738587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:44.808073044 CEST58749738208.91.198.143192.168.2.4
                                        Jul 26, 2024 10:28:51.890993118 CEST58749743208.91.198.143192.168.2.4
                                        Jul 26, 2024 10:28:51.891204119 CEST49743587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:51.894143105 CEST49743587192.168.2.4208.91.198.143
                                        Jul 26, 2024 10:28:51.899391890 CEST58749743208.91.198.143192.168.2.4
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jul 26, 2024 10:28:07.340739012 CEST6464453192.168.2.41.1.1.1
                                        Jul 26, 2024 10:28:07.349560022 CEST53646441.1.1.1192.168.2.4
                                        Jul 26, 2024 10:28:09.239093065 CEST5267953192.168.2.41.1.1.1
                                        Jul 26, 2024 10:28:09.266278982 CEST53526791.1.1.1192.168.2.4
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jul 26, 2024 10:28:07.340739012 CEST192.168.2.41.1.1.10x2171Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                        Jul 26, 2024 10:28:09.239093065 CEST192.168.2.41.1.1.10x793fStandard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jul 26, 2024 10:28:07.349560022 CEST1.1.1.1192.168.2.40x2171No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                        Jul 26, 2024 10:28:07.349560022 CEST1.1.1.1192.168.2.40x2171No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                        Jul 26, 2024 10:28:07.349560022 CEST1.1.1.1192.168.2.40x2171No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                        Jul 26, 2024 10:28:09.266278982 CEST1.1.1.1192.168.2.40x793fNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                        Jul 26, 2024 10:28:09.266278982 CEST1.1.1.1192.168.2.40x793fNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                        Jul 26, 2024 10:28:09.266278982 CEST1.1.1.1192.168.2.40x793fNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                        Jul 26, 2024 10:28:09.266278982 CEST1.1.1.1192.168.2.40x793fNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                        • api.ipify.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.449730172.67.74.1524436784C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                                        TimestampBytes transferredDirectionData
                                        2024-07-26 08:28:07 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-07-26 08:28:08 UTC211INHTTP/1.1 200 OK
                                        Date: Fri, 26 Jul 2024 08:28:08 GMT
                                        Content-Type: text/plain
                                        Content-Length: 11
                                        Connection: close
                                        Vary: Origin
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8a9303b64db47285-EWR
                                        2024-07-26 08:28:08 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                        Data Ascii: 8.46.123.33


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.449732172.67.74.1524437476C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
                                        TimestampBytes transferredDirectionData
                                        2024-07-26 08:28:14 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-07-26 08:28:14 UTC211INHTTP/1.1 200 OK
                                        Date: Fri, 26 Jul 2024 08:28:14 GMT
                                        Content-Type: text/plain
                                        Content-Length: 11
                                        Connection: close
                                        Vary: Origin
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8a9303df6e498ce6-EWR
                                        2024-07-26 08:28:14 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                        Data Ascii: 8.46.123.33


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.449735172.67.74.1524437856C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        TimestampBytes transferredDirectionData
                                        2024-07-26 08:28:22 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-07-26 08:28:22 UTC211INHTTP/1.1 200 OK
                                        Date: Fri, 26 Jul 2024 08:28:22 GMT
                                        Content-Type: text/plain
                                        Content-Length: 11
                                        Connection: close
                                        Vary: Origin
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8a930411ab318c23-EWR
                                        2024-07-26 08:28:22 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                        Data Ascii: 8.46.123.33


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.449742172.67.74.1524436280C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        TimestampBytes transferredDirectionData
                                        2024-07-26 08:28:29 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-07-26 08:28:29 UTC211INHTTP/1.1 200 OK
                                        Date: Fri, 26 Jul 2024 08:28:29 GMT
                                        Content-Type: text/plain
                                        Content-Length: 11
                                        Connection: close
                                        Vary: Origin
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8a93043e8ac441d5-EWR
                                        2024-07-26 08:28:29 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                        Data Ascii: 8.46.123.33


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:04:28:02
                                        Start date:26/07/2024
                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe"
                                        Imagebase:0xc90000
                                        File size:764'416 bytes
                                        MD5 hash:3AC2AB389629EE685878DA77C511F359
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1791421661.0000000004179000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1791421661.0000000004179000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:1
                                        Start time:04:28:05
                                        Start date:26/07/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"
                                        Imagebase:0xfe0000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:2
                                        Start time:04:28:05
                                        Start date:26/07/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:04:28:05
                                        Start date:26/07/2024
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp"
                                        Imagebase:0x4c0000
                                        File size:187'904 bytes
                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:04:28:05
                                        Start date:26/07/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:04:28:06
                                        Start date:26/07/2024
                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe"
                                        Imagebase:0xf10000
                                        File size:764'416 bytes
                                        MD5 hash:3AC2AB389629EE685878DA77C511F359
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2980248436.00000000032BC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2980248436.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2980248436.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Target ID:6
                                        Start time:04:28:06
                                        Start date:26/07/2024
                                        Path:C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
                                        Imagebase:0xf40000
                                        File size:764'416 bytes
                                        MD5 hash:3AC2AB389629EE685878DA77C511F359
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.1851368813.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.1851368813.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Antivirus matches:
                                        • Detection: 100%, Avira
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 63%, ReversingLabs
                                        • Detection: 59%, Virustotal, Browse
                                        Reputation:low
                                        Has exited:true

                                        Target ID:7
                                        Start time:04:28:08
                                        Start date:26/07/2024
                                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                        Imagebase:0x7ff693ab0000
                                        File size:496'640 bytes
                                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                        Has elevated privileges:true
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:8
                                        Start time:04:28:12
                                        Start date:26/07/2024
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpBDCA.tmp"
                                        Imagebase:0xa40000
                                        File size:187'904 bytes
                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:9
                                        Start time:04:28:12
                                        Start date:26/07/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:10
                                        Start time:04:28:12
                                        Start date:26/07/2024
                                        Path:C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"
                                        Imagebase:0x230000
                                        File size:764'416 bytes
                                        MD5 hash:3AC2AB389629EE685878DA77C511F359
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:11
                                        Start time:04:28:12
                                        Start date:26/07/2024
                                        Path:C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"
                                        Imagebase:0x2f0000
                                        File size:764'416 bytes
                                        MD5 hash:3AC2AB389629EE685878DA77C511F359
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:12
                                        Start time:04:28:12
                                        Start date:26/07/2024
                                        Path:C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"
                                        Imagebase:0xb40000
                                        File size:764'416 bytes
                                        MD5 hash:3AC2AB389629EE685878DA77C511F359
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.2980306612.000000000303A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.2980306612.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.2980306612.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Target ID:13
                                        Start time:04:28:17
                                        Start date:26/07/2024
                                        Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                        Imagebase:0xd0000
                                        File size:764'416 bytes
                                        MD5 hash:3AC2AB389629EE685878DA77C511F359
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.1936939570.000000000347A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.1936939570.000000000347A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Antivirus matches:
                                        • Detection: 100%, Avira
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 63%, ReversingLabs
                                        • Detection: 59%, Virustotal, Browse
                                        Reputation:low
                                        Has exited:true

                                        Target ID:17
                                        Start time:04:28:20
                                        Start date:26/07/2024
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpDED0.tmp"
                                        Imagebase:0x4c0000
                                        File size:187'904 bytes
                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:18
                                        Start time:04:28:20
                                        Start date:26/07/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:19
                                        Start time:04:28:21
                                        Start date:26/07/2024
                                        Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                        Imagebase:0xb90000
                                        File size:764'416 bytes
                                        MD5 hash:3AC2AB389629EE685878DA77C511F359
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000013.00000002.2979395334.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.2979395334.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.2979395334.0000000002EFC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Target ID:20
                                        Start time:04:28:25
                                        Start date:26/07/2024
                                        Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                        Imagebase:0x8b0000
                                        File size:764'416 bytes
                                        MD5 hash:3AC2AB389629EE685878DA77C511F359
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000014.00000002.2015893720.0000000003DBA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000002.2015893720.0000000003DBA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:21
                                        Start time:04:28:28
                                        Start date:26/07/2024
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpFE1F.tmp"
                                        Imagebase:0x4c0000
                                        File size:187'904 bytes
                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:22
                                        Start time:04:28:28
                                        Start date:26/07/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:23
                                        Start time:04:28:28
                                        Start date:26/07/2024
                                        Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                        Imagebase:0x2f0000
                                        File size:764'416 bytes
                                        MD5 hash:3AC2AB389629EE685878DA77C511F359
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:24
                                        Start time:04:28:28
                                        Start date:26/07/2024
                                        Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                        Imagebase:0xae0000
                                        File size:764'416 bytes
                                        MD5 hash:3AC2AB389629EE685878DA77C511F359
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000018.00000002.2980111716.0000000002EEC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000018.00000002.2980111716.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000018.00000002.2980111716.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Has exited:false

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:11.9%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:2.6%
                                          Total number of Nodes:233
                                          Total number of Limit Nodes:19
                                          execution_graph 20237 1713f70 20239 1713dec 20237->20239 20238 1713e13 20239->20238 20243 1716996 20239->20243 20266 1716928 20239->20266 20288 1716938 20239->20288 20244 1716924 20243->20244 20246 1716999 20243->20246 20310 1717701 20244->20310 20315 1717381 20244->20315 20320 171713c 20244->20320 20324 1716ffb 20244->20324 20328 171705b 20244->20328 20334 17170f8 20244->20334 20338 17175f8 20244->20338 20343 1716fb5 20244->20343 20348 1716fd5 20244->20348 20353 1716d53 20244->20353 20359 17170cf 20244->20359 20364 17177ef 20244->20364 20368 1716f6c 20244->20368 20373 17175ad 20244->20373 20378 1716c4a 20244->20378 20384 17171a8 20244->20384 20390 1716d28 20244->20390 20395 1717582 20244->20395 20400 1717401 20244->20400 20245 1716976 20245->20239 20246->20239 20267 1716952 20266->20267 20269 1716d53 2 API calls 20267->20269 20270 1716fd5 2 API calls 20267->20270 20271 1716fb5 2 API calls 20267->20271 20272 17175f8 2 API calls 20267->20272 20273 17170f8 2 API calls 20267->20273 20274 171705b 2 API calls 20267->20274 20275 1716ffb 2 API calls 20267->20275 20276 171713c 2 API calls 20267->20276 20277 1717381 2 API calls 20267->20277 20278 1717701 2 API calls 20267->20278 20279 1717401 2 API calls 20267->20279 20280 1717582 2 API calls 20267->20280 20281 1716d28 2 API calls 20267->20281 20282 17171a8 2 API calls 20267->20282 20283 1716c4a 2 API calls 20267->20283 20284 17175ad 2 API calls 20267->20284 20285 1716f6c 2 API calls 20267->20285 20286 17177ef 2 API calls 20267->20286 20287 17170cf 2 API calls 20267->20287 20268 1716976 20268->20239 20269->20268 20270->20268 20271->20268 20272->20268 20273->20268 20274->20268 20275->20268 20276->20268 20277->20268 20278->20268 20279->20268 20280->20268 20281->20268 20282->20268 20283->20268 20284->20268 20285->20268 20286->20268 20287->20268 20289 1716952 20288->20289 20291 1716d53 2 API calls 20289->20291 20292 1716fd5 2 API calls 20289->20292 20293 1716fb5 2 API calls 20289->20293 20294 17175f8 2 API calls 20289->20294 20295 17170f8 2 API calls 20289->20295 20296 171705b 2 API calls 20289->20296 20297 1716ffb 2 API calls 20289->20297 20298 171713c 2 API calls 20289->20298 20299 1717381 2 API calls 20289->20299 20300 1717701 2 API calls 20289->20300 20301 1717401 2 API calls 20289->20301 20302 1717582 2 API calls 20289->20302 20303 1716d28 2 API calls 20289->20303 20304 17171a8 2 API calls 20289->20304 20305 1716c4a 2 API calls 20289->20305 20306 17175ad 2 API calls 20289->20306 20307 1716f6c 2 API calls 20289->20307 20308 17177ef 2 API calls 20289->20308 20309 17170cf 2 API calls 20289->20309 20290 1716976 20290->20239 20291->20290 20292->20290 20293->20290 20294->20290 20295->20290 20296->20290 20297->20290 20298->20290 20299->20290 20300->20290 20301->20290 20302->20290 20303->20290 20304->20290 20305->20290 20306->20290 20307->20290 20308->20290 20309->20290 20311 1717716 20310->20311 20405 1713740 20311->20405 20409 1713748 20311->20409 20312 171774c 20316 1717387 20315->20316 20413 1713250 20316->20413 20417 1713249 20316->20417 20317 17173a3 20421 1713171 20320->20421 20425 1713178 20320->20425 20321 1717156 20326 1713740 WriteProcessMemory 20324->20326 20327 1713748 WriteProcessMemory 20324->20327 20325 1717029 20325->20245 20326->20325 20327->20325 20329 1717068 20328->20329 20331 1716ebc 20329->20331 20429 17130c0 20329->20429 20433 17130c8 20329->20433 20330 17175d9 20330->20245 20331->20245 20336 1713740 WriteProcessMemory 20334->20336 20337 1713748 WriteProcessMemory 20334->20337 20335 171711c 20335->20245 20336->20335 20337->20335 20339 17175c5 20338->20339 20341 17130c0 ResumeThread 20339->20341 20342 17130c8 ResumeThread 20339->20342 20340 17175d9 20340->20245 20341->20340 20342->20340 20344 171718c 20343->20344 20437 1713830 20344->20437 20441 1713838 20344->20441 20345 17177cf 20345->20345 20349 1716fea 20348->20349 20351 1713830 ReadProcessMemory 20349->20351 20352 1713838 ReadProcessMemory 20349->20352 20350 17177cf 20351->20350 20352->20350 20354 1716d6b 20353->20354 20355 1716d31 20353->20355 20354->20245 20355->20354 20445 17139d0 20355->20445 20449 17139c4 20355->20449 20360 1716ffa 20359->20360 20361 1717029 20360->20361 20362 1713740 WriteProcessMemory 20360->20362 20363 1713748 WriteProcessMemory 20360->20363 20361->20245 20362->20361 20363->20361 20366 1713171 Wow64SetThreadContext 20364->20366 20367 1713178 Wow64SetThreadContext 20364->20367 20365 1717809 20366->20365 20367->20365 20369 1716f7d 20368->20369 20371 1713740 WriteProcessMemory 20369->20371 20372 1713748 WriteProcessMemory 20369->20372 20370 171774c 20371->20370 20372->20370 20374 17175b3 20373->20374 20376 17130c0 ResumeThread 20374->20376 20377 17130c8 ResumeThread 20374->20377 20375 17175d9 20375->20245 20376->20375 20377->20375 20380 1716c8b 20378->20380 20379 1716d6b 20379->20245 20380->20379 20382 17139d0 CreateProcessA 20380->20382 20383 17139c4 CreateProcessA 20380->20383 20381 1716e91 20381->20245 20382->20381 20383->20381 20385 17171ab 20384->20385 20386 171713b 20384->20386 20385->20245 20388 1713171 Wow64SetThreadContext 20386->20388 20389 1713178 Wow64SetThreadContext 20386->20389 20387 1717156 20388->20387 20389->20387 20391 1716d31 20390->20391 20393 17139d0 CreateProcessA 20391->20393 20394 17139c4 CreateProcessA 20391->20394 20392 1716e91 20392->20245 20393->20392 20394->20392 20396 1717512 20395->20396 20398 1713830 ReadProcessMemory 20396->20398 20399 1713838 ReadProcessMemory 20396->20399 20397 17177cf 20398->20397 20399->20397 20401 1717407 20400->20401 20403 1713830 ReadProcessMemory 20401->20403 20404 1713838 ReadProcessMemory 20401->20404 20402 17177cf 20403->20402 20404->20402 20406 1713790 WriteProcessMemory 20405->20406 20408 17137e7 20406->20408 20408->20312 20410 1713790 WriteProcessMemory 20409->20410 20412 17137e7 20410->20412 20412->20312 20414 1713290 VirtualAllocEx 20413->20414 20416 17132cd 20414->20416 20416->20317 20418 1713290 VirtualAllocEx 20417->20418 20420 17132cd 20418->20420 20420->20317 20422 1713178 Wow64SetThreadContext 20421->20422 20424 1713205 20422->20424 20424->20321 20426 17131bd Wow64SetThreadContext 20425->20426 20428 1713205 20426->20428 20428->20321 20430 17130c8 ResumeThread 20429->20430 20432 1713139 20430->20432 20432->20330 20434 1713108 ResumeThread 20433->20434 20436 1713139 20434->20436 20436->20330 20438 1713838 ReadProcessMemory 20437->20438 20440 17138c7 20438->20440 20440->20345 20442 1713883 ReadProcessMemory 20441->20442 20444 17138c7 20442->20444 20444->20345 20446 1713a59 CreateProcessA 20445->20446 20448 1713c1b 20446->20448 20450 17139d0 CreateProcessA 20449->20450 20452 1713c1b 20450->20452 20474 1717ae0 20475 1717c6b 20474->20475 20476 1717b06 20474->20476 20476->20475 20478 1711c40 20476->20478 20479 1718168 PostMessageW 20478->20479 20480 17181d4 20479->20480 20480->20476 20453 16a4668 20454 16a467a 20453->20454 20455 16a4686 20454->20455 20457 16a4779 20454->20457 20458 16a479d 20457->20458 20462 16a4878 20458->20462 20466 16a4888 20458->20466 20464 16a48af 20462->20464 20463 16a498c 20463->20463 20464->20463 20470 16a44b0 20464->20470 20467 16a48af 20466->20467 20468 16a498c 20467->20468 20469 16a44b0 CreateActCtxA 20467->20469 20469->20468 20471 16a5918 CreateActCtxA 20470->20471 20473 16a59db 20471->20473 20481 1713f63 20483 1713dec 20481->20483 20482 1713e13 20483->20482 20484 1716996 12 API calls 20483->20484 20485 1716938 12 API calls 20483->20485 20486 1716928 12 API calls 20483->20486 20484->20483 20485->20483 20486->20483 20487 16aaf78 20488 16aaf87 20487->20488 20491 16ab070 20487->20491 20499 16ab061 20487->20499 20492 16ab081 20491->20492 20493 16ab0a4 20491->20493 20492->20493 20507 16ab308 20492->20507 20511 16ab2f9 20492->20511 20493->20488 20494 16ab2a8 GetModuleHandleW 20496 16ab2d5 20494->20496 20495 16ab09c 20495->20493 20495->20494 20496->20488 20500 16ab081 20499->20500 20501 16ab0a4 20499->20501 20500->20501 20505 16ab308 LoadLibraryExW 20500->20505 20506 16ab2f9 LoadLibraryExW 20500->20506 20501->20488 20502 16ab2a8 GetModuleHandleW 20504 16ab2d5 20502->20504 20503 16ab09c 20503->20501 20503->20502 20504->20488 20505->20503 20506->20503 20508 16ab31c 20507->20508 20510 16ab341 20508->20510 20515 16aaa88 20508->20515 20510->20495 20512 16ab31c 20511->20512 20513 16aaa88 LoadLibraryExW 20512->20513 20514 16ab341 20512->20514 20513->20514 20514->20495 20516 16ab4e8 LoadLibraryExW 20515->20516 20518 16ab561 20516->20518 20518->20510 20519 16ad548 DuplicateHandle 20520 16ad5de 20519->20520 20521 16ad300 20522 16ad346 GetCurrentProcess 20521->20522 20524 16ad398 GetCurrentThread 20522->20524 20525 16ad391 20522->20525 20526 16ad3ce 20524->20526 20527 16ad3d5 GetCurrentProcess 20524->20527 20525->20524 20526->20527 20530 16ad40b 20527->20530 20528 16ad433 GetCurrentThreadId 20529 16ad464 20528->20529 20530->20528
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4815bcef6309d4b0fec56c6b34387563742a1e63dbcc75008a9c12f94351884e
                                          • Instruction ID: cdecc9301dc79a55a6795aa5f5e1f5c27ef8c43763852d7241869fba44fcf594
                                          • Opcode Fuzzy Hash: 4815bcef6309d4b0fec56c6b34387563742a1e63dbcc75008a9c12f94351884e
                                          • Instruction Fuzzy Hash: 88711771D05219CBEB24CF6AC8447E9FBB6AF89300F14C1EAD549A6254EBB05AC5CF40

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 294 16ad2f0-16ad38f GetCurrentProcess 299 16ad398-16ad3cc GetCurrentThread 294->299 300 16ad391-16ad397 294->300 301 16ad3ce-16ad3d4 299->301 302 16ad3d5-16ad409 GetCurrentProcess 299->302 300->299 301->302 304 16ad40b-16ad411 302->304 305 16ad412-16ad42d call 16ad4da 302->305 304->305 308 16ad433-16ad462 GetCurrentThreadId 305->308 309 16ad46b-16ad4cd 308->309 310 16ad464-16ad46a 308->310 310->309
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 016AD37E
                                          • GetCurrentThread.KERNEL32 ref: 016AD3BB
                                          • GetCurrentProcess.KERNEL32 ref: 016AD3F8
                                          • GetCurrentThreadId.KERNEL32 ref: 016AD451
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789761033.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 4bfb719b1f276db29dea15ba8462cd9bd39396db486f407c823bd66b8d1c794f
                                          • Instruction ID: 6b6d247b45dbd37f4a9cd98f2c86b887eb199ef6b6ef05be3e596598a4ae21bc
                                          • Opcode Fuzzy Hash: 4bfb719b1f276db29dea15ba8462cd9bd39396db486f407c823bd66b8d1c794f
                                          • Instruction Fuzzy Hash: 965166B09012498FDB14CFA9D948B9EBBF1EF49304F248459D109A73A0DB74A885CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 317 16ad300-16ad38f GetCurrentProcess 321 16ad398-16ad3cc GetCurrentThread 317->321 322 16ad391-16ad397 317->322 323 16ad3ce-16ad3d4 321->323 324 16ad3d5-16ad409 GetCurrentProcess 321->324 322->321 323->324 326 16ad40b-16ad411 324->326 327 16ad412-16ad42d call 16ad4da 324->327 326->327 330 16ad433-16ad462 GetCurrentThreadId 327->330 331 16ad46b-16ad4cd 330->331 332 16ad464-16ad46a 330->332 332->331
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 016AD37E
                                          • GetCurrentThread.KERNEL32 ref: 016AD3BB
                                          • GetCurrentProcess.KERNEL32 ref: 016AD3F8
                                          • GetCurrentThreadId.KERNEL32 ref: 016AD451
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789761033.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: a8e3bbe0a930e0efa8af565d93d7d8c93f88bbd58876a0f0a1059eec3c1a41b8
                                          • Instruction ID: 6e2a009bcab0badc93bb299bde191732b17ff771cfe52a79ec204125cce7e379
                                          • Opcode Fuzzy Hash: a8e3bbe0a930e0efa8af565d93d7d8c93f88bbd58876a0f0a1059eec3c1a41b8
                                          • Instruction Fuzzy Hash: 235145B09012498FDB14DFAAD948BDEBBF1EF48304F248459D119A73A0DB74A884CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 362 17139c4-1713a65 365 1713a67-1713a71 362->365 366 1713a9e-1713abe 362->366 365->366 367 1713a73-1713a75 365->367 373 1713ac0-1713aca 366->373 374 1713af7-1713b26 366->374 368 1713a77-1713a81 367->368 369 1713a98-1713a9b 367->369 371 1713a83 368->371 372 1713a85-1713a94 368->372 369->366 371->372 372->372 376 1713a96 372->376 373->374 375 1713acc-1713ace 373->375 382 1713b28-1713b32 374->382 383 1713b5f-1713c19 CreateProcessA 374->383 377 1713af1-1713af4 375->377 378 1713ad0-1713ada 375->378 376->369 377->374 380 1713adc 378->380 381 1713ade-1713aed 378->381 380->381 381->381 384 1713aef 381->384 382->383 385 1713b34-1713b36 382->385 394 1713c22-1713ca8 383->394 395 1713c1b-1713c21 383->395 384->377 387 1713b59-1713b5c 385->387 388 1713b38-1713b42 385->388 387->383 389 1713b44 388->389 390 1713b46-1713b55 388->390 389->390 390->390 392 1713b57 390->392 392->387 405 1713cb8-1713cbc 394->405 406 1713caa-1713cae 394->406 395->394 408 1713ccc-1713cd0 405->408 409 1713cbe-1713cc2 405->409 406->405 407 1713cb0 406->407 407->405 410 1713ce0-1713ce4 408->410 411 1713cd2-1713cd6 408->411 409->408 412 1713cc4 409->412 414 1713cf6-1713cfd 410->414 415 1713ce6-1713cec 410->415 411->410 413 1713cd8 411->413 412->408 413->410 416 1713d14 414->416 417 1713cff-1713d0e 414->417 415->414 419 1713d15 416->419 417->416 419->419
                                          APIs
                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 01713C06
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 012888ef138565ae1e45e76b889ba182bb15ec07a8b67900c0cf467fc6f0d854
                                          • Instruction ID: 59b12a09ea2d6ea1f0ca2f20fcf3868d8f6a43573cb5df9b716f97715fd17670
                                          • Opcode Fuzzy Hash: 012888ef138565ae1e45e76b889ba182bb15ec07a8b67900c0cf467fc6f0d854
                                          • Instruction Fuzzy Hash: 6BA12971D00619DFEB20CF69C841BEDFBB2BF48324F1485A9E848A7294DB749985CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 420 17139d0-1713a65 422 1713a67-1713a71 420->422 423 1713a9e-1713abe 420->423 422->423 424 1713a73-1713a75 422->424 430 1713ac0-1713aca 423->430 431 1713af7-1713b26 423->431 425 1713a77-1713a81 424->425 426 1713a98-1713a9b 424->426 428 1713a83 425->428 429 1713a85-1713a94 425->429 426->423 428->429 429->429 433 1713a96 429->433 430->431 432 1713acc-1713ace 430->432 439 1713b28-1713b32 431->439 440 1713b5f-1713c19 CreateProcessA 431->440 434 1713af1-1713af4 432->434 435 1713ad0-1713ada 432->435 433->426 434->431 437 1713adc 435->437 438 1713ade-1713aed 435->438 437->438 438->438 441 1713aef 438->441 439->440 442 1713b34-1713b36 439->442 451 1713c22-1713ca8 440->451 452 1713c1b-1713c21 440->452 441->434 444 1713b59-1713b5c 442->444 445 1713b38-1713b42 442->445 444->440 446 1713b44 445->446 447 1713b46-1713b55 445->447 446->447 447->447 449 1713b57 447->449 449->444 462 1713cb8-1713cbc 451->462 463 1713caa-1713cae 451->463 452->451 465 1713ccc-1713cd0 462->465 466 1713cbe-1713cc2 462->466 463->462 464 1713cb0 463->464 464->462 467 1713ce0-1713ce4 465->467 468 1713cd2-1713cd6 465->468 466->465 469 1713cc4 466->469 471 1713cf6-1713cfd 467->471 472 1713ce6-1713cec 467->472 468->467 470 1713cd8 468->470 469->465 470->467 473 1713d14 471->473 474 1713cff-1713d0e 471->474 472->471 476 1713d15 473->476 474->473 476->476
                                          APIs
                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 01713C06
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 9d99bc7d1963112a9b7daba501636bf4a4fd0add21ec300b14e8865971dae829
                                          • Instruction ID: e4d8dd905c1412e59a9fcbcc561ce660cfcd11a1641af7b1207ae8733fb1ede0
                                          • Opcode Fuzzy Hash: 9d99bc7d1963112a9b7daba501636bf4a4fd0add21ec300b14e8865971dae829
                                          • Instruction Fuzzy Hash: 5D912871D00219DFEB20CF69C841B9DFBB2BF48324F1481A9E848A7294DB749985CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 477 16ab070-16ab07f 478 16ab0ab-16ab0af 477->478 479 16ab081-16ab08e call 16aaa24 477->479 481 16ab0c3-16ab104 478->481 482 16ab0b1-16ab0bb 478->482 485 16ab090 479->485 486 16ab0a4 479->486 488 16ab111-16ab11f 481->488 489 16ab106-16ab10e 481->489 482->481 533 16ab096 call 16ab308 485->533 534 16ab096 call 16ab2f9 485->534 486->478 490 16ab143-16ab145 488->490 491 16ab121-16ab126 488->491 489->488 493 16ab148-16ab14f 490->493 494 16ab128-16ab12f call 16aaa30 491->494 495 16ab131 491->495 492 16ab09c-16ab09e 492->486 496 16ab1e0-16ab2a0 492->496 499 16ab15c-16ab163 493->499 500 16ab151-16ab159 493->500 497 16ab133-16ab141 494->497 495->497 528 16ab2a8-16ab2d3 GetModuleHandleW 496->528 529 16ab2a2-16ab2a5 496->529 497->493 503 16ab170-16ab179 call 16aaa40 499->503 504 16ab165-16ab16d 499->504 500->499 508 16ab17b-16ab183 503->508 509 16ab186-16ab18b 503->509 504->503 508->509 510 16ab1a9-16ab1b6 509->510 511 16ab18d-16ab194 509->511 518 16ab1b8-16ab1d6 510->518 519 16ab1d9-16ab1df 510->519 511->510 513 16ab196-16ab1a6 call 16aaa50 call 16aaa60 511->513 513->510 518->519 530 16ab2dc-16ab2f0 528->530 531 16ab2d5-16ab2db 528->531 529->528 531->530 533->492 534->492
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 016AB2C6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789761033.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: c3fe37cbd943e842877f33ba1f21992a225ceb935e34769a53ed09ca4f6b6855
                                          • Instruction ID: 7bd6e38519f47d41a043177552a94935c76ca5aa209bd74bf17a35617180f7eb
                                          • Opcode Fuzzy Hash: c3fe37cbd943e842877f33ba1f21992a225ceb935e34769a53ed09ca4f6b6855
                                          • Instruction Fuzzy Hash: 26712070A00B058FD724DF6AD94075ABBF1BF88200F408A2ED58ADBB50EB75E845CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 535 16a590d-16a5913 536 16a591c-16a59d9 CreateActCtxA 535->536 538 16a59db-16a59e1 536->538 539 16a59e2-16a5a3c 536->539 538->539 546 16a5a4b-16a5a4f 539->546 547 16a5a3e-16a5a41 539->547 548 16a5a60 546->548 549 16a5a51-16a5a5d 546->549 547->546 551 16a5a61 548->551 549->548 551->551
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 016A59C9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789761033.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: e1a27f27b832bf48895c9704ba492219606fb2390c4c0dd289018e411aeed0f8
                                          • Instruction ID: a548b5833c75ea2ff1aca4bf1c1234ecf04a2accdf75bd8ea01c57c11fbb0217
                                          • Opcode Fuzzy Hash: e1a27f27b832bf48895c9704ba492219606fb2390c4c0dd289018e411aeed0f8
                                          • Instruction Fuzzy Hash: D041DFB0D00719CEDB24CFAAC8847CDBBB6BF49304F64805AD509AB265DB756986CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 552 16a44b0-16a59d9 CreateActCtxA 555 16a59db-16a59e1 552->555 556 16a59e2-16a5a3c 552->556 555->556 563 16a5a4b-16a5a4f 556->563 564 16a5a3e-16a5a41 556->564 565 16a5a60 563->565 566 16a5a51-16a5a5d 563->566 564->563 568 16a5a61 565->568 566->565 568->568
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 016A59C9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789761033.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: fbf029dc9dec1815a607a69f64856873c6b53bece70decaec60f1147e19a2d85
                                          • Instruction ID: a275fa346c6dc77e2e51fb716903b6106826d188fbfb5987383212e91f584a77
                                          • Opcode Fuzzy Hash: fbf029dc9dec1815a607a69f64856873c6b53bece70decaec60f1147e19a2d85
                                          • Instruction Fuzzy Hash: A841F1B0D00719CFDB24CFAAC884B8EBBB5BF49304F64806AD509AB255DB756946CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 569 1713740-1713796 571 17137a6-17137e5 WriteProcessMemory 569->571 572 1713798-17137a4 569->572 574 17137e7-17137ed 571->574 575 17137ee-171381e 571->575 572->571 574->575
                                          APIs
                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 017137D8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 5c991354368f58488b5a4b602038409889c5aba2e0ac51425226a174ce4cd2bb
                                          • Instruction ID: 99ec77ad47247cb65962791a2bb143ead66bd49c456de282bfd5b14b4af86091
                                          • Opcode Fuzzy Hash: 5c991354368f58488b5a4b602038409889c5aba2e0ac51425226a174ce4cd2bb
                                          • Instruction Fuzzy Hash: 502137B59002499FDB10DFA9C884BDEBFF1FF48324F10842AE558A7250C7789545CBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 579 1713748-1713796 581 17137a6-17137e5 WriteProcessMemory 579->581 582 1713798-17137a4 579->582 584 17137e7-17137ed 581->584 585 17137ee-171381e 581->585 582->581 584->585
                                          APIs
                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 017137D8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: da7d14469965efa2bd42937a4afef2c768e168ffd53246ddd32d8452cdbac2d8
                                          • Instruction ID: 406a1b907b49668cd3cc85d748c1de1b062b2c18ff1467fa8e976d89f1a508df
                                          • Opcode Fuzzy Hash: da7d14469965efa2bd42937a4afef2c768e168ffd53246ddd32d8452cdbac2d8
                                          • Instruction Fuzzy Hash: 022127B59003599FDB10DFA9C885BDEFBF5FF48320F108429E958A7250C7789954CBA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 595 1713171-17131c3 598 17131d3-1713203 Wow64SetThreadContext 595->598 599 17131c5-17131d1 595->599 601 1713205-171320b 598->601 602 171320c-171323c 598->602 599->598 601->602
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 017131F6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 6be023cb993541752174125e8bc4068934b08ee8d90741e646301f65356af09e
                                          • Instruction ID: 433ae24e81ef34a66984da9470fccbefe32f42cc677b1d0882341f9e22f9efc0
                                          • Opcode Fuzzy Hash: 6be023cb993541752174125e8bc4068934b08ee8d90741e646301f65356af09e
                                          • Instruction Fuzzy Hash: B02116B19002098FDB10DFAAC4857EEFFF4EF48324F148429D599A7245C778A985CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 589 16ad540-16ad546 590 16ad548-16ad5dc DuplicateHandle 589->590 591 16ad5de-16ad5e4 590->591 592 16ad5e5-16ad602 590->592 591->592
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016AD5CF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789761033.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 7f084a8d8b24188410899fc5cee1aa3b4e5d481ff314d7ea06cb2d6e4a981ded
                                          • Instruction ID: 5f6b4429bda37d5deb57c4cf0a7a69633ae6a8512176cb91f1cffffee2f19e5c
                                          • Opcode Fuzzy Hash: 7f084a8d8b24188410899fc5cee1aa3b4e5d481ff314d7ea06cb2d6e4a981ded
                                          • Instruction Fuzzy Hash: 902105B5D002089FDB10CF99D884ADEFBF4EB48310F14801AE958A7310D374A945CFA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 606 1713830-17138c5 ReadProcessMemory 610 17138c7-17138cd 606->610 611 17138ce-17138fe 606->611 610->611
                                          APIs
                                          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 017138B8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: bbcce89fec90d5b34651ae1e4bce676ee043b3de20b7780524f1600643540125
                                          • Instruction ID: 11d7b10e9b85b55d09aa9c49d210195d75a2632530033da7682e031fd142ece9
                                          • Opcode Fuzzy Hash: bbcce89fec90d5b34651ae1e4bce676ee043b3de20b7780524f1600643540125
                                          • Instruction Fuzzy Hash: 852136B18002499FDB10CFAAC880ADEFBF5FF48320F108429E918A7250C738A545CBA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 615 1713178-17131c3 617 17131d3-1713203 Wow64SetThreadContext 615->617 618 17131c5-17131d1 615->618 620 1713205-171320b 617->620 621 171320c-171323c 617->621 618->617 620->621
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 017131F6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: bf80fde83176a700a1d6f11ecbcf7cfd95d14afb981bb08006258c440fe7cbbd
                                          • Instruction ID: ea03e31d02a7b1b117f4284cf5f66012ac43241dc58ae1fa582361ab7780220d
                                          • Opcode Fuzzy Hash: bf80fde83176a700a1d6f11ecbcf7cfd95d14afb981bb08006258c440fe7cbbd
                                          • Instruction Fuzzy Hash: DE2137B19002098FDB10DFAEC4857EEFFF4EB48324F108429D559A7240C7789945CFA4
                                          APIs
                                          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 017138B8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 7b3254a0480dae91a9180ddb860c4a4c31f45ebf22bce21bcbd5c3565943aa05
                                          • Instruction ID: 24f3f31efd2baf77689c1ded7b9d104ec9a7590daada9ff722f9eb6150e78693
                                          • Opcode Fuzzy Hash: 7b3254a0480dae91a9180ddb860c4a4c31f45ebf22bce21bcbd5c3565943aa05
                                          • Instruction Fuzzy Hash: 952128B1C003599FDB10DFAAC840ADEFBF5FF48320F108429E958A7250C7389545CBA4
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016AD5CF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789761033.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 28b567ddb13e7be1e6df8a43292292731a8ca1439e2dd198c2720998575ce52e
                                          • Instruction ID: 11459149fa2ef91238b8cb27254cebb86ed06f51b87402feb7579acd5dbbf111
                                          • Opcode Fuzzy Hash: 28b567ddb13e7be1e6df8a43292292731a8ca1439e2dd198c2720998575ce52e
                                          • Instruction Fuzzy Hash: CA21E2B5D002089FDB10CFAAD984ADEFFF8EB48320F14801AE958A3310D374A940CFA4
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 1d53482a42bcabfada69c169fc444d6f05d978cb9cb40f7f4cfd404fb9fdeede
                                          • Instruction ID: 8e5a83a258f1333ca119659ea921d0adaa19288a454dd7ccec66dee0a77f7504
                                          • Opcode Fuzzy Hash: 1d53482a42bcabfada69c169fc444d6f05d978cb9cb40f7f4cfd404fb9fdeede
                                          • Instruction Fuzzy Hash: AA1158B59002488FDB20DFAAC4457DEFFF4EB88324F248429D559A7244CB75A545CFA4
                                          APIs
                                          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 017132BE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 5c86fb5a89e83d38e40fea0f5184a5bf861638b40a614c48c529a130d95cd047
                                          • Instruction ID: 874fa71dec766547ba4ffcf6c3013ccb0065a3524025b6ef67404a477a4d65e7
                                          • Opcode Fuzzy Hash: 5c86fb5a89e83d38e40fea0f5184a5bf861638b40a614c48c529a130d95cd047
                                          • Instruction Fuzzy Hash: F11117B19002499FDB20DFA9C4446EEFFF5EF88324F24881AE559A7250C7359555CF90
                                          APIs
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,016AB341,00000800,00000000,00000000), ref: 016AB552
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789761033.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 464a94f99d96f5ba0ae79f32fcaafa09cf7b32c3a0bcf50d347d5ed3aab5e6c1
                                          • Instruction ID: a5b42ba4b4dc7b3435f7b96b0b9c3140c81c7ed24ce78231f76ac60cb5d4d969
                                          • Opcode Fuzzy Hash: 464a94f99d96f5ba0ae79f32fcaafa09cf7b32c3a0bcf50d347d5ed3aab5e6c1
                                          • Instruction Fuzzy Hash: F91123B6D003488FDB20CF9AD844ADEFBF4EB48310F54842AE959A7310C375A945CFA4
                                          APIs
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,016AB341,00000800,00000000,00000000), ref: 016AB552
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789761033.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 7738a203e79692650baa1b846ae761a22aac81a3636ef063606c1616f8949f39
                                          • Instruction ID: cacf5fc171e85d00170bb97b7a439b8b925ddaddb4ec110091c4f2fe22e9b372
                                          • Opcode Fuzzy Hash: 7738a203e79692650baa1b846ae761a22aac81a3636ef063606c1616f8949f39
                                          • Instruction Fuzzy Hash: AC11F3B6D003499FDB24CF9AD844ADEFBF4EB88310F14842AD959A7310C375A945CFA5
                                          APIs
                                          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 017132BE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 13a5a92fd46bd7f6a8fa8467cc49dfde415614b128899aadf2b8dcae9888de92
                                          • Instruction ID: c36a8a75d005e33dd17895098ad98e808b95de3ef49aa014d2705a8dfd2f268e
                                          • Opcode Fuzzy Hash: 13a5a92fd46bd7f6a8fa8467cc49dfde415614b128899aadf2b8dcae9888de92
                                          • Instruction Fuzzy Hash: 291137B29002499FCB10DFAAC844BDEFFF5EF88324F208419E559A7250C775A554CFA4
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 05bd357889887b9a2abfc0e8c8734d60f777b0b1d30f74b932d6b69145e5183e
                                          • Instruction ID: 5084f73590349abef59f19c91d1ecbb61093ee7cb8c27ed01299804ff182a9b1
                                          • Opcode Fuzzy Hash: 05bd357889887b9a2abfc0e8c8734d60f777b0b1d30f74b932d6b69145e5183e
                                          • Instruction Fuzzy Hash: 6E1136B1D002488FDB20DFAAC4457DEFBF4EB88324F208429D559A7250CB75A944CFA4
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 016AB2C6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789761033.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: b654f30b007e1bcaf8771cebf38785b9e067a0491acb7e97bfed7e54c7274a36
                                          • Instruction ID: e2a4203f8a0e2010bc40a035b081b894feb12056e238b7ef692ffe7128b3cc4f
                                          • Opcode Fuzzy Hash: b654f30b007e1bcaf8771cebf38785b9e067a0491acb7e97bfed7e54c7274a36
                                          • Instruction Fuzzy Hash: E51102B5C002498FDB10CF9AD844ADEFBF4EF89310F10C46AD919AB210D375A545CFA1
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 017181C5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 3d1ade73667052fdea5d6a029397aca9b6fd61b49445f5091f69fdfb82432e40
                                          • Instruction ID: 37f24def75262df3b6759f4776cb2015432e1b8a29b24464ec3fac9f7bc73271
                                          • Opcode Fuzzy Hash: 3d1ade73667052fdea5d6a029397aca9b6fd61b49445f5091f69fdfb82432e40
                                          • Instruction Fuzzy Hash: ED11F2B58003489FDB10DF9AD948BDEFBF8EB48320F208459E958A7200C375A944CFA5
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 016AB2C6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789761033.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 4f8146bc00a8bf083dc60034204b75e17a0e397c5fc8ba813c0e4fc5b37d2eb1
                                          • Instruction ID: 267ddff8a1c7f9bae3b2a82b5d98414eb7149d65fcfc1dac76da683e5b161dcb
                                          • Opcode Fuzzy Hash: 4f8146bc00a8bf083dc60034204b75e17a0e397c5fc8ba813c0e4fc5b37d2eb1
                                          • Instruction Fuzzy Hash: 70110FB5C002498FDB10CF9AD844ADEFBF4AF88320F10C42AD818A7210C375A545CFA1
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 017181C5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: a05cd0dcc3765b6969772443cf1ed1b108284ea508cb1a68c3477d7ca08ee381
                                          • Instruction ID: 4630b39e0019e3a08e1f602c2aae0bbecb41794122a8538c85566651eac8c06c
                                          • Opcode Fuzzy Hash: a05cd0dcc3765b6969772443cf1ed1b108284ea508cb1a68c3477d7ca08ee381
                                          • Instruction Fuzzy Hash: 2B11C2B59002899FDB10CF99D448BDEFFF4EB48314F24885AE558A7610C375A984CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789145118.000000000160D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0160D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_160d000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 06cecc018f093a04045e2de4fa2dbf14561be2bbe60ca77bdc237f886c246faa
                                          • Instruction ID: 117b48ca4b257a97569a6f33d34b31aff423517d74f925e114e42c8a74110223
                                          • Opcode Fuzzy Hash: 06cecc018f093a04045e2de4fa2dbf14561be2bbe60ca77bdc237f886c246faa
                                          • Instruction Fuzzy Hash: 5021D371504240DFDB0BDF98D9C0B2BBF65FB88318F24C669ED094B296C336D456CAA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789145118.000000000160D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0160D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_160d000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9fb9d9dc02294dc188ac64f5b0bb99fdc975911b54258226c4c8a33f1eb17ade
                                          • Instruction ID: 1085d3eb34e058de76b032903e2a7dc2e586b3b1f2091eb3942cbca1930de0f4
                                          • Opcode Fuzzy Hash: 9fb9d9dc02294dc188ac64f5b0bb99fdc975911b54258226c4c8a33f1eb17ade
                                          • Instruction Fuzzy Hash: BE212871500204DFDB0ADF98DDC0B6BBF65FB94324F21C269E9094B396C336E456C6A2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789257506.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_161d000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8231a1d75efdc890a1cf8353f5f840436c7705a5fdee7a45c3f4f42c7c7180e9
                                          • Instruction ID: f6edda169e7d60a20da72fb59c3fb8a499d8b7f8d35d47257fb64b6cd3cba237
                                          • Opcode Fuzzy Hash: 8231a1d75efdc890a1cf8353f5f840436c7705a5fdee7a45c3f4f42c7c7180e9
                                          • Instruction Fuzzy Hash: 1B212671504240EFDB05DF98DDC8B66BBA5FB84324F28C66DEA094B35AC33AD446CA61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789257506.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_161d000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d9ea6f3ad07cdde1f89c746e937c493faab5a597a487e50358cb54afa05d21cc
                                          • Instruction ID: 64e8fcb375032683f1923c8fa6676b92ccf2350722fa2e4decec2675475ebdce
                                          • Opcode Fuzzy Hash: d9ea6f3ad07cdde1f89c746e937c493faab5a597a487e50358cb54afa05d21cc
                                          • Instruction Fuzzy Hash: 07212275604200DFCB15DF58D988B26BFA5EB84315F28C56DD80A4B39AC33AD447CA61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789257506.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_161d000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3f676f77ebc685f171951ce491b873b7b13d19fe58993af1971ed4760bb0c0f7
                                          • Instruction ID: a1e83cdfdc015d1e49e0e85a6a652d96e0c42d7f9b30a2e16774341d10845c5b
                                          • Opcode Fuzzy Hash: 3f676f77ebc685f171951ce491b873b7b13d19fe58993af1971ed4760bb0c0f7
                                          • Instruction Fuzzy Hash: E921AE755093808FDB03CF64D994B15BF71EB46214F28C5EAD8498F6A7C33A980ACB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789145118.000000000160D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0160D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_160d000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: 5d54676e82ed0416b64b96cc62429afb3aec08aa95687bfde9442ef91a798345
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: A911CD72404280CFCB07CF54D9C4B16BF61FB88218F24C6A9DC090B296C336D45ACBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789145118.000000000160D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0160D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_160d000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: a51766db85cf175c3e076121035dc3d01adcce3c0e23670a9c0dbe466c5cf7d7
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 5011DF72404240DFDB06CF84D9C4B56BF71FB94324F24C2A9D9090B296C33AE45ACBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789257506.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_161d000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 3a4def1b3f50210b76a3d4a44054bf0c86877124989581b28ea22e62affe36ff
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: F911BE75504280DFDB02CF54C9C4B55BFA1FB84224F28C6A9D9494B766C33AD40ACB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 04fc043cc6775be6bdb0b02982167a427dcf540965bc12a5f806029eb2d9cefd
                                          • Instruction ID: 1e958340b29f0a6752de1d55c9788dee4b088993d0abbdacc7fedf6abfea6d06
                                          • Opcode Fuzzy Hash: 04fc043cc6775be6bdb0b02982167a427dcf540965bc12a5f806029eb2d9cefd
                                          • Instruction Fuzzy Hash: 62E1D674E002198FDB14DFADC5809AEFBB2FF89304F248169E415AB35AD735A981CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0dc1da68303ce4a32a4d554bcbe560414619523321cbc2bceded3409b595d067
                                          • Instruction ID: 19163fc809a9e23a1f582366437b3d3d538e023cb01a89f1ce9651e2af3970a0
                                          • Opcode Fuzzy Hash: 0dc1da68303ce4a32a4d554bcbe560414619523321cbc2bceded3409b595d067
                                          • Instruction Fuzzy Hash: 1DE1E674E002198FDB14DFADC5809AEFBB2FF89304F248169E915AB35AD734A941CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2873ceab7ce566e4c9a8d1ee3048a3138b677476904351e55e7023f58bf244fa
                                          • Instruction ID: f0c3ee8c72d6917a6c5cac3048c1e501c6f82548cc7a32c5be331700b09c0b84
                                          • Opcode Fuzzy Hash: 2873ceab7ce566e4c9a8d1ee3048a3138b677476904351e55e7023f58bf244fa
                                          • Instruction Fuzzy Hash: 37E1E774E002198FDB14DFADC5809AEFBB2FF89314F248169E415AB35AD735A941CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 159151bbbab33b54500d9bba7fcf9349843f935fb61d3162c4181af1f53ebd11
                                          • Instruction ID: 89251ab2a086f22831e5d76e6777321c79bf9c1565a19c577ed1caf90cf30342
                                          • Opcode Fuzzy Hash: 159151bbbab33b54500d9bba7fcf9349843f935fb61d3162c4181af1f53ebd11
                                          • Instruction Fuzzy Hash: 85E1F874E002198FDB14DFADC5809AEFBB2FF89304F248169E515AB35AD731A981CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a92d900148f4215c33829dc0ac3ae24693dffec7aed3bd52ce267385c1c16b6a
                                          • Instruction ID: a4eebe48a4abc0bcf32673122edd09e1d769efde8601dda41cea7339013a063f
                                          • Opcode Fuzzy Hash: a92d900148f4215c33829dc0ac3ae24693dffec7aed3bd52ce267385c1c16b6a
                                          • Instruction Fuzzy Hash: 23E1D774E001198FDB14DFADC5809AEFBB2FF89304F248169E515AB35ADB35A941CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789761033.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 079a84442fd6ecf98161f7346e22251a4351f1bdacc9acaa8b463a847bb124ac
                                          • Instruction ID: 804507944af3b6526cb1687b17d277e39c31814b3742ba3405d420b328592721
                                          • Opcode Fuzzy Hash: 079a84442fd6ecf98161f7346e22251a4351f1bdacc9acaa8b463a847bb124ac
                                          • Instruction Fuzzy Hash: 09A17C32E0020A8FCF05DFB8D84459EBBB6FF95300B5545AAE906AB265DB31ED55CF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f7a28f3e25616434af0774c5f181d4acb94a65275ac086103974e51f09bc1218
                                          • Instruction ID: 797022335a1f07a11ac86bb44dbff69d80ef140edd0cc45813002d67f4e3eb65
                                          • Opcode Fuzzy Hash: f7a28f3e25616434af0774c5f181d4acb94a65275ac086103974e51f09bc1218
                                          • Instruction Fuzzy Hash: 3D511974E002198FDB15CFA9C9805AEFBF2FF89310F248169D458AB356D7359942CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1789840330.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1710000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6e159c451b3e4e3be1bff982c53d7377eaf3f8093ee104117c68ec5f494b27b3
                                          • Instruction ID: 1084eb74ef822a6bab23eebda0f74ed8866d13446af062f51fc2ce6182891e5a
                                          • Opcode Fuzzy Hash: 6e159c451b3e4e3be1bff982c53d7377eaf3f8093ee104117c68ec5f494b27b3
                                          • Instruction Fuzzy Hash: 10510A74E002198FDB14DFA9D9805AEFBB2BF89304F2481AAD419A7356D7349942CFA1

                                          Execution Graph

                                          Execution Coverage:11.1%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:125
                                          Total number of Limit Nodes:9
                                          execution_graph 40450 18280a0 40451 18280e6 DeleteFileW 40450->40451 40453 182811f 40451->40453 40454 6dd3898 40455 6dd38de GetCurrentProcess 40454->40455 40457 6dd3929 40455->40457 40458 6dd3930 GetCurrentThread 40455->40458 40457->40458 40459 6dd396d GetCurrentProcess 40458->40459 40460 6dd3966 40458->40460 40461 6dd39a3 40459->40461 40460->40459 40462 6dd39cb GetCurrentThreadId 40461->40462 40463 6dd39fc 40462->40463 40464 1820848 40465 182084e 40464->40465 40466 182091b 40465->40466 40472 18214d0 40465->40472 40480 18214bf 40465->40480 40488 182138f 40465->40488 40496 6dd2b90 40465->40496 40500 6dd2b83 40465->40500 40473 18213a6 40472->40473 40474 18214ba 40473->40474 40478 18214d0 2 API calls 40473->40478 40479 18214bf 2 API calls 40473->40479 40504 1828150 40473->40504 40508 1828160 40473->40508 40512 1828858 40473->40512 40474->40465 40478->40473 40479->40473 40481 18213a6 40480->40481 40482 18214ba 40481->40482 40483 1828150 MoveFileA 40481->40483 40484 1828160 MoveFileA 40481->40484 40485 18214d0 2 API calls 40481->40485 40486 18214bf 2 API calls 40481->40486 40487 1828858 GlobalMemoryStatusEx 40481->40487 40482->40465 40483->40481 40484->40481 40485->40481 40486->40481 40487->40481 40490 1821393 40488->40490 40489 18214ba 40489->40465 40490->40489 40491 1828150 MoveFileA 40490->40491 40492 1828160 MoveFileA 40490->40492 40493 1828858 GlobalMemoryStatusEx 40490->40493 40494 18214d0 2 API calls 40490->40494 40495 18214bf 2 API calls 40490->40495 40491->40490 40492->40490 40493->40490 40494->40490 40495->40490 40497 6dd2b9f 40496->40497 40529 6dd2780 40497->40529 40501 6dd2b90 40500->40501 40502 6dd2780 2 API calls 40501->40502 40503 6dd2bc0 40502->40503 40503->40465 40506 1828160 40504->40506 40505 182823a 40505->40473 40506->40505 40517 1827838 40506->40517 40509 182817f 40508->40509 40510 1827838 MoveFileA 40509->40510 40511 182823a 40509->40511 40510->40511 40511->40473 40513 1828862 40512->40513 40516 182887c 40513->40516 40521 6e4fa18 40513->40521 40525 6e4fa0b 40513->40525 40516->40473 40518 1828670 MoveFileA 40517->40518 40520 182870f 40518->40520 40520->40505 40523 6e4fa2d 40521->40523 40522 6e4fc42 40522->40516 40523->40522 40524 6e4fc57 GlobalMemoryStatusEx 40523->40524 40524->40523 40526 6e4fa12 40525->40526 40527 6e4fc42 40526->40527 40528 6e4fc57 GlobalMemoryStatusEx 40526->40528 40527->40516 40528->40526 40531 6dd278b 40529->40531 40533 6dd373c 40531->40533 40532 6dd4135 40532->40532 40534 6dd3747 40533->40534 40535 6dd478c 40534->40535 40537 6dd6408 40534->40537 40535->40532 40539 6dd6429 40537->40539 40538 6dd644d 40538->40535 40539->40538 40543 6dd65b8 40539->40543 40547 6dd6610 40539->40547 40554 6dd65b7 40539->40554 40544 6dd65c5 40543->40544 40545 6dd65fe 40544->40545 40558 6dd5364 40544->40558 40545->40538 40548 6dd65e5 40547->40548 40549 6dd661f 40547->40549 40550 6dd65fe 40548->40550 40551 6dd5364 2 API calls 40548->40551 40552 6dd5398 2 API calls 40549->40552 40553 6dd6670 40549->40553 40550->40538 40551->40550 40552->40553 40553->40553 40555 6dd65b8 40554->40555 40556 6dd65fe 40555->40556 40557 6dd5364 2 API calls 40555->40557 40556->40538 40557->40556 40559 6dd536f 40558->40559 40561 6dd6670 40559->40561 40562 6dd5398 40559->40562 40561->40561 40563 6dd53a3 40562->40563 40569 6dd53a8 40563->40569 40565 6dd66df 40573 6ddbb60 40565->40573 40578 6ddbb78 40565->40578 40566 6dd6719 40566->40561 40572 6dd53b3 40569->40572 40570 6dd7ae8 40570->40565 40571 6dd6408 2 API calls 40571->40570 40572->40570 40572->40571 40574 6ddbb6a 40573->40574 40575 6ddbbb5 40574->40575 40584 6ddbdf0 40574->40584 40587 6ddbde0 40574->40587 40575->40566 40580 6ddbbf5 40578->40580 40581 6ddbba9 40578->40581 40579 6ddbbb5 40579->40566 40580->40566 40581->40579 40582 6ddbdf0 2 API calls 40581->40582 40583 6ddbde0 2 API calls 40581->40583 40582->40580 40583->40580 40591 6ddbe30 40584->40591 40585 6ddbdfa 40585->40575 40588 6ddbdf0 40587->40588 40590 6ddbe30 2 API calls 40588->40590 40589 6ddbdfa 40589->40575 40590->40589 40592 6ddbe51 40591->40592 40593 6ddbe74 40591->40593 40592->40593 40597 6ddc0c9 LoadLibraryExW 40592->40597 40598 6ddc0d8 LoadLibraryExW 40592->40598 40593->40585 40594 6ddc078 GetModuleHandleW 40596 6ddc0a5 40594->40596 40595 6ddbe6c 40595->40593 40595->40594 40596->40585 40597->40595 40598->40595 40599 6dde010 40600 6dde078 CreateWindowExW 40599->40600 40602 6dde134 40600->40602 40603 6dd3ae0 DuplicateHandle 40604 6dd3b76 40603->40604

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 655 6e43488-6e434a9 656 6e434ab-6e434ae 655->656 657 6e434d4-6e434d7 656->657 658 6e434b0-6e434cf 656->658 659 6e434dd-6e434fc 657->659 660 6e43c78-6e43c7a 657->660 658->657 668 6e43515-6e4351f 659->668 669 6e434fe-6e43501 659->669 661 6e43c81-6e43c84 660->661 662 6e43c7c 660->662 661->656 665 6e43c8a-6e43c93 661->665 662->661 672 6e43525-6e43536 call 6e42154 668->672 669->668 670 6e43503-6e43513 669->670 670->672 675 6e4353b-6e43540 672->675 676 6e43542-6e43548 675->676 677 6e4354d-6e4382a 675->677 676->665 698 6e43830-6e438df 677->698 699 6e43c6a-6e43c77 677->699 708 6e438e1-6e43906 698->708 709 6e43908 698->709 711 6e43911-6e43924 call 6e42160 708->711 709->711 714 6e43c51-6e43c5d 711->714 715 6e4392a-6e4394c call 6e4216c 711->715 714->698 716 6e43c63 714->716 715->714 719 6e43952-6e4395c 715->719 716->699 719->714 720 6e43962-6e4396d 719->720 720->714 721 6e43973-6e43a49 720->721 733 6e43a57-6e43a87 721->733 734 6e43a4b-6e43a4d 721->734 738 6e43a95-6e43aa1 733->738 739 6e43a89-6e43a8b 733->739 734->733 740 6e43b01-6e43b05 738->740 741 6e43aa3-6e43aa7 738->741 739->738 742 6e43c42-6e43c4b 740->742 743 6e43b0b-6e43b47 740->743 741->740 744 6e43aa9-6e43ad3 741->744 742->714 742->721 755 6e43b55-6e43b63 743->755 756 6e43b49-6e43b4b 743->756 751 6e43ad5-6e43ad7 744->751 752 6e43ae1-6e43afe call 6e42178 744->752 751->752 752->740 759 6e43b65-6e43b70 755->759 760 6e43b7a-6e43b85 755->760 756->755 759->760 763 6e43b72 759->763 764 6e43b87-6e43b8d 760->764 765 6e43b9d-6e43bae 760->765 763->760 766 6e43b91-6e43b93 764->766 767 6e43b8f 764->767 769 6e43bc6-6e43bd2 765->769 770 6e43bb0-6e43bb6 765->770 766->765 767->765 774 6e43bd4-6e43bda 769->774 775 6e43bea-6e43c3b 769->775 771 6e43bb8 770->771 772 6e43bba-6e43bbc 770->772 771->769 772->769 776 6e43bdc 774->776 777 6e43bde-6e43be0 774->777 775->742 776->775 777->775
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: a4baedd7669ff819382e77d3fa564074b2482eea671a2f7801d0bef5ec3b8be1
                                          • Instruction ID: 35cefeb0ee2e5756d3d72b6bb53e55fbbcf44069101f3257cc5c94a6a0e912aa
                                          • Opcode Fuzzy Hash: a4baedd7669ff819382e77d3fa564074b2482eea671a2f7801d0bef5ec3b8be1
                                          • Instruction Fuzzy Hash: 71322F31E1071A8FCB14EF79D89459DB7B6FFC9300F1096A9D409AB264EB30AD85CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1204 6e47d68-6e47d86 1205 6e47d88-6e47d8b 1204->1205 1206 6e47dac-6e47daf 1205->1206 1207 6e47d8d-6e47da7 1205->1207 1208 6e47db1-6e47dbb 1206->1208 1209 6e47dbc-6e47dbf 1206->1209 1207->1206 1210 6e47dc1-6e47ddd 1209->1210 1211 6e47de2-6e47de5 1209->1211 1210->1211 1213 6e47de7-6e47df5 1211->1213 1214 6e47dfc-6e47dfe 1211->1214 1219 6e47e0e-6e47e24 1213->1219 1222 6e47df7 1213->1222 1215 6e47e05-6e47e08 1214->1215 1216 6e47e00 1214->1216 1215->1205 1215->1219 1216->1215 1224 6e4803f-6e48049 1219->1224 1225 6e47e2a-6e47e33 1219->1225 1222->1214 1226 6e47e39-6e47e56 1225->1226 1227 6e4804a-6e48052 1225->1227 1238 6e4802c-6e48039 1226->1238 1239 6e47e5c-6e47e84 1226->1239 1230 6e48054-6e48056 1227->1230 1231 6e4805a 1227->1231 1235 6e4805e-6e48061 1230->1235 1236 6e48058 1230->1236 1232 6e48062-6e4807f 1231->1232 1233 6e4805b-6e4805d 1231->1233 1237 6e48081-6e48084 1232->1237 1233->1235 1235->1232 1236->1231 1240 6e482b9-6e482bc 1237->1240 1241 6e4808a-6e48099 1237->1241 1238->1224 1238->1225 1239->1238 1254 6e47e8a-6e47e93 1239->1254 1242 6e482be-6e482da 1240->1242 1243 6e482df-6e482e2 1240->1243 1251 6e480b8-6e480fc 1241->1251 1252 6e4809b-6e480b6 1241->1252 1242->1243 1246 6e4838d-6e4838f 1243->1246 1247 6e482e8-6e482f4 1243->1247 1248 6e48396-6e48399 1246->1248 1249 6e48391 1246->1249 1256 6e482ff-6e48301 1247->1256 1248->1237 1255 6e4839f-6e483a8 1248->1255 1249->1248 1265 6e48102-6e48113 1251->1265 1266 6e4828d-6e482a3 1251->1266 1252->1251 1254->1227 1257 6e47e99-6e47eb5 1254->1257 1261 6e48303-6e48309 1256->1261 1262 6e48319-6e4831d 1256->1262 1276 6e4801a-6e48026 1257->1276 1277 6e47ebb-6e47ee5 1257->1277 1267 6e4830d-6e4830f 1261->1267 1268 6e4830b 1261->1268 1263 6e4831f-6e48329 1262->1263 1264 6e4832b 1262->1264 1269 6e48330-6e48332 1263->1269 1264->1269 1278 6e48278-6e48287 1265->1278 1279 6e48119-6e48136 1265->1279 1266->1240 1267->1262 1268->1262 1274 6e48334-6e48337 1269->1274 1275 6e48343-6e4837c 1269->1275 1274->1255 1275->1241 1297 6e48382-6e4838c 1275->1297 1276->1238 1276->1254 1291 6e48010-6e48015 1277->1291 1292 6e47eeb-6e47f13 1277->1292 1278->1265 1278->1266 1279->1278 1288 6e4813c-6e48232 call 6e46590 1279->1288 1343 6e48234-6e4823e 1288->1343 1344 6e48240 1288->1344 1291->1276 1292->1291 1300 6e47f19-6e47f47 1292->1300 1300->1291 1306 6e47f4d-6e47f56 1300->1306 1306->1291 1308 6e47f5c-6e47f8e 1306->1308 1315 6e47f90-6e47f94 1308->1315 1316 6e47f99-6e47fb5 1308->1316 1315->1291 1319 6e47f96 1315->1319 1316->1276 1317 6e47fb7-6e4800e call 6e46590 1316->1317 1317->1276 1319->1316 1345 6e48245-6e48247 1343->1345 1344->1345 1345->1278 1346 6e48249-6e4824e 1345->1346 1347 6e48250-6e4825a 1346->1347 1348 6e4825c 1346->1348 1349 6e48261-6e48263 1347->1349 1348->1349 1349->1278 1350 6e48265-6e48271 1349->1350 1350->1278
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: 3386f46d275999807368eaa56cbb99fcc4ff29965789f14eef1786b5865a2d80
                                          • Instruction ID: 9150ef875cdd883c40a897e6fb924b501f3352a105b57fcb1ec699444922ed85
                                          • Opcode Fuzzy Hash: 3386f46d275999807368eaa56cbb99fcc4ff29965789f14eef1786b5865a2d80
                                          • Instruction Fuzzy Hash: 32029E30B102058FDB54EB79E5946AEB7E2FF84304F148929D809DB395EB35EC82CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1352 6e45cd7-6e45cf8 1353 6e45cfa-6e45cfd 1352->1353 1354 6e45d34-6e45d37 1353->1354 1355 6e45cff-6e45d1e 1353->1355 1356 6e45d40-6e45d43 1354->1356 1357 6e45d39-6e45d3b 1354->1357 1370 6e45d20 1355->1370 1371 6e45d23-6e45d29 1355->1371 1358 6e45d45-6e45d4a 1356->1358 1359 6e45d61-6e45d64 1356->1359 1357->1356 1361 6e45d4c 1358->1361 1362 6e45d4f-6e45d5c 1358->1362 1363 6e45d66-6e45d6c 1359->1363 1364 6e45d73-6e45d76 1359->1364 1361->1362 1362->1359 1363->1355 1365 6e45d6e 1363->1365 1364->1363 1366 6e45d78-6e45d7b 1364->1366 1365->1364 1368 6e45d82-6e45d84 1366->1368 1369 6e45d7d-6e45d7f 1366->1369 1373 6e45d86 1368->1373 1374 6e45d8b-6e45d8e 1368->1374 1369->1368 1370->1371 1375 6e45d9d-6e45daa 1371->1375 1376 6e45d2b-6e45d2f 1371->1376 1373->1374 1374->1353 1377 6e45d94-6e45d9c 1374->1377 1379 6e45db2 1375->1379 1380 6e45dac-6e45dad 1375->1380 1376->1354 1381 6e45db4-6e45db9 1379->1381 1382 6e45dba-6e45dda 1379->1382 1380->1379 1381->1382 1383 6e45ddc-6e45ddf 1382->1383 1384 6e45de1-6e45de8 1383->1384 1385 6e45def-6e45df2 1383->1385 1388 6e45e40-6e45e47 1384->1388 1389 6e45dea 1384->1389 1386 6e45df4-6e45dfd 1385->1386 1387 6e45e00-6e45e03 1385->1387 1390 6e45e05-6e45e13 1387->1390 1391 6e45e18-6e45e1b 1387->1391 1392 6e45f95-6e45fa8 1388->1392 1393 6e45e4d-6e45e94 1388->1393 1389->1385 1390->1391 1394 6e45e37-6e45e3a 1391->1394 1395 6e45e1d-6e45e32 1391->1395 1409 6e45e96-6e45ea5 1393->1409 1394->1388 1398 6e45fb4-6e45fb6 1394->1398 1395->1394 1401 6e45fbd-6e45fc0 1398->1401 1402 6e45fb8 1398->1402 1401->1383 1404 6e45fc6-6e45fd0 1401->1404 1402->1401 1411 6e45fd3-6e45fe2 1409->1411 1412 6e45eab-6e45ec1 1409->1412 1415 6e45fe4-6e45fe9 1411->1415 1416 6e45fea-6e46012 1411->1416 1412->1411 1417 6e45ec7-6e45ecf 1412->1417 1415->1416 1422 6e46014-6e46017 1416->1422 1417->1409 1419 6e45ed1-6e45ed7 1417->1419 1420 6e45f37-6e45f87 call 6e44b08 1419->1420 1421 6e45ed9-6e45edc 1419->1421 1471 6e45f92 1420->1471 1472 6e45f89 1420->1472 1421->1411 1423 6e45ee2-6e45eed 1421->1423 1424 6e4602f-6e46032 1422->1424 1425 6e46019-6e4602a 1422->1425 1423->1411 1426 6e45ef3-6e45efd 1423->1426 1427 6e46034-6e46040 1424->1427 1428 6e46045-6e46048 1424->1428 1425->1424 1426->1411 1431 6e45f03-6e45f0d 1426->1431 1427->1428 1432 6e4604e-6e46055 1428->1432 1433 6e460d9-6e460dc 1428->1433 1431->1411 1434 6e45f13-6e45f28 1431->1434 1436 6e4610b-6e4611e 1432->1436 1437 6e4605b-6e460c6 1432->1437 1439 6e460de-6e460ea 1433->1439 1440 6e460ef-6e460f2 1433->1440 1434->1411 1443 6e45f2e-6e45f35 1434->1443 1480 6e460cf-6e460d6 1437->1480 1439->1440 1441 6e460f4-6e460fb 1440->1441 1442 6e46106-6e46109 1440->1442 1441->1432 1445 6e46101 1441->1445 1442->1436 1446 6e46121-6e46124 1442->1446 1443->1420 1443->1421 1445->1442 1450 6e46126-6e46145 1446->1450 1451 6e46162-6e46165 1446->1451 1470 6e461c1-6e461cb 1450->1470 1452 6e46167-6e4617a 1451->1452 1453 6e4617f-6e46182 1451->1453 1452->1453 1456 6e46184-6e46193 1453->1456 1457 6e46198-6e4619b 1453->1457 1456->1457 1462 6e4619d-6e461aa 1457->1462 1463 6e461af-6e461b1 1457->1463 1462->1463 1467 6e461b3 1463->1467 1468 6e461b8-6e461bb 1463->1468 1467->1468 1468->1422 1468->1470 1471->1392 1472->1471
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPcq$\Ocq
                                          • API String ID: 0-2802517751
                                          • Opcode ID: ad706cabb633990d7039789a0a1105ce73d81a2cb83b26708dff5bbfce997d73
                                          • Instruction ID: 02dd29856629c26a339158a8ddc3e73f45f98341d2d0c901c3b29b11e04c0505
                                          • Opcode Fuzzy Hash: ad706cabb633990d7039789a0a1105ce73d81a2cb83b26708dff5bbfce997d73
                                          • Instruction Fuzzy Hash: 09E10631B102148FDB64AB78E88476EBBF2EF89314F25846AE44ADB391CB35DC45C791
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4c02e172fad627072b5c45db959f95b0b9346cce281d7e48ec6e3c246dc7ee1c
                                          • Instruction ID: 95b2b1f65329c8aa5cca9896a519a80d7393426880ce0c24e4975a7db441c1de
                                          • Opcode Fuzzy Hash: 4c02e172fad627072b5c45db959f95b0b9346cce281d7e48ec6e3c246dc7ee1c
                                          • Instruction Fuzzy Hash: F562AF34B002059FDB54EB79E584AADB7F2EF85318F149469E40ADB390DB35EC86CB81
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cdc1d4ffb94429237dc094c0773ea6af8059be03e2605de82d57f2b86d40e177
                                          • Instruction ID: 8ff0e8f9da6f24573dee397f017475a37f3ccc7ee6e1b019b49c913da098cad2
                                          • Opcode Fuzzy Hash: cdc1d4ffb94429237dc094c0773ea6af8059be03e2605de82d57f2b86d40e177
                                          • Instruction Fuzzy Hash: B532A134B012099FDB50EB78E484BAEB7B2FB88714F209525E505EB354DB35EC86CB91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d8fd69733f88ae197548ab1607e5aee8d3b1409aba2bec782f554cc7d310fd79
                                          • Instruction ID: d7c277e56571283fb615ef2eac1a7cd03143d9600f390006835c9b346e097221
                                          • Opcode Fuzzy Hash: d8fd69733f88ae197548ab1607e5aee8d3b1409aba2bec782f554cc7d310fd79
                                          • Instruction Fuzzy Hash: FD12F231F103059BDB20EB74E8846AEB7B2EB85314F248879D95ADB384DB34DC46CB91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 71e2699f2d446b15fb97a7ff639dc7e9ea20d55be018b123c6f92b532e391195
                                          • Instruction ID: 94eac329f09bc92be0b2a451c65a8a73ef84b7c9d28477529c06e7c567697aa0
                                          • Opcode Fuzzy Hash: 71e2699f2d446b15fb97a7ff639dc7e9ea20d55be018b123c6f92b532e391195
                                          • Instruction Fuzzy Hash: FA226E30E102098FDF64EB79E4847ADB7B2EB89314F249826E449DB395DB35DC82CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 530 6e4acb8-6e4acd6 532 6e4acd8-6e4acdb 530->532 533 6e4acf5-6e4acf8 532->533 534 6e4acdd-6e4acf0 532->534 535 6e4ad0c-6e4ad0f 533->535 536 6e4acfa-6e4ad07 533->536 534->533 538 6e4ad11-6e4ad1a 535->538 539 6e4ad29-6e4ad2c 535->539 536->535 541 6e4ad20-6e4ad24 538->541 542 6e4aeef-6e4af26 538->542 543 6e4ad2e-6e4ad4a 539->543 544 6e4ad4f-6e4ad52 539->544 541->539 554 6e4af28-6e4af2b 542->554 543->544 545 6e4ad54-6e4ad5d 544->545 546 6e4ad62-6e4ad65 544->546 545->546 547 6e4aed5-6e4aede 546->547 548 6e4ad6b-6e4ad6e 546->548 547->538 551 6e4aee4-6e4aeee 547->551 552 6e4ad70-6e4ad75 548->552 553 6e4ad78-6e4ad7b 548->553 552->553 558 6e4ad8c-6e4ad8e 553->558 559 6e4ad7d-6e4ad81 553->559 556 6e4af2d-6e4af31 554->556 557 6e4af38-6e4af3b 554->557 560 6e4af51-6e4af8c 556->560 561 6e4af33 556->561 562 6e4af3d-6e4af47 557->562 563 6e4af48-6e4af4b 557->563 565 6e4ad95-6e4ad98 558->565 566 6e4ad90 558->566 559->551 564 6e4ad87 559->564 572 6e4af92-6e4af9e 560->572 573 6e4b17f-6e4b192 560->573 561->557 563->560 567 6e4b1b4-6e4b1b7 563->567 564->558 565->532 568 6e4ad9e-6e4adc2 565->568 566->565 570 6e4b1b9-6e4b1d5 567->570 571 6e4b1da-6e4b1dd 567->571 585 6e4aed2 568->585 586 6e4adc8-6e4add7 568->586 570->571 574 6e4b1ec-6e4b1ee 571->574 575 6e4b1df call 6e4b211 571->575 587 6e4afa0-6e4afb9 572->587 588 6e4afbe-6e4b002 572->588 579 6e4b194 573->579 577 6e4b1f5-6e4b1f8 574->577 578 6e4b1f0 574->578 581 6e4b1e5-6e4b1e7 575->581 577->554 583 6e4b1fe-6e4b208 577->583 578->577 579->567 581->574 585->547 592 6e4adef-6e4ae2a call 6e46590 586->592 593 6e4add9-6e4addf 586->593 587->579 604 6e4b004-6e4b016 588->604 605 6e4b01e-6e4b05d 588->605 610 6e4ae42-6e4ae59 592->610 611 6e4ae2c-6e4ae32 592->611 594 6e4ade1 593->594 595 6e4ade3-6e4ade5 593->595 594->592 595->592 604->605 612 6e4b144-6e4b159 605->612 613 6e4b063-6e4b13e call 6e46590 605->613 623 6e4ae71-6e4ae82 610->623 624 6e4ae5b-6e4ae61 610->624 614 6e4ae34 611->614 615 6e4ae36-6e4ae38 611->615 612->573 613->612 614->610 615->610 630 6e4ae84-6e4ae8a 623->630 631 6e4ae9a-6e4aecb 623->631 626 6e4ae65-6e4ae67 624->626 627 6e4ae63 624->627 626->623 627->623 632 6e4ae8c 630->632 633 6e4ae8e-6e4ae90 630->633 631->585 632->631 633->631
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: 4a19cf7c0b5c1effa878d732bcac3be3110de24cdfe04afdf9e652a3126e62b3
                                          • Instruction ID: cab3592c798bfe7797d35077a6cb427b7fed81384bb76fa87ef752d204cb1d55
                                          • Opcode Fuzzy Hash: 4a19cf7c0b5c1effa878d732bcac3be3110de24cdfe04afdf9e652a3126e62b3
                                          • Instruction Fuzzy Hash: 1CE15D30F1030A8FDB65EF79E4846AEB7B2EB84314F209529D415AB358DB35D886CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 785 6dd388b-6dd3927 GetCurrentProcess 789 6dd3929-6dd392f 785->789 790 6dd3930-6dd3964 GetCurrentThread 785->790 789->790 791 6dd396d-6dd39a1 GetCurrentProcess 790->791 792 6dd3966-6dd396c 790->792 794 6dd39aa-6dd39c5 call 6dd3a71 791->794 795 6dd39a3-6dd39a9 791->795 792->791 798 6dd39cb-6dd39fa GetCurrentThreadId 794->798 795->794 799 6dd39fc-6dd3a02 798->799 800 6dd3a03-6dd3a65 798->800 799->800
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 06DD3916
                                          • GetCurrentThread.KERNEL32 ref: 06DD3953
                                          • GetCurrentProcess.KERNEL32 ref: 06DD3990
                                          • GetCurrentThreadId.KERNEL32 ref: 06DD39E9
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3031912350.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6dd0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: bcd57ac229907dd60f0defb5400ec93941d57d826fef2f9682c6dfd639ff34ad
                                          • Instruction ID: ce38e598a1aa5c656d9e21c93a08cfec468f622d8f7a4d053c966fe3f4bdc903
                                          • Opcode Fuzzy Hash: bcd57ac229907dd60f0defb5400ec93941d57d826fef2f9682c6dfd639ff34ad
                                          • Instruction Fuzzy Hash: 355176B0D003498FDB54EFAAD948B9EBBF1AF49304F248459D059AB360DB349984CF66

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 807 6dd3898-6dd3927 GetCurrentProcess 811 6dd3929-6dd392f 807->811 812 6dd3930-6dd3964 GetCurrentThread 807->812 811->812 813 6dd396d-6dd39a1 GetCurrentProcess 812->813 814 6dd3966-6dd396c 812->814 816 6dd39aa-6dd39c5 call 6dd3a71 813->816 817 6dd39a3-6dd39a9 813->817 814->813 820 6dd39cb-6dd39fa GetCurrentThreadId 816->820 817->816 821 6dd39fc-6dd3a02 820->821 822 6dd3a03-6dd3a65 820->822 821->822
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 06DD3916
                                          • GetCurrentThread.KERNEL32 ref: 06DD3953
                                          • GetCurrentProcess.KERNEL32 ref: 06DD3990
                                          • GetCurrentThreadId.KERNEL32 ref: 06DD39E9
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3031912350.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6dd0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: a5b5f633beabf2fa862fb5c2375d1619a2a30363ec6dbccd419537e3020d489c
                                          • Instruction ID: 5aeb40651a80159ae640ccaf5021941fb0fe3f9b2aeb2b98b78bb9f2aaac71f6
                                          • Opcode Fuzzy Hash: a5b5f633beabf2fa862fb5c2375d1619a2a30363ec6dbccd419537e3020d489c
                                          • Instruction Fuzzy Hash: F45168B0D003098FDB54EFAAD548B9EBBF1EB48314F248459D059A7360DB34A984CF66

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 829 6e49140-6e49165 830 6e49167-6e4916a 829->830 831 6e49170-6e49185 830->831 832 6e49a28-6e49a2b 830->832 838 6e49187-6e4918d 831->838 839 6e4919d-6e491b3 831->839 833 6e49a51-6e49a53 832->833 834 6e49a2d-6e49a4c 832->834 836 6e49a55 833->836 837 6e49a5a-6e49a5d 833->837 834->833 836->837 837->830 841 6e49a63-6e49a6d 837->841 842 6e49191-6e49193 838->842 843 6e4918f 838->843 846 6e491be-6e491c0 839->846 842->839 843->839 847 6e491c2-6e491c8 846->847 848 6e491d8-6e49249 846->848 849 6e491cc-6e491ce 847->849 850 6e491ca 847->850 859 6e49275-6e49291 848->859 860 6e4924b-6e4926e 848->860 849->848 850->848 865 6e49293-6e492b6 859->865 866 6e492bd-6e492d8 859->866 860->859 865->866 871 6e49303-6e4931e 866->871 872 6e492da-6e492fc 866->872 877 6e49320-6e4933c 871->877 878 6e49343-6e49351 871->878 872->871 877->878 879 6e49361-6e493db 878->879 880 6e49353-6e4935c 878->880 886 6e493dd-6e493fb 879->886 887 6e49428-6e4943d 879->887 880->841 891 6e49417-6e49426 886->891 892 6e493fd-6e4940c 886->892 887->832 891->886 891->887 892->891
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: 704740ccf302f01acaf901128fdcf0d69ffa101c042af661aba8193be6da60c1
                                          • Instruction ID: 855aaeb219943fbd2f0659ba8c458130af757120308940d3f493f9d792a40f3b
                                          • Opcode Fuzzy Hash: 704740ccf302f01acaf901128fdcf0d69ffa101c042af661aba8193be6da60c1
                                          • Instruction Fuzzy Hash: E8914030F0021A9FDB54DB79E9547AFB3F6EBC8204F108569C809EB345EB749C868B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 895 6e4d328-6e4d343 896 6e4d345-6e4d348 895->896 897 6e4d391-6e4d394 896->897 898 6e4d34a-6e4d38c 896->898 899 6e4d396-6e4d3a5 897->899 900 6e4d3dd-6e4d3e0 897->900 898->897 904 6e4d3b4-6e4d3c0 899->904 905 6e4d3a7-6e4d3ac 899->905 902 6e4d3e2-6e4d3e4 900->902 903 6e4d3ef-6e4d3f2 900->903 906 6e4d811 902->906 907 6e4d3ea 902->907 908 6e4d3f4-6e4d40a 903->908 909 6e4d40f-6e4d412 903->909 910 6e4dd45-6e4dd7e 904->910 911 6e4d3c6-6e4d3d8 904->911 905->904 913 6e4d814-6e4d820 906->913 907->903 908->909 914 6e4d414-6e4d456 909->914 915 6e4d45b-6e4d45e 909->915 944 6e4dd80-6e4dd83 910->944 911->900 921 6e4d826-6e4db13 913->921 922 6e4d56c-6e4d57b 913->922 914->915 918 6e4d4a7-6e4d4aa 915->918 919 6e4d460-6e4d4a2 915->919 925 6e4d4ac-6e4d4ae 918->925 926 6e4d4b9-6e4d4bc 918->926 919->918 1109 6e4db19-6e4db1f 921->1109 1110 6e4dd3a-6e4dd44 921->1110 923 6e4d57d-6e4d582 922->923 924 6e4d58a-6e4d596 922->924 923->924 924->910 931 6e4d59c-6e4d5ae 924->931 929 6e4d4b4 925->929 930 6e4d6cf-6e4d6d8 925->930 932 6e4d505-6e4d508 926->932 933 6e4d4be-6e4d500 926->933 929->926 941 6e4d6e7-6e4d6f3 930->941 942 6e4d6da-6e4d6df 930->942 956 6e4d5b3-6e4d5b6 931->956 939 6e4d551-6e4d554 932->939 940 6e4d50a-6e4d54c 932->940 933->932 939->913 952 6e4d55a-6e4d55d 939->952 940->939 947 6e4d804-6e4d809 941->947 948 6e4d6f9-6e4d70d 941->948 942->941 950 6e4dd85 call 6e4de9d 944->950 951 6e4dd92-6e4dd95 944->951 947->906 948->906 979 6e4d713-6e4d725 948->979 966 6e4dd8b-6e4dd8d 950->966 958 6e4dd97-6e4ddb3 951->958 959 6e4ddb8-6e4ddbb 951->959 954 6e4d567-6e4d56a 952->954 955 6e4d55f-6e4d564 952->955 954->922 954->956 955->954 963 6e4d5ff-6e4d602 956->963 964 6e4d5b8-6e4d5fa 956->964 958->959 968 6e4ddbd-6e4dde9 959->968 969 6e4ddee-6e4ddf0 959->969 974 6e4d604-6e4d646 963->974 975 6e4d64b-6e4d64e 963->975 964->963 966->951 968->969 977 6e4ddf7-6e4ddfa 969->977 978 6e4ddf2 969->978 974->975 981 6e4d697-6e4d69a 975->981 982 6e4d650-6e4d692 975->982 977->944 986 6e4ddfc-6e4de0b 977->986 978->977 994 6e4d727-6e4d72d 979->994 995 6e4d749-6e4d74b 979->995 987 6e4d69c-6e4d6b8 981->987 988 6e4d6bd-6e4d6bf 981->988 982->981 1009 6e4de72-6e4de87 986->1009 1010 6e4de0d-6e4de70 call 6e46590 986->1010 987->988 1000 6e4d6c6-6e4d6c9 988->1000 1001 6e4d6c1 988->1001 1004 6e4d731-6e4d73d 994->1004 1005 6e4d72f 994->1005 1013 6e4d755-6e4d761 995->1013 1000->896 1000->930 1001->1000 1011 6e4d73f-6e4d747 1004->1011 1005->1011 1028 6e4de88 1009->1028 1010->1009 1011->1013 1031 6e4d763-6e4d76d 1013->1031 1032 6e4d76f 1013->1032 1028->1028 1035 6e4d774-6e4d776 1031->1035 1032->1035 1035->906 1040 6e4d77c-6e4d798 call 6e46590 1035->1040 1050 6e4d7a7-6e4d7b3 1040->1050 1051 6e4d79a-6e4d79f 1040->1051 1050->947 1053 6e4d7b5-6e4d802 1050->1053 1051->1050 1053->906 1111 6e4db21-6e4db26 1109->1111 1112 6e4db2e-6e4db37 1109->1112 1111->1112 1112->910 1113 6e4db3d-6e4db50 1112->1113 1115 6e4db56-6e4db5c 1113->1115 1116 6e4dd2a-6e4dd34 1113->1116 1117 6e4db5e-6e4db63 1115->1117 1118 6e4db6b-6e4db74 1115->1118 1116->1109 1116->1110 1117->1118 1118->910 1119 6e4db7a-6e4db9b 1118->1119 1122 6e4db9d-6e4dba2 1119->1122 1123 6e4dbaa-6e4dbb3 1119->1123 1122->1123 1123->910 1124 6e4dbb9-6e4dbd6 1123->1124 1124->1116 1127 6e4dbdc-6e4dbe2 1124->1127 1127->910 1128 6e4dbe8-6e4dc01 1127->1128 1130 6e4dc07-6e4dc2e 1128->1130 1131 6e4dd1d-6e4dd24 1128->1131 1130->910 1134 6e4dc34-6e4dc3e 1130->1134 1131->1116 1131->1127 1134->910 1135 6e4dc44-6e4dc5b 1134->1135 1137 6e4dc5d-6e4dc68 1135->1137 1138 6e4dc6a-6e4dc85 1135->1138 1137->1138 1138->1131 1143 6e4dc8b-6e4dca4 call 6e46590 1138->1143 1147 6e4dca6-6e4dcab 1143->1147 1148 6e4dcb3-6e4dcbc 1143->1148 1147->1148 1148->910 1149 6e4dcc2-6e4dd16 1148->1149 1149->1131
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q
                                          • API String ID: 0-831282457
                                          • Opcode ID: 14324c7bf5761aaa49e31ef432f73386a749a443480fbca913035754d3553ee0
                                          • Instruction ID: a50eaa69a1de7836dbdba5b60e36c0fa1f761b52aa4c7f93da1f8403aa3355af
                                          • Opcode Fuzzy Hash: 14324c7bf5761aaa49e31ef432f73386a749a443480fbca913035754d3553ee0
                                          • Instruction Fuzzy Hash: FF622134B002058FCB55EB78E984A5EB7B2FF84344F209A69D0099F359DB75ED86CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1157 6e44b90-6e44bb4 1158 6e44bb6-6e44bb9 1157->1158 1159 6e44bbf-6e44cb7 1158->1159 1160 6e45298-6e4529b 1158->1160 1180 6e44cbd-6e44d0a call 6e45439 1159->1180 1181 6e44d3a-6e44d41 1159->1181 1161 6e452bc-6e452be 1160->1161 1162 6e4529d-6e452b7 1160->1162 1163 6e452c5-6e452c8 1161->1163 1164 6e452c0 1161->1164 1162->1161 1163->1158 1167 6e452ce-6e452db 1163->1167 1164->1163 1194 6e44d10-6e44d2c 1180->1194 1182 6e44dc5-6e44dce 1181->1182 1183 6e44d47-6e44db7 1181->1183 1182->1167 1200 6e44dc2 1183->1200 1201 6e44db9 1183->1201 1197 6e44d37-6e44d38 1194->1197 1198 6e44d2e 1194->1198 1197->1181 1198->1197 1200->1182 1201->1200
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fcq$XPcq$\Ocq
                                          • API String ID: 0-3575482020
                                          • Opcode ID: 323ee261e6bbac31008a75ea1a10e8978547ca07a069e91200da234e57951077
                                          • Instruction ID: f0c17badbbd50d5416974ae8acc37e7e05f46158d8f7be9653afb1adf4b33e6f
                                          • Opcode Fuzzy Hash: 323ee261e6bbac31008a75ea1a10e8978547ca07a069e91200da234e57951077
                                          • Instruction Fuzzy Hash: E1616170F002099FEB54AFB9D4587AEBAF7FB88700F20842AE509AB395DE754C418F55

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1613 6e49130-6e49132 1614 6e49134-6e49136 1613->1614 1615 6e4913a 1613->1615 1616 6e4913e-6e49141 1614->1616 1617 6e49138 1614->1617 1618 6e49142-6e49165 1615->1618 1619 6e4913c-6e4913d 1615->1619 1616->1618 1617->1615 1620 6e49167-6e4916a 1618->1620 1619->1616 1621 6e49170-6e49185 1620->1621 1622 6e49a28-6e49a2b 1620->1622 1628 6e49187-6e4918d 1621->1628 1629 6e4919d-6e491b3 1621->1629 1623 6e49a51-6e49a53 1622->1623 1624 6e49a2d-6e49a4c 1622->1624 1626 6e49a55 1623->1626 1627 6e49a5a-6e49a5d 1623->1627 1624->1623 1626->1627 1627->1620 1631 6e49a63-6e49a6d 1627->1631 1632 6e49191-6e49193 1628->1632 1633 6e4918f 1628->1633 1636 6e491be-6e491c0 1629->1636 1632->1629 1633->1629 1637 6e491c2-6e491c8 1636->1637 1638 6e491d8-6e49249 1636->1638 1639 6e491cc-6e491ce 1637->1639 1640 6e491ca 1637->1640 1649 6e49275-6e49291 1638->1649 1650 6e4924b-6e4926e 1638->1650 1639->1638 1640->1638 1655 6e49293-6e492b6 1649->1655 1656 6e492bd-6e492d8 1649->1656 1650->1649 1655->1656 1661 6e49303-6e4931e 1656->1661 1662 6e492da-6e492fc 1656->1662 1667 6e49320-6e4933c 1661->1667 1668 6e49343-6e49351 1661->1668 1662->1661 1667->1668 1669 6e49361-6e493db 1668->1669 1670 6e49353-6e4935c 1668->1670 1676 6e493dd-6e493fb 1669->1676 1677 6e49428-6e4943d 1669->1677 1670->1631 1681 6e49417-6e49426 1676->1681 1682 6e493fd-6e4940c 1676->1682 1677->1622 1681->1676 1681->1677 1682->1681
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: 58374e3bf17edd1da580150e202d943a9b64ce347fd871e8782b0d33e66804a1
                                          • Instruction ID: 5185bf03a190e09631b248027c74c80e8c0b917483a2fb33038dcf3ba9ba69ee
                                          • Opcode Fuzzy Hash: 58374e3bf17edd1da580150e202d943a9b64ce347fd871e8782b0d33e66804a1
                                          • Instruction Fuzzy Hash: 09516234F002059FDB54DB79E854BAFB3FAEBC8604F108869C809EB385DA74DC428B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1685 6ddbe30-6ddbe4f 1686 6ddbe7b-6ddbe7f 1685->1686 1687 6ddbe51-6ddbe5e call 6ddb1e0 1685->1687 1689 6ddbe81-6ddbe8b 1686->1689 1690 6ddbe93-6ddbed4 1686->1690 1693 6ddbe74 1687->1693 1694 6ddbe60 1687->1694 1689->1690 1696 6ddbed6-6ddbede 1690->1696 1697 6ddbee1-6ddbeef 1690->1697 1693->1686 1745 6ddbe66 call 6ddc0c9 1694->1745 1746 6ddbe66 call 6ddc0d8 1694->1746 1696->1697 1698 6ddbef1-6ddbef6 1697->1698 1699 6ddbf13-6ddbf15 1697->1699 1701 6ddbef8-6ddbeff call 6ddb1ec 1698->1701 1702 6ddbf01 1698->1702 1704 6ddbf18-6ddbf1f 1699->1704 1700 6ddbe6c-6ddbe6e 1700->1693 1703 6ddbfb0-6ddc02e 1700->1703 1706 6ddbf03-6ddbf11 1701->1706 1702->1706 1738 6ddc036-6ddc070 1703->1738 1739 6ddc030-6ddc035 1703->1739 1707 6ddbf2c-6ddbf33 1704->1707 1708 6ddbf21-6ddbf29 1704->1708 1706->1704 1709 6ddbf35-6ddbf3d 1707->1709 1710 6ddbf40-6ddbf49 call 6dd439c 1707->1710 1708->1707 1709->1710 1716 6ddbf4b-6ddbf53 1710->1716 1717 6ddbf56-6ddbf5b 1710->1717 1716->1717 1718 6ddbf5d-6ddbf64 1717->1718 1719 6ddbf79-6ddbf7d 1717->1719 1718->1719 1721 6ddbf66-6ddbf76 call 6dd9d48 call 6ddb1fc 1718->1721 1747 6ddbf80 call 6ddc398 1719->1747 1748 6ddbf80 call 6ddc38b 1719->1748 1721->1719 1724 6ddbf83-6ddbf86 1726 6ddbfa9-6ddbfaf 1724->1726 1727 6ddbf88-6ddbfa6 1724->1727 1727->1726 1740 6ddc078-6ddc0a3 GetModuleHandleW 1738->1740 1741 6ddc072-6ddc075 1738->1741 1739->1738 1742 6ddc0ac-6ddc0c0 1740->1742 1743 6ddc0a5-6ddc0ab 1740->1743 1741->1740 1743->1742 1745->1700 1746->1700 1747->1724 1748->1724
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 06DDC096
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3031912350.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6dd0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 56bbe8e9227addda5e4068832ff42b9d7629f055ea16ade4d964b9631144dc6a
                                          • Instruction ID: 0a3d558cc0f55b5ff709c83f41615e4f2a2e7019a4959ca1163969a98a43a27e
                                          • Opcode Fuzzy Hash: 56bbe8e9227addda5e4068832ff42b9d7629f055ea16ade4d964b9631144dc6a
                                          • Instruction Fuzzy Hash: 828148B0A00B058FD764EF79D4447AABBF5FF88244F00892AD09AD7A50D775E945CB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1749 182f573-182f58b 1750 182f5b5-182f5d4 call 182edcc 1749->1750 1751 182f58d-182f5b4 1749->1751 1756 182f5d6-182f5d9 1750->1756 1757 182f5da-182f639 1750->1757 1764 182f63b-182f63e 1757->1764 1765 182f63f-182f6cc GlobalMemoryStatusEx 1757->1765 1768 182f6d5-182f6fd 1765->1768 1769 182f6ce-182f6d4 1765->1769 1769->1768
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.2978322098.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1820000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4cbf714af23211754b083bc2227ee0036e7f064119041bf806c516818d1161c4
                                          • Instruction ID: d0a437d854853f5bc6a1663bf77ea67e9b942c0d826b0155c36c44c8661a56fc
                                          • Opcode Fuzzy Hash: 4cbf714af23211754b083bc2227ee0036e7f064119041bf806c516818d1161c4
                                          • Instruction Fuzzy Hash: E5415571D043A99FC715DF79C80029ABFF0EF8A310F1485AAE588E7291DB349985CBE1
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06DDE122
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3031912350.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6dd0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 6ae9a1fcfe563a2f8f79bc7a8b3692dfc78661b778218ca1064415e85ad71922
                                          • Instruction ID: ff8451a23c0a1929a69b387cf9f64501ee9245c438862d8dfb2d3b1292450b16
                                          • Opcode Fuzzy Hash: 6ae9a1fcfe563a2f8f79bc7a8b3692dfc78661b778218ca1064415e85ad71922
                                          • Instruction Fuzzy Hash: B651C2B1D00319DFDB14DFAAC984ADEBBB5FF48310F24812AE819AB210D7759985CF91
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06DDE122
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3031912350.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6dd0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: a529a72e8c035323116c8db2eb44dd112bbf3cbaaa52310f0b49a2d4bebb7c32
                                          • Instruction ID: e0c7e3495dbd4ac3baf2189b6f86713da3d3250fc26df06f8582c9fef3483d9b
                                          • Opcode Fuzzy Hash: a529a72e8c035323116c8db2eb44dd112bbf3cbaaa52310f0b49a2d4bebb7c32
                                          • Instruction Fuzzy Hash: E141B0B1D00319DFDB14DFAAC984ADEBBB5FF48310F24852AE818AB210D7759985CF91
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06DD3B67
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3031912350.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6dd0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 61bebfe642227ad163d84ba27930bb42e2f314a96cbc1baf3ed0d86400884380
                                          • Instruction ID: 5454a23567e83a4d02144f23b857b6c9c9785e7b46d1f6de3c83cf0bc5c944f0
                                          • Opcode Fuzzy Hash: 61bebfe642227ad163d84ba27930bb42e2f314a96cbc1baf3ed0d86400884380
                                          • Instruction Fuzzy Hash: B521D4B5900218DFDB10CFAAD984ADEFBF4FB48310F24842AE958A7350D375A954CFA5
                                          APIs
                                          • MoveFileA.KERNEL32(?,00000000,?,?), ref: 01828700
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.2978322098.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1820000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: FileMove
                                          • String ID:
                                          • API String ID: 3562171763-0
                                          • Opcode ID: 2894f4739d7ef053df0e82ab18a3fd921f68833f6e1981b35317751095f9d651
                                          • Instruction ID: a60fbee77cf0613fb35cfe4b8f898e7e1dcb5ef566e2faf13a9962ef5aea68ab
                                          • Opcode Fuzzy Hash: 2894f4739d7ef053df0e82ab18a3fd921f68833f6e1981b35317751095f9d651
                                          • Instruction Fuzzy Hash: B72116B6C012199FCB10CF99D984ADEFFF5FB88310F24845AE918AB215C7759A44CFA4
                                          APIs
                                          • MoveFileA.KERNEL32(?,00000000,?,?), ref: 01828700
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.2978322098.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1820000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: FileMove
                                          • String ID:
                                          • API String ID: 3562171763-0
                                          • Opcode ID: d1ebd1874d5b3c421ebcd328b70d661cef13eeca60d7c16570b293ed045d49ee
                                          • Instruction ID: 2fbad684952bcca347f791ca6a913b634b24702736237ba06b25c3fd0536b891
                                          • Opcode Fuzzy Hash: d1ebd1874d5b3c421ebcd328b70d661cef13eeca60d7c16570b293ed045d49ee
                                          • Instruction Fuzzy Hash: AD2127B6C012199FCB10CF99D984ADEFBF1FB88310F10805AE918BB205C3759A40CFA4
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06DD3B67
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3031912350.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6dd0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: e364190519a6e027d108a8a4a9349be36545b485772fef639379bc4ffcda4f93
                                          • Instruction ID: 030daf0971aa9a7382e61ce66107c2e189587b067811bffbc4561ee2fe4e04a3
                                          • Opcode Fuzzy Hash: e364190519a6e027d108a8a4a9349be36545b485772fef639379bc4ffcda4f93
                                          • Instruction Fuzzy Hash: 1321E4B59002189FDB10CFAAD984ADEBBF4EB48310F14801AE918A7350C375A944CFA5
                                          APIs
                                          • DeleteFileW.KERNELBASE(00000000), ref: 01828110
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.2978322098.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1820000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: ae2f90fb33cc5c959dafdd90700069562394b681c552510357e6bb7d8be13ea3
                                          • Instruction ID: 81b65c4701381d1f1183ab69a99fee229dca388c5c00a4638ca7e69931c0eea1
                                          • Opcode Fuzzy Hash: ae2f90fb33cc5c959dafdd90700069562394b681c552510357e6bb7d8be13ea3
                                          • Instruction Fuzzy Hash: 9A2149B1C006699BCB14CFAAC9457DEFBF4EF08320F148169D858A7240D738AA40CFA5
                                          APIs
                                          • DeleteFileW.KERNELBASE(00000000), ref: 01828110
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.2978322098.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1820000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: 0d240d2e6ba17c678d7b14d9a02b87549e1c0d6dc46bf56efc304e8e937dea82
                                          • Instruction ID: c66c0260220860f2ea0c474423545333fa53cbb2151100bd68f65bda90c301f5
                                          • Opcode Fuzzy Hash: 0d240d2e6ba17c678d7b14d9a02b87549e1c0d6dc46bf56efc304e8e937dea82
                                          • Instruction Fuzzy Hash: 1D1106B1C0066A9BCB14CF9AC54579EFBF4FB48320F14812AD958A7250D778AA44CFA5
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,06DDC111,00000800,00000000,00000000), ref: 06DDC302
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3031912350.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6dd0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 2d021cc1d4911ce0c50993c8895c7f4b47a0c0202b3cd83caf9739bd08f548f3
                                          • Instruction ID: 8a65fb8333a99b67df77b0c34ca0279edbdb387fb801cdd1d97b30e62bed1e7b
                                          • Opcode Fuzzy Hash: 2d021cc1d4911ce0c50993c8895c7f4b47a0c0202b3cd83caf9739bd08f548f3
                                          • Instruction Fuzzy Hash: E61123B6D003498FDB20DF9AC944ADEFBF8EB48310F10842AE819A7210C375A545CFA5
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,06DDC111,00000800,00000000,00000000), ref: 06DDC302
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3031912350.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6dd0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 4b1dab600ceb47ae3d87775fb65f1a54d91ec8da921019fc7cbdfd3276ac3ffd
                                          • Instruction ID: 8a33e51718e8a1b3c774b584a7573f6db998c70b8e605c7a9b8b0c5c1369ce2f
                                          • Opcode Fuzzy Hash: 4b1dab600ceb47ae3d87775fb65f1a54d91ec8da921019fc7cbdfd3276ac3ffd
                                          • Instruction Fuzzy Hash: C21126B6C003098FCB20DF9AC544ADEFBF9EB88310F10842AE419A7210C375A545CFA5
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 0182F6BF
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.2978322098.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1820000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: 37bea1ae83c4d7cb2f2fad7475ede3c6d5ece29ee7ae618b2b40800244e3c745
                                          • Instruction ID: 0d980f95ed5fddf4428126cf9dad596a6f4ff1d992c81ed038817c1be7cabd59
                                          • Opcode Fuzzy Hash: 37bea1ae83c4d7cb2f2fad7475ede3c6d5ece29ee7ae618b2b40800244e3c745
                                          • Instruction Fuzzy Hash: 301126B1C002699BCB10CFAAC5447DEFBF4EF48320F10812AD918A7250D378A944CFA5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 06DDC096
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3031912350.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6dd0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 6618bb4e89badab2ab0a1d200903f5631a086746497584ff6963113b91b97e2f
                                          • Instruction ID: 80821b1893f4f5ca15b7d57fa746021aa9389776d959e12e37007985cef0e548
                                          • Opcode Fuzzy Hash: 6618bb4e89badab2ab0a1d200903f5631a086746497584ff6963113b91b97e2f
                                          • Instruction Fuzzy Hash: DF11E3B5D002498FCB10DF9AC544BDEFBF8EB49314F14851AD459B7210C375A545CFA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPcq
                                          • API String ID: 0-714321711
                                          • Opcode ID: ec910884c4a4f757820f574c4b3c62e7c4e7cc006f928ebfab7f3da1665726e6
                                          • Instruction ID: 3171fbb8174bea09cba0da074472f5bfc05389b4d1bb27cfcc8d70e1c9c1963d
                                          • Opcode Fuzzy Hash: ec910884c4a4f757820f574c4b3c62e7c4e7cc006f928ebfab7f3da1665726e6
                                          • Instruction Fuzzy Hash: 9A415270F002099FDB559FB9C858B9EBBF7FF88700F208529D145AB395DA744C418B91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: 5aeea3220cf26b3522841b96805979acb1727450fd68d4e1138bd874a07cbf15
                                          • Instruction ID: bb8698cfd8a1da91d2d289f9b602185dff876dab8e69b2d12b7badde1e893319
                                          • Opcode Fuzzy Hash: 5aeea3220cf26b3522841b96805979acb1727450fd68d4e1138bd874a07cbf15
                                          • Instruction Fuzzy Hash: 99419D30E007099FDB61AF75D89469EBBB2FF85304F20842AE405EB344EB75E846CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: 70860d177a85ddbc4879be08f680dca29c8b44a05843b9963ec4716c3d7e7e54
                                          • Instruction ID: 34fe329b2a06c68bdc8e0f0f140c6fe754105fad15287a6dd7f9ab5d94c7d1a1
                                          • Opcode Fuzzy Hash: 70860d177a85ddbc4879be08f680dca29c8b44a05843b9963ec4716c3d7e7e54
                                          • Instruction Fuzzy Hash: 82310430B003018FDB55AB35E55866FBAE3AFC8214F208468E40ADB394EE35DD46CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q
                                          • API String ID: 0-388095546
                                          • Opcode ID: ff2352dad77c015648a9b3fd2dbe5d7a6f8363dc15efc825f4307c4030e86d6c
                                          • Instruction ID: 6aea4a7e28852886863f0962f5091afbdd7aaf7aeefac016956b8504fbbe8639
                                          • Opcode Fuzzy Hash: ff2352dad77c015648a9b3fd2dbe5d7a6f8363dc15efc825f4307c4030e86d6c
                                          • Instruction Fuzzy Hash: F0F0FF35F00305CFDF68AA6AFA883AAB7A5EB80218F141466D904CB245C731ED01C791
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 125ca39ce04669e9ad3738944b5d656cac59c89588cfef0bf03e0b0d4effbf80
                                          • Instruction ID: 11cb64bda02631b2590b9c7ee9ddee889d8cda1881d0c1b693ed92baa1f860fd
                                          • Opcode Fuzzy Hash: 125ca39ce04669e9ad3738944b5d656cac59c89588cfef0bf03e0b0d4effbf80
                                          • Instruction Fuzzy Hash: D1925634E003048FDB64EB69D588B9DB7F2FB44318F5494A9E549AB361DB35ED82CB80
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: be54706d2c9ed8e3873e84ba10b6a42d1ccdf661959225833f72546adc6c6816
                                          • Instruction ID: 97ccf541e2c96331f849e9f1e936868d4d38e33ce9745aee7e8b8d2b95ce97c0
                                          • Opcode Fuzzy Hash: be54706d2c9ed8e3873e84ba10b6a42d1ccdf661959225833f72546adc6c6816
                                          • Instruction Fuzzy Hash: 64A17930E102098FDFA0EB79E4847ADB7B1EB49318F249966E449DB391D735DC82CB51
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 881f6d46788c06cec6b30eca8d4143f2949daa75e1dbf148ca7a5ae49d000da6
                                          • Instruction ID: 8956cc385a61b530a2eb6d5e037c92c032f31eba84ddcbb7c71083bc7396464a
                                          • Opcode Fuzzy Hash: 881f6d46788c06cec6b30eca8d4143f2949daa75e1dbf148ca7a5ae49d000da6
                                          • Instruction Fuzzy Hash: A661EF71F001214FCB50AA7ED88866FEAD7AFC5614B25443AD80EDB360EE65DD0287C6
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c5b273cba9029996cef3967239d67125066c8f8e089fdd8df4121420ccaeff1d
                                          • Instruction ID: 7c99b47ba6ba15098c75e52124c8f050e0fb51fc4199f12497634a9f76443746
                                          • Opcode Fuzzy Hash: c5b273cba9029996cef3967239d67125066c8f8e089fdd8df4121420ccaeff1d
                                          • Instruction Fuzzy Hash: 7F814F30B002099FDF54EFB9E49476EB7F6EB89704F209525D50ADB384EA74DC828B91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cdc6b27eeb7c1651c1bbe16c845b2de98c5eed26bcf3ae4c491855c4b6411a7a
                                          • Instruction ID: 772cac7fe916d7de6a09f35d89135b8c358d9f04c5003bd96895f571f192e15d
                                          • Opcode Fuzzy Hash: cdc6b27eeb7c1651c1bbe16c845b2de98c5eed26bcf3ae4c491855c4b6411a7a
                                          • Instruction Fuzzy Hash: EC915C30E103198FDF60DF68C890B9DB7B1FF89304F208599D549AB295EB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 23946c23f12458765e461b264ca64cd7cf104fd99421ced468e6623f1c04570d
                                          • Instruction ID: 8fc130dc63783eecbbd379a788970bc326cb5c02744d9ef464d08d3d6acc2e90
                                          • Opcode Fuzzy Hash: 23946c23f12458765e461b264ca64cd7cf104fd99421ced468e6623f1c04570d
                                          • Instruction Fuzzy Hash: ED913D30E106198BDF60DF68C880B9DB7B1FF89304F208599D549AB295EB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 04571679f6c63173b4e9b1b66ac7e5306e4a2e7a20c5066179a4d1eef9088702
                                          • Instruction ID: fcf610abeea719904f0397086fa19cffc7652736a9656f0b503e696022db4260
                                          • Opcode Fuzzy Hash: 04571679f6c63173b4e9b1b66ac7e5306e4a2e7a20c5066179a4d1eef9088702
                                          • Instruction Fuzzy Hash: BA712870A012099FCB54EFA9E984A9DBBF6FF88304F249429D419EB355DB30EC46CB51
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9224adf971a7c452ec0641f2ae946f5ac8eaf80ab3348e475f25d4581f69751a
                                          • Instruction ID: 60a936b34be8ac3138d33155661eeb67821cbc1c18722e35e7001659495b4770
                                          • Opcode Fuzzy Hash: 9224adf971a7c452ec0641f2ae946f5ac8eaf80ab3348e475f25d4581f69751a
                                          • Instruction Fuzzy Hash: 08711A70A002099FCB54EFA9E984A9DBBF6FF88304F249429D419EB355DB30EC46CB51
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5dd7151bd168582188d27aceb3ab9e6960769f1a1de4a1142279fc66de1a6040
                                          • Instruction ID: b0e8e014935bbe5b3ca02befca8f9f5457c5047f4bd5bf51384bbe3f20d6f079
                                          • Opcode Fuzzy Hash: 5dd7151bd168582188d27aceb3ab9e6960769f1a1de4a1142279fc66de1a6040
                                          • Instruction Fuzzy Hash: 4451D131E00205DFDB64EF78F4842ADBBB2EBC8719F108879E14ADB251DB358845CB91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 928c4eaa798ca82b09763af1830a53f00a6afeb2f23853ca5163f9f741bde2ee
                                          • Instruction ID: 722c5d9f0d08a76e0f6730fdb1664d2b568aa8d0624be186668baf6b2a1b3d17
                                          • Opcode Fuzzy Hash: 928c4eaa798ca82b09763af1830a53f00a6afeb2f23853ca5163f9f741bde2ee
                                          • Instruction Fuzzy Hash: 3A512C70B103148FEFA46A7CF85472F265BDBC9744F20482AE40AD73D4C92DCC8547A2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8056ee11385e0ec96e8573718146ff13454036b13d9a225aa8040907bd91159c
                                          • Instruction ID: a76f7c49bbdeb89b17131d43e38a6ed2c7eff66c6e29db808e090a26e3f972cb
                                          • Opcode Fuzzy Hash: 8056ee11385e0ec96e8573718146ff13454036b13d9a225aa8040907bd91159c
                                          • Instruction Fuzzy Hash: 5F511874B103149FEFA46ABCF85472F265BD7C9744F20482AE50AD73D8C929CC8547A2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d0817f598b7495938b9d2cb1adcae60bb8f3dc1aeb8a548ac09d6512059847e0
                                          • Instruction ID: 2be2f50967bcae2a9f77b5c1309e8e8df0aaa531f32a020ad2c5e2609b3c7b57
                                          • Opcode Fuzzy Hash: d0817f598b7495938b9d2cb1adcae60bb8f3dc1aeb8a548ac09d6512059847e0
                                          • Instruction Fuzzy Hash: 79417C71E007098FCB70DEA9E880ABFFBB2EB85314F10492AD156DB654D334E955CB91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4545ff72ec9ad896cc48c8c5ca74da1ae1468a82fdd6fcb001863b4571b9e478
                                          • Instruction ID: f1e16c939634a2220aab329fbd8b508961c6cc4d0fe898898585e878d8aed6b8
                                          • Opcode Fuzzy Hash: 4545ff72ec9ad896cc48c8c5ca74da1ae1468a82fdd6fcb001863b4571b9e478
                                          • Instruction Fuzzy Hash: A9410330E042558FDB15DF79E4A469ABBF2EF8A300F008529F546DB355DB34D986CB81
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 223c5edf4fd7b924f3e7252093f5c8278ec938a60150205333c8617cecd03903
                                          • Instruction ID: 98006545b74443799cf33fdee12cd8fc88788b54d79f19dc60c84b37c352b6d9
                                          • Opcode Fuzzy Hash: 223c5edf4fd7b924f3e7252093f5c8278ec938a60150205333c8617cecd03903
                                          • Instruction Fuzzy Hash: 20319470E203058BEF70AE79E48077EFBB2EB85318F25986AD455D7281C635D941CB91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2700c53eda845593f361d548c0666523339aa758aa47258571ab517605d608ab
                                          • Instruction ID: 58dc1a64c440c1edfbdef126b4f6054d284e3f073c7bbb5cc456a20cdcf833e4
                                          • Opcode Fuzzy Hash: 2700c53eda845593f361d548c0666523339aa758aa47258571ab517605d608ab
                                          • Instruction Fuzzy Hash: 17318F30E1031A9FCB65DF69D98469EFBB6FF85304F108929E405AB314EB71E8468B91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f282cda29ceab76c7b2744e1f0529b21d453c054244d5392ba390881b04867e1
                                          • Instruction ID: 71b3462b6fe3cc0eee9ff41d50119a6fc5aaf04a854bde9e3289ec4e701d0c91
                                          • Opcode Fuzzy Hash: f282cda29ceab76c7b2744e1f0529b21d453c054244d5392ba390881b04867e1
                                          • Instruction Fuzzy Hash: D631CE357101148FCB54EF7CD488A5ABBE6FF89720F2080A9E50ACF3A5CA71DC048B90
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ff44b7fd5a3de4272999827a6214a6966efdd2f7586788c5f2702ca0be2bf942
                                          • Instruction ID: 19cabd5e29e9ee9bd7842e433ebc4c7b9c6931ca5f0037c7481f77802dc303f2
                                          • Opcode Fuzzy Hash: ff44b7fd5a3de4272999827a6214a6966efdd2f7586788c5f2702ca0be2bf942
                                          • Instruction Fuzzy Hash: 20316B30E102059FCB59DBA5E49469EB7F2EF89300F10D519E906E7344DB70E942CB51
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9571727e725b0f5d2e9d59955231a34df6521e3134b5a6b6422c9e1075457ffd
                                          • Instruction ID: ef5e36f471bc51d0be2b263a0b510bd3c92c071d41d10a172821048795ca76d5
                                          • Opcode Fuzzy Hash: 9571727e725b0f5d2e9d59955231a34df6521e3134b5a6b6422c9e1075457ffd
                                          • Instruction Fuzzy Hash: FF216875F012159FDB40EF7AE881AEEBBF2EB48210F108429E904E7390E734DD918B91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d4cec0abec59f871d5efe365090b5a976cf2e8afa10adc322243f9817d7a0624
                                          • Instruction ID: b52b636e86ff344c866844b754b4eb6f58b5176d65e72d7b1168eda227284a62
                                          • Opcode Fuzzy Hash: d4cec0abec59f871d5efe365090b5a976cf2e8afa10adc322243f9817d7a0624
                                          • Instruction Fuzzy Hash: 42216975F012159FDB50EF7AE880AEEBBF2EB48610F108429E905E7390E735DD918B91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.2977510859.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_174d000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aac3bf47884d9226e10e028608c8a4f47db73b3e28391022007c74e4884b5d25
                                          • Instruction ID: 8702db67f0b5e146de985787ac4cd9885f003ad0300793195217136e4349d696
                                          • Opcode Fuzzy Hash: aac3bf47884d9226e10e028608c8a4f47db73b3e28391022007c74e4884b5d25
                                          • Instruction Fuzzy Hash: 7B214671604204DFCB21DF98D9C0B26FFA5FB94314F20C5ADE9894B266C33AD447CA62
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a6942e023db3e07c35ef333a21429ba77bba0292067e7a02c96f2b1fd46aef9a
                                          • Instruction ID: ffb99fbe01c561f271681d2e33ef25b684bd5efff44d77cfdcb6aef3f9bd8e4b
                                          • Opcode Fuzzy Hash: a6942e023db3e07c35ef333a21429ba77bba0292067e7a02c96f2b1fd46aef9a
                                          • Instruction Fuzzy Hash: 81110835F442101FC761A67DF85476EB7D9EB86628F104835F10ECB345EA26DD0183D5
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 66c4ef8951cdf1e669276f310d6d5e008c3dd5fd9813032e7652de075c50f5b1
                                          • Instruction ID: 930e3c33ed7b4d6ce61f30da33f65ab1bed57102b1be338eb425279475e0ec66
                                          • Opcode Fuzzy Hash: 66c4ef8951cdf1e669276f310d6d5e008c3dd5fd9813032e7652de075c50f5b1
                                          • Instruction Fuzzy Hash: 1001F134B002115FCBA0A6BEA85072BA7DBDBCA718F14843AF50AD7785DD65DC0343A9
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 787b063848b8964bc0cbe80404640eb17340dbb1dd794332c160a206850f40dd
                                          • Instruction ID: 0cb6e903f912a0ed0fc197e892fb596d463d0e7e3caa455af996b45c4d4a99df
                                          • Opcode Fuzzy Hash: 787b063848b8964bc0cbe80404640eb17340dbb1dd794332c160a206850f40dd
                                          • Instruction Fuzzy Hash: A011A131B001259FDF54A679E8146EF73EBEBC8215F00443AD50AE7380EE65DC128BD2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 30adc4916f3f876a6856ab45d4127eae20c93db2f46ccf66db51d9a9b9ac0095
                                          • Instruction ID: 0768def5d45042bdd3f5e39e2ae5b8fd2269408cc7926aebc0dd541b7403005c
                                          • Opcode Fuzzy Hash: 30adc4916f3f876a6856ab45d4127eae20c93db2f46ccf66db51d9a9b9ac0095
                                          • Instruction Fuzzy Hash: 8321E3B5D012599FCB10DF9AD984BDEFFB4BB48314F10812AE518A7300C3756940CFA5
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bfb0a7cfff553d87379cf8c77564d6d5208732206a11d7ff43d06a4fd7ede54a
                                          • Instruction ID: 3ae1e0346ca1fffff9113551b47d58eafc25e5e95a88bd4e67b69970eedc29c7
                                          • Opcode Fuzzy Hash: bfb0a7cfff553d87379cf8c77564d6d5208732206a11d7ff43d06a4fd7ede54a
                                          • Instruction Fuzzy Hash: B901F735F141105FDB619A7DECA472E67E7EBCAB14F14883AF10AC7342DA24CD068396
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d4a60293ed44146db48d4391bcbb3965a951cb94322437d32f046127f2958e9
                                          • Instruction ID: 57ca131039ebb02e293484ceff2c365fda19c08fd7d12db645b9fe08dbcc0c12
                                          • Opcode Fuzzy Hash: 4d4a60293ed44146db48d4391bcbb3965a951cb94322437d32f046127f2958e9
                                          • Instruction Fuzzy Hash: E221C2B5D01259AFCB10DFAAD984ADEFBB4FB48314F10812AE918A7240C375A954CFE5
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 457c64dd83160ba424460b84bd5757c8ef35f5549614bfd380d425d44851e63a
                                          • Instruction ID: 04431d7998be07e1345e32c8cbd2768620d8a3db5aae2b2a91ea8df978e4fad4
                                          • Opcode Fuzzy Hash: 457c64dd83160ba424460b84bd5757c8ef35f5549614bfd380d425d44851e63a
                                          • Instruction Fuzzy Hash: 1701B536F101159BEF54A579AC147EF72EADBC4605F00443AD90AE7380FE659C5247E2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.2977510859.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_174d000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 744a6646be8474e184f79a9d6e24a8b927824add0a57ed33448fae460c81d968
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: 9411BB75504284CFDB22CF58D5C4B15FFA1FB94314F28C6AAD8894B666C33AD44ACB62
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 024bfd7a17ecaa03f5ba396f28df2d9fc41c10e21f89ec953a99ecf73acfe2af
                                          • Instruction ID: 3c270ee5c632dd76d6cd24b604a8dadff7743336013d258d67dfba56ba576912
                                          • Opcode Fuzzy Hash: 024bfd7a17ecaa03f5ba396f28df2d9fc41c10e21f89ec953a99ecf73acfe2af
                                          • Instruction Fuzzy Hash: 2801D134B001114FDBA0A5BEA45472BE2DBDBC9728F14883AE50ED7384DE61DC020399
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ba779eddeb561e249a4bd103c54308cb03d009b16fb9d79f110c99fbc08837b1
                                          • Instruction ID: d8566c1f52d05e5561b8ec5bcc83f82239911ac00146506ae6fc9a3b795cccd1
                                          • Opcode Fuzzy Hash: ba779eddeb561e249a4bd103c54308cb03d009b16fb9d79f110c99fbc08837b1
                                          • Instruction Fuzzy Hash: 7F01A471F101115BDB64A67EE89472EA3DBEBCAA18F14983AE20EC7341DE25DC064395
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6057a14bfeb7280855709451a766f9a552310cd2e322fe2af40d35704142a4cd
                                          • Instruction ID: 1a985d90eb92e330d1fb0bed6614d0c503d5a1c210c3b665526e053fc4798fb4
                                          • Opcode Fuzzy Hash: 6057a14bfeb7280855709451a766f9a552310cd2e322fe2af40d35704142a4cd
                                          • Instruction Fuzzy Hash: 3F016D74B102155FD750EA7DF49872EB3D6E789724F149838E60EC7344EE25DC418785
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 710698ff3a07af57951f1fafe51c7ea8199b2a37c7e4911252b859f46457dc0b
                                          • Instruction ID: d65ae919b41de16fbd81c368c81f4080c515f6610c99d0cb2a9ebc956ec3137f
                                          • Opcode Fuzzy Hash: 710698ff3a07af57951f1fafe51c7ea8199b2a37c7e4911252b859f46457dc0b
                                          • Instruction Fuzzy Hash: 1A012871F112289BCB14AA79F844A9EB77AF7C4714F204439E905EB340DB31AC01CBC0
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4a08265cb100e7231bde7936945a3f303b6ffe1c9b0ecb6dd3ace435acd7dedf
                                          • Instruction ID: 0584a063c7efabc74afd028b04215f63e551b01894330cbb4a6558470af5b0f7
                                          • Opcode Fuzzy Hash: 4a08265cb100e7231bde7936945a3f303b6ffe1c9b0ecb6dd3ace435acd7dedf
                                          • Instruction Fuzzy Hash: 7DE092B0E053485BEF60DE70D95535E7BA9EB42248F3048A5D448CB142E176CA428381
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2222239885
                                          • Opcode ID: cb93f44fae8a4cc31a7d278153ba9e295b46851f1e25ef20e607d2ec35e30cfa
                                          • Instruction ID: 5208de4859adb9d576c03892f90e44d69007a77da0c09f112b9629a19ca358ac
                                          • Opcode Fuzzy Hash: cb93f44fae8a4cc31a7d278153ba9e295b46851f1e25ef20e607d2ec35e30cfa
                                          • Instruction Fuzzy Hash: CB121B30E002198FDB64EF79D994A9EB7B2FF88704F209969D409AB354DB319D85CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: 9c0b56517da1b9e0551b8c92c515da1cc58ab3ae653f383b4b707b177a8c3458
                                          • Instruction ID: af26b98618091b65573779da195e052cc44455ddf8859f5685f94b6ea1f145c2
                                          • Opcode Fuzzy Hash: 9c0b56517da1b9e0551b8c92c515da1cc58ab3ae653f383b4b707b177a8c3458
                                          • Instruction Fuzzy Hash: 6F915D30E403099FDB68EB7DE6447AEB7B2EF84314F109439E4019B298DB759D85CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-390881366
                                          • Opcode ID: 2466a712bbdce3192299580d6a6a62b509eefaa2d8448da5e5280e195be74b1f
                                          • Instruction ID: 5180037866963d927725892894b562a59b420f84729d756a575d2fbc1a322d25
                                          • Opcode Fuzzy Hash: 2466a712bbdce3192299580d6a6a62b509eefaa2d8448da5e5280e195be74b1f
                                          • Instruction Fuzzy Hash: 6DF14B30B00209CFDB59EF79E588A6EB7B2FB84304F248569D8059B355DB75EC86CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: bf2ef5322cc4f5c3aec6670caf292d3e5d9a75391233bfa07abeb9402f583d2c
                                          • Instruction ID: 52fe9362000c7d79b50a987b35c0d95bb1d867609f362de6dffbdcad8c7fd979
                                          • Opcode Fuzzy Hash: bf2ef5322cc4f5c3aec6670caf292d3e5d9a75391233bfa07abeb9402f583d2c
                                          • Instruction Fuzzy Hash: 7671AE30E012098FDB68EF79E9446ADB7A2FF84704B208569D40ADB355EB72DC46CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: bacde14a16ce7adcd566924e28ab4f786ad4c43703550a3cbfbc210ee4571c67
                                          • Instruction ID: a595d4a2fb35a1137fd542e3be881c894d15076280bcc028d30d98dc0a80916d
                                          • Opcode Fuzzy Hash: bacde14a16ce7adcd566924e28ab4f786ad4c43703550a3cbfbc210ee4571c67
                                          • Instruction Fuzzy Hash: 26B14930B102098FDB65EF79E5946AEB7B2EF84304F249829D406DB395DB74DC82CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LR^q$LR^q$$^q$$^q
                                          • API String ID: 0-2454687669
                                          • Opcode ID: d03a3ae234420580afcf8a98e181cbbda258d3a079197551d3d103b5a3ae1a01
                                          • Instruction ID: 4dd05ebe82020328ef940595ea45a060d7208b871f58750bd2f73ee1b7cb09f1
                                          • Opcode Fuzzy Hash: d03a3ae234420580afcf8a98e181cbbda258d3a079197551d3d103b5a3ae1a01
                                          • Instruction Fuzzy Hash: 9451B230B003058FDB58EB39E984A6BB7E6FF88304F149969E5059B395DA31EC44CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3034706846.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6e40000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: bd6b5cd4dec6d8885de80e4f80dee01b367bb8a787d25f860ed7fcd0b0fbab3a
                                          • Instruction ID: b538612fa93d650a21b68ed4c95eb01efd22937e30337380ecd3fa40d71df343
                                          • Opcode Fuzzy Hash: bd6b5cd4dec6d8885de80e4f80dee01b367bb8a787d25f860ed7fcd0b0fbab3a
                                          • Instruction Fuzzy Hash: B951A130E503058FCB65EA7CE4846AEB3B6EB88325F20553AD815DB348DB35DC81CB91

                                          Execution Graph

                                          Execution Coverage:10.3%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:284
                                          Total number of Limit Nodes:19
                                          execution_graph 24291 321d300 24292 321d346 24291->24292 24296 321d4e0 24292->24296 24300 321d4d3 24292->24300 24293 321d433 24297 321d4e1 24296->24297 24305 321ce10 24297->24305 24301 321d4da 24300->24301 24303 321d488 24300->24303 24302 321ce10 DuplicateHandle 24301->24302 24304 321d50e 24302->24304 24303->24293 24304->24293 24306 321d548 DuplicateHandle 24305->24306 24308 321d50e 24306->24308 24308->24293 24309 5297268 24310 529728e 24309->24310 24311 52973f3 24309->24311 24310->24311 24313 5296d7c 24310->24313 24314 52974e8 PostMessageW 24313->24314 24315 5297554 24314->24315 24315->24310 24337 5293fde 24339 5293dec 24337->24339 24338 5293e13 24339->24338 24344 5295be9 24339->24344 24367 5295bc0 24339->24367 24390 5295b81 24339->24390 24414 5295bf8 24339->24414 24345 5295c09 24344->24345 24346 5295c36 24345->24346 24437 5296aaf 24345->24437 24441 529638f 24345->24441 24446 529622c 24345->24446 24451 529686d 24345->24451 24456 5295fe8 24345->24456 24462 5295f08 24345->24462 24468 5296295 24345->24468 24473 5296255 24345->24473 24483 5296013 24345->24483 24489 52969d3 24345->24489 24494 52963fc 24345->24494 24498 529631b 24345->24498 24504 52962bb 24345->24504 24509 5295f18 24345->24509 24515 52963b8 24345->24515 24519 52968b8 24345->24519 24524 5296279 24345->24524 24529 5296186 24345->24529 24535 5296641 24345->24535 24540 52966c1 24345->24540 24346->24339 24368 5295be5 24367->24368 24368->24339 24369 5295c36 24368->24369 24370 5295f08 2 API calls 24368->24370 24371 5295fe8 2 API calls 24368->24371 24372 529686d 2 API calls 24368->24372 24373 529622c 2 API calls 24368->24373 24374 529638f 2 API calls 24368->24374 24375 5296aaf 2 API calls 24368->24375 24376 52966c1 2 API calls 24368->24376 24377 5296641 2 API calls 24368->24377 24378 5296186 2 API calls 24368->24378 24379 5296279 2 API calls 24368->24379 24380 52968b8 2 API calls 24368->24380 24381 52963b8 2 API calls 24368->24381 24382 5295f18 2 API calls 24368->24382 24383 52962bb 2 API calls 24368->24383 24384 529631b 2 API calls 24368->24384 24385 52963fc 2 API calls 24368->24385 24386 52969d3 2 API calls 24368->24386 24387 5296013 2 API calls 24368->24387 24388 5296255 4 API calls 24368->24388 24389 5296295 2 API calls 24368->24389 24369->24339 24370->24369 24371->24369 24372->24369 24373->24369 24374->24369 24375->24369 24376->24369 24377->24369 24378->24369 24379->24369 24380->24369 24381->24369 24382->24369 24383->24369 24384->24369 24385->24369 24386->24369 24387->24369 24388->24369 24389->24369 24391 5295b53 24390->24391 24392 5295b8a 24390->24392 24391->24339 24393 5295baf 24392->24393 24394 5295f08 2 API calls 24392->24394 24395 5295fe8 2 API calls 24392->24395 24396 529686d 2 API calls 24392->24396 24397 529622c 2 API calls 24392->24397 24398 529638f 2 API calls 24392->24398 24399 5296aaf 2 API calls 24392->24399 24400 52966c1 2 API calls 24392->24400 24401 5296641 2 API calls 24392->24401 24402 5296186 2 API calls 24392->24402 24403 5296279 2 API calls 24392->24403 24404 52968b8 2 API calls 24392->24404 24405 52963b8 2 API calls 24392->24405 24406 5295f18 2 API calls 24392->24406 24407 52962bb 2 API calls 24392->24407 24408 529631b 2 API calls 24392->24408 24409 52963fc 2 API calls 24392->24409 24410 52969d3 2 API calls 24392->24410 24411 5296013 2 API calls 24392->24411 24412 5296255 4 API calls 24392->24412 24413 5296295 2 API calls 24392->24413 24393->24339 24394->24393 24395->24393 24396->24393 24397->24393 24398->24393 24399->24393 24400->24393 24401->24393 24402->24393 24403->24393 24404->24393 24405->24393 24406->24393 24407->24393 24408->24393 24409->24393 24410->24393 24411->24393 24412->24393 24413->24393 24415 5295c09 24414->24415 24416 5295c36 24415->24416 24417 5295f08 2 API calls 24415->24417 24418 5295fe8 2 API calls 24415->24418 24419 529686d 2 API calls 24415->24419 24420 529622c 2 API calls 24415->24420 24421 529638f 2 API calls 24415->24421 24422 5296aaf 2 API calls 24415->24422 24423 52966c1 2 API calls 24415->24423 24424 5296641 2 API calls 24415->24424 24425 5296186 2 API calls 24415->24425 24426 5296279 2 API calls 24415->24426 24427 52968b8 2 API calls 24415->24427 24428 52963b8 2 API calls 24415->24428 24429 5295f18 2 API calls 24415->24429 24430 52962bb 2 API calls 24415->24430 24431 529631b 2 API calls 24415->24431 24432 52963fc 2 API calls 24415->24432 24433 52969d3 2 API calls 24415->24433 24434 5296013 2 API calls 24415->24434 24435 5296255 4 API calls 24415->24435 24436 5296295 2 API calls 24415->24436 24416->24339 24417->24416 24418->24416 24419->24416 24420->24416 24421->24416 24422->24416 24423->24416 24424->24416 24425->24416 24426->24416 24427->24416 24428->24416 24429->24416 24430->24416 24431->24416 24432->24416 24433->24416 24434->24416 24435->24416 24436->24416 24545 5293178 24437->24545 24549 5293171 24437->24549 24438 5296ac9 24442 52962ba 24441->24442 24553 5293748 24442->24553 24557 5293740 24442->24557 24443 52962e9 24443->24346 24447 529623d 24446->24447 24449 5293748 WriteProcessMemory 24447->24449 24450 5293740 WriteProcessMemory 24447->24450 24448 5296a0c 24449->24448 24450->24448 24452 5296873 24451->24452 24561 52930c8 24452->24561 24565 52930c0 24452->24565 24453 5296899 24453->24346 24458 5295ff1 24456->24458 24457 529602b 24457->24346 24458->24457 24569 52939d0 24458->24569 24573 52939c4 24458->24573 24464 5295f4b 24462->24464 24463 529602b 24463->24346 24464->24463 24466 52939d0 CreateProcessA 24464->24466 24467 52939c4 CreateProcessA 24464->24467 24465 5296151 24465->24346 24466->24465 24467->24465 24469 52962aa 24468->24469 24577 5293838 24469->24577 24581 5293830 24469->24581 24470 5296a8f 24474 5296259 24473->24474 24475 52962c5 24473->24475 24474->24475 24476 529617c 24474->24476 24479 5293748 WriteProcessMemory 24475->24479 24480 5293740 WriteProcessMemory 24475->24480 24477 529618e 24476->24477 24481 52930c8 ResumeThread 24476->24481 24482 52930c0 ResumeThread 24476->24482 24477->24346 24478 5296899 24478->24346 24479->24477 24480->24477 24481->24478 24482->24478 24484 529602b 24483->24484 24485 5295ff1 24483->24485 24484->24346 24485->24484 24487 52939d0 CreateProcessA 24485->24487 24488 52939c4 CreateProcessA 24485->24488 24486 5296151 24486->24346 24487->24486 24488->24486 24490 52969eb 24489->24490 24492 5293748 WriteProcessMemory 24490->24492 24493 5293740 WriteProcessMemory 24490->24493 24491 5296a0c 24492->24491 24493->24491 24496 5293178 Wow64SetThreadContext 24494->24496 24497 5293171 Wow64SetThreadContext 24494->24497 24495 5296416 24496->24495 24497->24495 24499 529617c 24498->24499 24499->24498 24501 529618e 24499->24501 24502 52930c8 ResumeThread 24499->24502 24503 52930c0 ResumeThread 24499->24503 24500 5296899 24500->24346 24501->24346 24502->24500 24503->24500 24505 52962c5 24504->24505 24507 5293748 WriteProcessMemory 24505->24507 24508 5293740 WriteProcessMemory 24505->24508 24506 52962e9 24506->24346 24507->24506 24508->24506 24511 5295f4b 24509->24511 24510 529602b 24510->24346 24511->24510 24513 52939d0 CreateProcessA 24511->24513 24514 52939c4 CreateProcessA 24511->24514 24512 5296151 24512->24346 24513->24512 24514->24512 24517 5293748 WriteProcessMemory 24515->24517 24518 5293740 WriteProcessMemory 24515->24518 24516 52963dc 24516->24346 24517->24516 24518->24516 24520 5296885 24519->24520 24522 52930c8 ResumeThread 24520->24522 24523 52930c0 ResumeThread 24520->24523 24521 5296899 24521->24346 24522->24521 24523->24521 24525 529644c 24524->24525 24527 5293838 ReadProcessMemory 24525->24527 24528 5293830 ReadProcessMemory 24525->24528 24526 5296a8f 24527->24526 24528->24526 24530 529617c 24529->24530 24532 529618e 24530->24532 24533 52930c8 ResumeThread 24530->24533 24534 52930c0 ResumeThread 24530->24534 24531 5296899 24531->24346 24532->24346 24533->24531 24534->24531 24536 5296647 24535->24536 24585 5293249 24536->24585 24589 5293250 24536->24589 24537 5296663 24541 52966c7 24540->24541 24543 5293838 ReadProcessMemory 24541->24543 24544 5293830 ReadProcessMemory 24541->24544 24542 5296a8f 24543->24542 24544->24542 24546 52931bd Wow64SetThreadContext 24545->24546 24548 5293205 24546->24548 24548->24438 24550 52931bd Wow64SetThreadContext 24549->24550 24552 5293205 24550->24552 24552->24438 24554 5293790 WriteProcessMemory 24553->24554 24556 52937e7 24554->24556 24556->24443 24558 5293790 WriteProcessMemory 24557->24558 24560 52937e7 24558->24560 24560->24443 24562 5293108 ResumeThread 24561->24562 24564 5293139 24562->24564 24564->24453 24566 5293108 ResumeThread 24565->24566 24568 5293139 24566->24568 24568->24453 24570 5293a59 CreateProcessA 24569->24570 24572 5293c1b 24570->24572 24574 5293a59 CreateProcessA 24573->24574 24576 5293c1b 24574->24576 24578 5293883 ReadProcessMemory 24577->24578 24580 52938c7 24578->24580 24580->24470 24582 5293883 ReadProcessMemory 24581->24582 24584 52938c7 24582->24584 24584->24470 24586 5293290 VirtualAllocEx 24585->24586 24588 52932cd 24586->24588 24588->24537 24590 5293290 VirtualAllocEx 24589->24590 24592 52932cd 24590->24592 24592->24537 24316 3214668 24317 3214669 24316->24317 24318 3214686 24317->24318 24320 3214779 24317->24320 24321 321477c 24320->24321 24325 3214878 24321->24325 24329 3214888 24321->24329 24327 321487c 24325->24327 24326 321498c 24326->24326 24327->24326 24333 32144b0 24327->24333 24330 3214889 24329->24330 24331 32144b0 CreateActCtxA 24330->24331 24332 321498c 24330->24332 24331->24332 24334 3215918 CreateActCtxA 24333->24334 24336 32159db 24334->24336 24593 5293f70 24594 5293dec 24593->24594 24595 5293e13 24594->24595 24596 5295be9 12 API calls 24594->24596 24597 5295bf8 12 API calls 24594->24597 24598 5295b81 12 API calls 24594->24598 24599 5295bc0 12 API calls 24594->24599 24596->24594 24597->24594 24598->24594 24599->24594 24600 321af78 24601 321af79 24600->24601 24605 321b061 24601->24605 24615 321b070 24601->24615 24602 321af87 24606 321b070 24605->24606 24609 321b0a4 24606->24609 24625 321aa24 24606->24625 24609->24602 24610 321b09c 24610->24609 24611 321b2a8 GetModuleHandleW 24610->24611 24612 321b2d5 24611->24612 24612->24602 24616 321b075 24615->24616 24617 321aa24 GetModuleHandleW 24616->24617 24619 321b0a4 24616->24619 24618 321b08c 24617->24618 24618->24619 24623 321b2f9 2 API calls 24618->24623 24624 321b308 2 API calls 24618->24624 24619->24602 24620 321b09c 24620->24619 24621 321b2a8 GetModuleHandleW 24620->24621 24622 321b2d5 24621->24622 24622->24602 24623->24620 24624->24620 24626 321b260 GetModuleHandleW 24625->24626 24628 321b08c 24626->24628 24628->24609 24629 321b2f9 24628->24629 24635 321b308 24628->24635 24630 321b304 24629->24630 24631 321aa24 GetModuleHandleW 24630->24631 24632 321b31c 24631->24632 24633 321b341 24632->24633 24641 321aa88 24632->24641 24633->24610 24636 321b309 24635->24636 24637 321aa24 GetModuleHandleW 24636->24637 24638 321b31c 24637->24638 24639 321b341 24638->24639 24640 321aa88 LoadLibraryExW 24638->24640 24639->24610 24640->24639 24642 321b4e8 LoadLibraryExW 24641->24642 24644 321b561 24642->24644 24644->24633

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 371 52939c4-5293a65 373 5293a9e-5293abe 371->373 374 5293a67-5293a71 371->374 381 5293ac0-5293aca 373->381 382 5293af7-5293b26 373->382 374->373 375 5293a73-5293a75 374->375 377 5293a98-5293a9b 375->377 378 5293a77-5293a81 375->378 377->373 379 5293a83 378->379 380 5293a85-5293a94 378->380 379->380 380->380 383 5293a96 380->383 381->382 384 5293acc-5293ace 381->384 388 5293b28-5293b32 382->388 389 5293b5f-5293c19 CreateProcessA 382->389 383->377 386 5293af1-5293af4 384->386 387 5293ad0-5293ada 384->387 386->382 390 5293adc 387->390 391 5293ade-5293aed 387->391 388->389 392 5293b34-5293b36 388->392 402 5293c1b-5293c21 389->402 403 5293c22-5293ca8 389->403 390->391 391->391 393 5293aef 391->393 394 5293b59-5293b5c 392->394 395 5293b38-5293b42 392->395 393->386 394->389 397 5293b44 395->397 398 5293b46-5293b55 395->398 397->398 398->398 399 5293b57 398->399 399->394 402->403 413 5293cb8-5293cbc 403->413 414 5293caa-5293cae 403->414 416 5293ccc-5293cd0 413->416 417 5293cbe-5293cc2 413->417 414->413 415 5293cb0 414->415 415->413 419 5293ce0-5293ce4 416->419 420 5293cd2-5293cd6 416->420 417->416 418 5293cc4 417->418 418->416 421 5293cf6-5293cfd 419->421 422 5293ce6-5293cec 419->422 420->419 423 5293cd8 420->423 424 5293cff-5293d0e 421->424 425 5293d14 421->425 422->421 423->419 424->425 427 5293d15 425->427 427->427
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05293C06
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 112fda5cc43f2f5b06726d8c4f40b5a51285d53f20e0201fdc41fba90ededbb1
                                          • Instruction ID: 4f5c5c48c44f7eea5a363b16a72c0277da64faef23cd94a019ec10c5c24d0fdf
                                          • Opcode Fuzzy Hash: 112fda5cc43f2f5b06726d8c4f40b5a51285d53f20e0201fdc41fba90ededbb1
                                          • Instruction Fuzzy Hash: 05A16971D1061A9FDF24CF68C841BEDBBB2BF48314F1485A9E809A7390DB749985CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 428 52939d0-5293a65 430 5293a9e-5293abe 428->430 431 5293a67-5293a71 428->431 438 5293ac0-5293aca 430->438 439 5293af7-5293b26 430->439 431->430 432 5293a73-5293a75 431->432 434 5293a98-5293a9b 432->434 435 5293a77-5293a81 432->435 434->430 436 5293a83 435->436 437 5293a85-5293a94 435->437 436->437 437->437 440 5293a96 437->440 438->439 441 5293acc-5293ace 438->441 445 5293b28-5293b32 439->445 446 5293b5f-5293c19 CreateProcessA 439->446 440->434 443 5293af1-5293af4 441->443 444 5293ad0-5293ada 441->444 443->439 447 5293adc 444->447 448 5293ade-5293aed 444->448 445->446 449 5293b34-5293b36 445->449 459 5293c1b-5293c21 446->459 460 5293c22-5293ca8 446->460 447->448 448->448 450 5293aef 448->450 451 5293b59-5293b5c 449->451 452 5293b38-5293b42 449->452 450->443 451->446 454 5293b44 452->454 455 5293b46-5293b55 452->455 454->455 455->455 456 5293b57 455->456 456->451 459->460 470 5293cb8-5293cbc 460->470 471 5293caa-5293cae 460->471 473 5293ccc-5293cd0 470->473 474 5293cbe-5293cc2 470->474 471->470 472 5293cb0 471->472 472->470 476 5293ce0-5293ce4 473->476 477 5293cd2-5293cd6 473->477 474->473 475 5293cc4 474->475 475->473 478 5293cf6-5293cfd 476->478 479 5293ce6-5293cec 476->479 477->476 480 5293cd8 477->480 481 5293cff-5293d0e 478->481 482 5293d14 478->482 479->478 480->476 481->482 484 5293d15 482->484 484->484
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05293C06
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 68ea60f65f67665dbfda535a51ea9329cbbd49ee7c1a628c2191ff7c88678db9
                                          • Instruction ID: bdae249ba8187419766eee558626e6ffbb632e3a81f56ec6d11534991fc4a057
                                          • Opcode Fuzzy Hash: 68ea60f65f67665dbfda535a51ea9329cbbd49ee7c1a628c2191ff7c88678db9
                                          • Instruction Fuzzy Hash: A1914871D1061A9FDF24CF68C841BEEBBB2BF48314F1485A9E809A7350DB749985CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 485 321b070-321b07f 487 321b081-321b08e call 321aa24 485->487 488 321b0ab-321b0af 485->488 495 321b090 487->495 496 321b0a4 487->496 489 321b0b1-321b0bb 488->489 490 321b0c3-321b104 488->490 489->490 497 321b111-321b11f 490->497 498 321b106-321b10e 490->498 541 321b096 call 321b2f9 495->541 542 321b096 call 321b308 495->542 496->488 499 321b121-321b126 497->499 500 321b143-321b145 497->500 498->497 504 321b131 499->504 505 321b128-321b12f call 321aa30 499->505 503 321b148-321b14f 500->503 501 321b09c-321b09e 501->496 502 321b1e0-321b2a0 501->502 536 321b2a2-321b2a5 502->536 537 321b2a8-321b2d3 GetModuleHandleW 502->537 506 321b151-321b159 503->506 507 321b15c-321b163 503->507 508 321b133-321b141 504->508 505->508 506->507 510 321b170-321b179 call 321aa40 507->510 511 321b165-321b16d 507->511 508->503 517 321b186-321b18b 510->517 518 321b17b-321b183 510->518 511->510 519 321b1a9-321b1b6 517->519 520 321b18d-321b194 517->520 518->517 526 321b1d9-321b1df 519->526 527 321b1b8-321b1d6 519->527 520->519 522 321b196-321b1a6 call 321aa50 call 321aa60 520->522 522->519 527->526 536->537 538 321b2d5-321b2db 537->538 539 321b2dc-321b2f0 537->539 538->539 541->501 542->501
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1849824421.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_3210000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 712a6fd7dc70ae821ba2a07518ea44e9aca01bc05a3a081497f8132cb148658c
                                          • Instruction ID: 43462b69edc9c690ba79c60648ffcafcfa54c13224d324049c29c205d478cb8e
                                          • Opcode Fuzzy Hash: 712a6fd7dc70ae821ba2a07518ea44e9aca01bc05a3a081497f8132cb148658c
                                          • Instruction Fuzzy Hash: 21716670A10B458FD764DF29D64475ABBF1FF88300F04896ED08ACBA50DB74E899CB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 543 321590d-321590e 544 3215910-3215914 543->544 545 3215915 543->545 544->545 546 321591a-32159d9 CreateActCtxA 545->546 548 32159e2-3215a3c 546->548 549 32159db-32159e1 546->549 556 3215a4b-3215a4f 548->556 557 3215a3e-3215a41 548->557 549->548 558 3215a51-3215a5d 556->558 559 3215a60 556->559 557->556 558->559 561 3215a61 559->561 561->561
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 032159C9
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1849824421.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_3210000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 13a771037d9acbdfdfdd5e2a0090607fdfc7f558945eefef683346dacd419c5a
                                          • Instruction ID: 0e8b900c03b5b921cb8942f86dad4d3afbe3fa869c786024a920f0a06710a6e9
                                          • Opcode Fuzzy Hash: 13a771037d9acbdfdfdd5e2a0090607fdfc7f558945eefef683346dacd419c5a
                                          • Instruction Fuzzy Hash: 114103B0C00729CEDB14CFA9C9847DEBBF5BF89314F2480AAD408AB265DB755985CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 562 32144b0-32159d9 CreateActCtxA 565 32159e2-3215a3c 562->565 566 32159db-32159e1 562->566 573 3215a4b-3215a4f 565->573 574 3215a3e-3215a41 565->574 566->565 575 3215a51-3215a5d 573->575 576 3215a60 573->576 574->573 575->576 578 3215a61 576->578 578->578
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 032159C9
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1849824421.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_3210000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 73d226aa1e51912627b3dfad8bd68f360fe27d73d373ead191ca1bc6b9ef7217
                                          • Instruction ID: 24680e7cdfb21b3ad88f0e7dc95c890fc9e1641912f0c8e078e61842dbc4b2d2
                                          • Opcode Fuzzy Hash: 73d226aa1e51912627b3dfad8bd68f360fe27d73d373ead191ca1bc6b9ef7217
                                          • Instruction Fuzzy Hash: 1A41E3B0C00729CBDB24CFA9C98468DBBF5BF59304F2480A9D408AB255DB756985CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 579 5293740-5293796 581 5293798-52937a4 579->581 582 52937a6-52937e5 WriteProcessMemory 579->582 581->582 584 52937ee-529381e 582->584 585 52937e7-52937ed 582->585 585->584
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 052937D8
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 412d01b6ac106e60e9e939e4b8c1a956ac8a1b9a21154a9f8e9334a2620d4ac5
                                          • Instruction ID: da37b6b2a3420859a7c706b4f5d60b9131ff4d2ff2f99e02ba38e97f3e906b12
                                          • Opcode Fuzzy Hash: 412d01b6ac106e60e9e939e4b8c1a956ac8a1b9a21154a9f8e9334a2620d4ac5
                                          • Instruction Fuzzy Hash: 992135B5910259DFCB10CFA9C884BEEBBF5FF48314F10882AE559A7250C7789944CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 589 5293748-5293796 591 5293798-52937a4 589->591 592 52937a6-52937e5 WriteProcessMemory 589->592 591->592 594 52937ee-529381e 592->594 595 52937e7-52937ed 592->595 595->594
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 052937D8
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 81b594a8f97b69d01ce3058c1b4352075d2c93cbc5b6f9261ec1eaaffc637788
                                          • Instruction ID: ddd32393f64665868b25c39b254b871be42312e7cba2bbb591369f2951e18cbf
                                          • Opcode Fuzzy Hash: 81b594a8f97b69d01ce3058c1b4352075d2c93cbc5b6f9261ec1eaaffc637788
                                          • Instruction Fuzzy Hash: 3D2127B59003599FCF10CFA9C885BDEBBF5FF48314F108829E959A7250C778A944CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 599 321ce10-321d5dc DuplicateHandle 602 321d5e5-321d602 599->602 603 321d5de-321d5e4 599->603 603->602
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0321D50E,?,?,?,?,?), ref: 0321D5CF
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1849824421.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_3210000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: f30f3ebce48ccc31f49504e59fa04386b3ac3913e30d2fd8b47453cb21499ada
                                          • Instruction ID: 75ba94903e3a9d7f3ddd7c87dd18303f84e1fd43f922fc4f6ff4ecf94055e324
                                          • Opcode Fuzzy Hash: f30f3ebce48ccc31f49504e59fa04386b3ac3913e30d2fd8b47453cb21499ada
                                          • Instruction Fuzzy Hash: 9721E3B5900258EFDB10CFAAD584AEEFFF4EB58314F14841AE954A7310D378A950CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 606 321d540-321d542 607 321d544-321d547 606->607 608 321d549-321d5dc DuplicateHandle 606->608 607->608 609 321d5e5-321d602 608->609 610 321d5de-321d5e4 608->610 610->609
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0321D50E,?,?,?,?,?), ref: 0321D5CF
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1849824421.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_3210000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 30f46203ff4e044e96b6d1d51fa93eb8bb697c51ca3fcacd5b5c7024210f914e
                                          • Instruction ID: 56ab1dd8c27309427d2b3406709804fdc5d3812c70afe8d1d63b929d8f243e62
                                          • Opcode Fuzzy Hash: 30f46203ff4e044e96b6d1d51fa93eb8bb697c51ca3fcacd5b5c7024210f914e
                                          • Instruction Fuzzy Hash: FC21F2B5900248EFDB10CFA9D584AEEBBF4FB48314F14845AE958A7210D375A950CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 613 5293171-52931c3 615 52931d3-5293203 Wow64SetThreadContext 613->615 616 52931c5-52931d1 613->616 618 529320c-529323c 615->618 619 5293205-529320b 615->619 616->615 619->618
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 052931F6
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: f4be28e09357c4c2d6c34e7bb8191c8466b221652f8cb22f91844e896a0e073e
                                          • Instruction ID: 2b1435eb81e5b7fd7930db69c403f6d8593f34509f7f7a9e2970110192b70c15
                                          • Opcode Fuzzy Hash: f4be28e09357c4c2d6c34e7bb8191c8466b221652f8cb22f91844e896a0e073e
                                          • Instruction Fuzzy Hash: 6F2125B59002098FDB14DFA9C5857EEBBF4EF48314F10842AD459A7251C7789945CFA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 623 5293178-52931c3 625 52931d3-5293203 Wow64SetThreadContext 623->625 626 52931c5-52931d1 623->626 628 529320c-529323c 625->628 629 5293205-529320b 625->629 626->625 629->628
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 052931F6
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 9c9f2a5bffced5c15c587d9c2860a3ff4f11b6b534456bd78418456bc61af7d6
                                          • Instruction ID: 060bc500bf81ea4f61d551a3dfd4bc3fd7f839930f2bcb3150d98096155f26b7
                                          • Opcode Fuzzy Hash: 9c9f2a5bffced5c15c587d9c2860a3ff4f11b6b534456bd78418456bc61af7d6
                                          • Instruction Fuzzy Hash: 792138B1D002098FDB14DFAAC485BEEBBF4FF48324F10842AD459A7250C778A944CFA5
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 052938B8
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 4dfc76fdb05a0c6a3e437d5245d130caa5cd4b79f17d3d9aa81c1bd9f88d2740
                                          • Instruction ID: 31a9fa2e57f3f118280b7bdc324db994af003d5338534471f090b8d812e1f6c0
                                          • Opcode Fuzzy Hash: 4dfc76fdb05a0c6a3e437d5245d130caa5cd4b79f17d3d9aa81c1bd9f88d2740
                                          • Instruction Fuzzy Hash: 862139B1D003599FCB10DFAAC880ADEFBF5FF48314F108429E559A7250C778A544CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 633 5293830-52938c5 ReadProcessMemory 636 52938ce-52938fe 633->636 637 52938c7-52938cd 633->637 637->636
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 052938B8
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 19f74a17beb06f98a36de7095934a3a51337671302e0397ff20ff25b86866702
                                          • Instruction ID: 78dc72f5a7f757b854410487267f91b0ce17d039cd3daaf9f7e07fb98669e474
                                          • Opcode Fuzzy Hash: 19f74a17beb06f98a36de7095934a3a51337671302e0397ff20ff25b86866702
                                          • Instruction Fuzzy Hash: D12145B1D00259DFDB10DFA9C980BEEBBF1FF48324F10882AE558A7250D7389544CBA0
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 052932BE
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 43ee1b8803358f6599c06bd4a359fcbda37b83a918611d0a5a7f900387601762
                                          • Instruction ID: f756d2b60f58700d4fb298713dbf4446513737e39e14b634ec13cb2a51167a4e
                                          • Opcode Fuzzy Hash: 43ee1b8803358f6599c06bd4a359fcbda37b83a918611d0a5a7f900387601762
                                          • Instruction Fuzzy Hash: AC1117719002499FCB14DFA9C844ADEFFF5EF88314F108819E559A7250C7759954CFA0
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0321B341,00000800,00000000,00000000), ref: 0321B552
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1849824421.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_3210000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 488661fec0e7e3681f2b67b9efbc654d30f7638dff817fe9361fa58fb5b3f117
                                          • Instruction ID: 91e1135f5266ab6595184e3ae4a7be828c284c740df64a39e74dbcad9f7dc39f
                                          • Opcode Fuzzy Hash: 488661fec0e7e3681f2b67b9efbc654d30f7638dff817fe9361fa58fb5b3f117
                                          • Instruction Fuzzy Hash: CF1123B6D003499FDB20CF9AC584ADEFBF4EB58314F14842AE459A7210C379A585CFA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 999b165c6f214082f0b6d12fe0030d1bb071d01a4a165c75049d2710d8de2288
                                          • Instruction ID: b580f96ec2d72806945b517bb14c0c3354e0a8aaa4240227d656b4d0077f356c
                                          • Opcode Fuzzy Hash: 999b165c6f214082f0b6d12fe0030d1bb071d01a4a165c75049d2710d8de2288
                                          • Instruction Fuzzy Hash: 3D1155B5D002488FDB10DFAAC4457EEFBF4EF88324F20881AD559A7250CA79A544CFA4
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 052932BE
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 4c9f57158335fc7d2a0ee9dbf9b963f1a119d80d6ea5ada5425cd954eaf3cac1
                                          • Instruction ID: b3c175b343f632d81723f639bd4eb02f5e6c0ad76050347d253880c927b1da0b
                                          • Opcode Fuzzy Hash: 4c9f57158335fc7d2a0ee9dbf9b963f1a119d80d6ea5ada5425cd954eaf3cac1
                                          • Instruction Fuzzy Hash: 431126719002499FCB10DFAAC844ADFFBF5EF88324F108819E559A7250C775A944CFA5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,0321B08C), ref: 0321B2C6
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1849824421.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_3210000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: af4b6cc5b097ad7b7973377ac9a63c177f646db43da54cf579b735f805079e6b
                                          • Instruction ID: 9aee1042729810fe5e733f33b86c763a5edc345f46f31fcf3779e053885e174a
                                          • Opcode Fuzzy Hash: af4b6cc5b097ad7b7973377ac9a63c177f646db43da54cf579b735f805079e6b
                                          • Instruction Fuzzy Hash: 261120B5D002498FCB10CF9AC944A9EFBF4AB88324F10842AD858A7610C379A584CFA1
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0321B341,00000800,00000000,00000000), ref: 0321B552
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1849824421.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_3210000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 1b1921b598733b60ee95409f83b4f2aba97628fe7f27b9aa4bdf76c138e25b7d
                                          • Instruction ID: e0efccadfe28a6c71c7483fbb1ffadc42a3e6f04f8a5ddf72f183765f864ce5c
                                          • Opcode Fuzzy Hash: 1b1921b598733b60ee95409f83b4f2aba97628fe7f27b9aa4bdf76c138e25b7d
                                          • Instruction Fuzzy Hash: B51162B6D003499FDB20CFAAC584BDEFBF4AB58314F14842ED459A7210C378A584CFA4
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 5d7f873ccd88208c953611ab50608bfa13869eb4c0cbb14fe017acadfd3a65fc
                                          • Instruction ID: 46dd5378473e7766dd73947164127f0a0bfef4ef1f95fd7e0ee940d4e734ed01
                                          • Opcode Fuzzy Hash: 5d7f873ccd88208c953611ab50608bfa13869eb4c0cbb14fe017acadfd3a65fc
                                          • Instruction Fuzzy Hash: D1113AB1D002498FCB14DFAAC4457DEFBF4EF88324F208419D559A7250C775A544CF95
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 05297545
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 096e7ccc67bb490a443e9efa6051c53723d1beb350df4cae1b30e6cce367e495
                                          • Instruction ID: 10f85fc9ee256e00a071fff5d501039983186a965e6e750bd1f45eb36fb2a19f
                                          • Opcode Fuzzy Hash: 096e7ccc67bb490a443e9efa6051c53723d1beb350df4cae1b30e6cce367e495
                                          • Instruction Fuzzy Hash: 821122B5810348DFCB10DF8AC488BDEBBF8EB48324F10841AE958A7310C375AA44CFA5
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 05297545
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1852494582.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5290000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 588f0880511a323722ca8fb12fcdca8081160c6fd9d4ed7460d0a2ff29bda545
                                          • Instruction ID: 161d98463f2ec4647cafeb2cb060c5c12fa64fa4d0e54dff5d3d3379641f9a89
                                          • Opcode Fuzzy Hash: 588f0880511a323722ca8fb12fcdca8081160c6fd9d4ed7460d0a2ff29bda545
                                          • Instruction Fuzzy Hash: 9411F2B5900249DFDB10CF99C488BDEBFF4EB48324F14845AE558A7610C375A984CFA5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,0321B08C), ref: 0321B2C6
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1849824421.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_3210000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: a56b35d26b4be17517077d388f0e9d766b06af7794dc98979456c35d318da974
                                          • Instruction ID: db1216432ad56bcd73f40b70bd21e5a7270cc21552b9c76d0fbf82c136631c6e
                                          • Opcode Fuzzy Hash: a56b35d26b4be17517077d388f0e9d766b06af7794dc98979456c35d318da974
                                          • Instruction Fuzzy Hash: BC1110B6C006498FDB10CF9AC544BDEFBF4AF48314F14846AC468B7650C379A589CFA5
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1848370236.00000000014ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 014ED000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_14ed000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d4e743370341f798c2e28456c482a18c664f3fd5b04006da57590c2f25670b22
                                          • Instruction ID: 2029fe912ac2e1de8db6d3a7b7f07dba1d032319e61dc95dda833ff82aeb7792
                                          • Opcode Fuzzy Hash: d4e743370341f798c2e28456c482a18c664f3fd5b04006da57590c2f25670b22
                                          • Instruction Fuzzy Hash: F7210371900240DFDB05DF58D9C8B2BBFA5FB88319F20C56AE9090B266C336D456CBA1
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1848481350.00000000014FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_14fd000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ff308cbdfc9191221db338b738b2ed84d26cd90259f5579116008697da2857f4
                                          • Instruction ID: 048dc5551fa51f23c7a431d405fbc56e231a3901ff1d8f16bbdcca57ca1b2736
                                          • Opcode Fuzzy Hash: ff308cbdfc9191221db338b738b2ed84d26cd90259f5579116008697da2857f4
                                          • Instruction Fuzzy Hash: 8921F5B1904200DFDB15DF58D984B17BFA5EB84358F20C56EDA0A4B366C336D447CA61
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1848481350.00000000014FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_14fd000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9f2f1cf028154d393c2f56da69e7bf3fba4e1ae0431dac529b61d4cbff4dfa4f
                                          • Instruction ID: aabd035040b5689dbd703250c4652617fc999e2d5df3b75266b5df78d6c8cda3
                                          • Opcode Fuzzy Hash: 9f2f1cf028154d393c2f56da69e7bf3fba4e1ae0431dac529b61d4cbff4dfa4f
                                          • Instruction Fuzzy Hash: 2B212975904200DFDB05DF98D9C4B26BBA5FB84324F20C56EDA094B366C736D446CAA1
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1848481350.00000000014FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_14fd000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2c8bd3b0d2394cfa64017e3803c99c4c9add240b556974c7d652ef57024ecbb1
                                          • Instruction ID: 6ba835cfd4a3a7ca9a8d1bbe26e20bbb12954a38d4321c756325b4ff5e288612
                                          • Opcode Fuzzy Hash: 2c8bd3b0d2394cfa64017e3803c99c4c9add240b556974c7d652ef57024ecbb1
                                          • Instruction Fuzzy Hash: ED216D755093808FDB06CF24D594716BF71EB46218F28C5EAD9498B7A7C33A980ACB62
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1848370236.00000000014ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 014ED000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_14ed000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: e32c9c1460cf27672635a417a8813b7fc590bacd5b40cc3d6ea7c4b6b6b49ad6
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 4611B176904280CFDB16CF54D9C4B16BFB1FB84318F24C6AAD9490B666C336D45ACBA1
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1848481350.00000000014FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_14fd000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 7d3111f35e6f451ebaa1be94c88e30e844386953409ea3e3ffeeaf3573bb19cb
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: 4911BE79904240DFDB02CF54C5C4B16BF61FB84224F24C6AED9494B366C33AD40ACB92

                                          Execution Graph

                                          Execution Coverage:10.3%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:136
                                          Total number of Limit Nodes:9
                                          execution_graph 47913 6b7e010 47914 6b7e078 CreateWindowExW 47913->47914 47916 6b7e134 47914->47916 47916->47916 48083 6b73ae0 DuplicateHandle 48084 6b73b76 48083->48084 47917 6b73898 47918 6b738de GetCurrentProcess 47917->47918 47920 6b73930 GetCurrentThread 47918->47920 47921 6b73929 47918->47921 47922 6b73966 47920->47922 47923 6b7396d GetCurrentProcess 47920->47923 47921->47920 47922->47923 47926 6b739a3 47923->47926 47924 6b739cb GetCurrentThreadId 47925 6b739fc 47924->47925 47926->47924 47927 1270848 47929 127084e 47927->47929 47928 127091b 47929->47928 47933 127138f 47929->47933 47944 6b72b90 47929->47944 47948 6b72b82 47929->47948 47935 1271393 47933->47935 47934 12714ba 47934->47929 47935->47934 47952 1278160 47935->47952 47956 1278150 47935->47956 47960 1278858 47935->47960 47965 1277f91 47935->47965 47970 1277f32 47935->47970 47975 1277ef4 47935->47975 47980 1277db9 47935->47980 47985 1277dc8 47935->47985 47945 6b72b9f 47944->47945 48016 6b72780 47945->48016 47949 6b72b9f 47948->47949 47950 6b72780 2 API calls 47949->47950 47951 6b72bc0 47950->47951 47951->47929 47954 127817f 47952->47954 47953 127823a 47953->47935 47954->47953 47990 1277840 47954->47990 47958 127817f 47956->47958 47957 127823a 47957->47935 47958->47957 47959 1277840 MoveFileA 47958->47959 47959->47957 47961 1278862 47960->47961 47962 127887c 47961->47962 47994 6bdf609 47961->47994 47999 6bdf618 47961->47999 47962->47935 47966 1277f96 47965->47966 48004 1278031 47966->48004 48008 1278040 47966->48008 47967 1278023 47967->47935 47972 1277f37 47970->47972 47971 1278023 47971->47935 47973 1278031 DeleteFileW 47972->47973 47974 1278040 DeleteFileW 47972->47974 47973->47971 47974->47971 47977 1277ef9 47975->47977 47976 1278023 47976->47935 47978 1278031 DeleteFileW 47977->47978 47979 1278040 DeleteFileW 47977->47979 47978->47976 47979->47976 47982 1277de1 47980->47982 47981 1278023 47981->47935 47982->47981 47983 1278031 DeleteFileW 47982->47983 47984 1278040 DeleteFileW 47982->47984 47983->47981 47984->47981 47987 1277de1 47985->47987 47986 1278023 47986->47935 47987->47986 47988 1278031 DeleteFileW 47987->47988 47989 1278040 DeleteFileW 47987->47989 47988->47986 47989->47986 47991 1278670 MoveFileA 47990->47991 47993 127870f 47991->47993 47993->47953 47996 6bdf612 47994->47996 47995 6bdf842 47995->47962 47996->47995 47997 6bdf868 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47996->47997 47998 6bdf857 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47996->47998 47997->47996 47998->47996 48000 6bdf62d 47999->48000 48001 6bdf842 48000->48001 48002 6bdf868 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 48000->48002 48003 6bdf857 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 48000->48003 48001->47962 48002->48000 48003->48000 48005 1278050 48004->48005 48006 1278082 48005->48006 48012 127781c 48005->48012 48006->47967 48009 1278050 48008->48009 48010 1278082 48009->48010 48011 127781c DeleteFileW 48009->48011 48010->47967 48011->48010 48013 12780a0 DeleteFileW 48012->48013 48015 127811f 48013->48015 48015->48006 48017 6b7278b 48016->48017 48020 6b7373c 48017->48020 48019 6b74135 48019->48019 48021 6b73747 48020->48021 48022 6b7478c 48021->48022 48025 6b763e0 48021->48025 48030 6b76408 48021->48030 48022->48019 48026 6b763e6 48025->48026 48027 6b7644d 48026->48027 48035 6b765b6 48026->48035 48039 6b765b8 48026->48039 48027->48022 48031 6b76429 48030->48031 48032 6b7644d 48031->48032 48033 6b765b6 2 API calls 48031->48033 48034 6b765b8 2 API calls 48031->48034 48032->48022 48033->48032 48034->48032 48036 6b765c5 48035->48036 48038 6b765fe 48036->48038 48043 6b75364 48036->48043 48038->48027 48040 6b765c5 48039->48040 48041 6b765fe 48040->48041 48042 6b75364 2 API calls 48040->48042 48041->48027 48042->48041 48044 6b7536f 48043->48044 48046 6b76670 48044->48046 48047 6b75398 48044->48047 48046->48046 48048 6b753a3 48047->48048 48054 6b753a8 48048->48054 48050 6b766df 48058 6b7bb78 48050->48058 48064 6b7bb60 48050->48064 48051 6b76719 48051->48046 48057 6b753b3 48054->48057 48055 6b77ae8 48055->48050 48056 6b76408 2 API calls 48056->48055 48057->48055 48057->48056 48060 6b7bbf5 48058->48060 48061 6b7bba9 48058->48061 48059 6b7bbb5 48059->48051 48060->48051 48061->48059 48069 6b7bdf0 48061->48069 48072 6b7bde0 48061->48072 48065 6b7bb6a 48064->48065 48066 6b7bbb5 48065->48066 48067 6b7bdf0 2 API calls 48065->48067 48068 6b7bde0 2 API calls 48065->48068 48066->48051 48067->48066 48068->48066 48075 6b7be30 48069->48075 48070 6b7bdfa 48070->48060 48073 6b7bdfa 48072->48073 48074 6b7be30 2 API calls 48072->48074 48073->48060 48074->48073 48076 6b7be51 48075->48076 48078 6b7be74 48075->48078 48076->48078 48081 6b7c0c9 LoadLibraryExW 48076->48081 48082 6b7c0d8 LoadLibraryExW 48076->48082 48077 6b7be6c 48077->48078 48079 6b7c078 GetModuleHandleW 48077->48079 48078->48070 48080 6b7c0a5 48079->48080 48080->48070 48081->48077 48082->48077
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: 6d36be08c202d32dcb6dc44f290ac3cf5f8d39478e6ec55f4cbd5d1d6d8cbd7d
                                          • Instruction ID: a8533effde6447555d3e74f662d36006e258ddcc5831ca08c08e915541675d90
                                          • Opcode Fuzzy Hash: 6d36be08c202d32dcb6dc44f290ac3cf5f8d39478e6ec55f4cbd5d1d6d8cbd7d
                                          • Instruction Fuzzy Hash: F6D25574E00209CFCB64DB68C594A9DB7F2FF89300F54D5AAD409AB265EB34ED85CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2102 6bd7968-6bd7986 2103 6bd7988-6bd798b 2102->2103 2104 6bd798d-6bd79a7 2103->2104 2105 6bd79ac-6bd79af 2103->2105 2104->2105 2106 6bd79bc-6bd79bf 2105->2106 2107 6bd79b1-6bd79bb 2105->2107 2109 6bd79c1-6bd79dd 2106->2109 2110 6bd79e2-6bd79e5 2106->2110 2109->2110 2111 6bd79fc-6bd79fe 2110->2111 2112 6bd79e7-6bd79f5 2110->2112 2113 6bd7a05-6bd7a08 2111->2113 2114 6bd7a00 2111->2114 2118 6bd7a0e-6bd7a24 2112->2118 2119 6bd79f7 2112->2119 2113->2103 2113->2118 2114->2113 2122 6bd7c3f-6bd7c49 2118->2122 2123 6bd7a2a-6bd7a33 2118->2123 2119->2111 2124 6bd7a39-6bd7a56 2123->2124 2125 6bd7c4a-6bd7c7f 2123->2125 2134 6bd7c2c-6bd7c39 2124->2134 2135 6bd7a5c-6bd7a84 2124->2135 2128 6bd7c81-6bd7c84 2125->2128 2129 6bd7eb9-6bd7ebc 2128->2129 2130 6bd7c8a-6bd7c99 2128->2130 2132 6bd7edf-6bd7ee2 2129->2132 2133 6bd7ebe-6bd7eda 2129->2133 2140 6bd7cb8-6bd7cfc 2130->2140 2141 6bd7c9b-6bd7cb6 2130->2141 2136 6bd7f8d-6bd7f8f 2132->2136 2137 6bd7ee8-6bd7ef4 2132->2137 2133->2132 2134->2122 2134->2123 2135->2134 2155 6bd7a8a-6bd7a93 2135->2155 2143 6bd7f96-6bd7f99 2136->2143 2144 6bd7f91 2136->2144 2146 6bd7eff-6bd7f01 2137->2146 2158 6bd7e8d-6bd7ea3 2140->2158 2159 6bd7d02-6bd7d13 2140->2159 2141->2140 2143->2128 2145 6bd7f9f-6bd7fa8 2143->2145 2144->2143 2147 6bd7f19-6bd7f1d 2146->2147 2148 6bd7f03-6bd7f09 2146->2148 2156 6bd7f1f-6bd7f29 2147->2156 2157 6bd7f2b 2147->2157 2153 6bd7f0d-6bd7f0f 2148->2153 2154 6bd7f0b 2148->2154 2153->2147 2154->2147 2155->2125 2162 6bd7a99-6bd7ab5 2155->2162 2160 6bd7f30-6bd7f32 2156->2160 2157->2160 2158->2129 2167 6bd7d19-6bd7d36 2159->2167 2168 6bd7e78-6bd7e87 2159->2168 2164 6bd7f34-6bd7f37 2160->2164 2165 6bd7f43-6bd7f7c 2160->2165 2172 6bd7abb-6bd7ae5 2162->2172 2173 6bd7c1a-6bd7c26 2162->2173 2164->2145 2165->2130 2185 6bd7f82-6bd7f8c 2165->2185 2167->2168 2179 6bd7d3c-6bd7e32 call 6bd6190 2167->2179 2168->2158 2168->2159 2186 6bd7aeb-6bd7b13 2172->2186 2187 6bd7c10-6bd7c15 2172->2187 2173->2134 2173->2155 2235 6bd7e34-6bd7e3e 2179->2235 2236 6bd7e40 2179->2236 2186->2187 2193 6bd7b19-6bd7b47 2186->2193 2187->2173 2193->2187 2199 6bd7b4d-6bd7b56 2193->2199 2199->2187 2201 6bd7b5c-6bd7b8e 2199->2201 2208 6bd7b99-6bd7bb5 2201->2208 2209 6bd7b90-6bd7b94 2201->2209 2208->2173 2211 6bd7bb7-6bd7c0e call 6bd6190 2208->2211 2209->2187 2210 6bd7b96 2209->2210 2210->2208 2211->2173 2237 6bd7e45-6bd7e47 2235->2237 2236->2237 2237->2168 2238 6bd7e49-6bd7e4e 2237->2238 2239 6bd7e5c 2238->2239 2240 6bd7e50-6bd7e5a 2238->2240 2241 6bd7e61-6bd7e63 2239->2241 2240->2241 2241->2168 2242 6bd7e65-6bd7e71 2241->2242 2242->2168
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: 61b5e9ff9133be4fd1aeddfe767be8312da0df95e9c6b6444e933a99fb72138f
                                          • Instruction ID: 68c98d044d989e2cd01467ac93f8730bff2fab0f3510d2f66e2e609f772432f6
                                          • Opcode Fuzzy Hash: 61b5e9ff9133be4fd1aeddfe767be8312da0df95e9c6b6444e933a99fb72138f
                                          • Instruction Fuzzy Hash: AF027B71B102069FDB54DF64D590AAEB7E2FB84304F2489B9D405AB395EF35EC82CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2244 6bd58e8-6bd58f8 2245 6bd58fa-6bd58fd 2244->2245 2246 6bd58ff-6bd591e 2245->2246 2247 6bd5934-6bd5937 2245->2247 2263 6bd5920 2246->2263 2264 6bd5923-6bd5929 2246->2264 2248 6bd5939-6bd593b 2247->2248 2249 6bd5940-6bd5943 2247->2249 2248->2249 2251 6bd5945-6bd594a 2249->2251 2252 6bd5961-6bd5964 2249->2252 2255 6bd594c 2251->2255 2256 6bd594f-6bd595c 2251->2256 2253 6bd5966-6bd596c 2252->2253 2254 6bd5973-6bd5976 2252->2254 2253->2246 2257 6bd596e 2253->2257 2254->2253 2258 6bd5978-6bd597b 2254->2258 2255->2256 2256->2252 2257->2254 2261 6bd597d-6bd597f 2258->2261 2262 6bd5982-6bd5984 2258->2262 2261->2262 2265 6bd598b-6bd598e 2262->2265 2266 6bd5986 2262->2266 2263->2264 2267 6bd599d-6bd59da 2264->2267 2268 6bd592b-6bd592f 2264->2268 2265->2245 2269 6bd5994-6bd599c 2265->2269 2266->2265 2271 6bd59dc-6bd59df 2267->2271 2268->2247 2272 6bd59ef-6bd59f2 2271->2272 2273 6bd59e1-6bd59e8 2271->2273 2276 6bd59f4-6bd59fd 2272->2276 2277 6bd5a00-6bd5a03 2272->2277 2274 6bd59ea 2273->2274 2275 6bd5a40-6bd5a47 2273->2275 2274->2272 2280 6bd5a4d-6bd5a94 2275->2280 2281 6bd5b95-6bd5ba8 2275->2281 2278 6bd5a18-6bd5a1b 2277->2278 2279 6bd5a05-6bd5a13 2277->2279 2282 6bd5a1d-6bd5a32 2278->2282 2283 6bd5a37-6bd5a3a 2278->2283 2279->2278 2297 6bd5a96-6bd5aa5 2280->2297 2282->2283 2283->2275 2287 6bd5bb4-6bd5bb6 2283->2287 2289 6bd5bbd-6bd5bc0 2287->2289 2290 6bd5bb8 2287->2290 2289->2271 2292 6bd5bc6-6bd5bd0 2289->2292 2290->2289 2299 6bd5aab-6bd5ac1 2297->2299 2300 6bd5bd3-6bd5c12 2297->2300 2299->2300 2303 6bd5ac7-6bd5acf 2299->2303 2304 6bd5c14-6bd5c17 2300->2304 2303->2297 2305 6bd5ad1-6bd5ad7 2303->2305 2306 6bd5c2f-6bd5c32 2304->2306 2307 6bd5c19-6bd5c2a 2304->2307 2308 6bd5ad9-6bd5adc 2305->2308 2309 6bd5b37-6bd5b87 call 6bd4708 2305->2309 2310 6bd5c45-6bd5c48 2306->2310 2311 6bd5c34-6bd5c40 2306->2311 2307->2306 2308->2300 2312 6bd5ae2-6bd5aed 2308->2312 2359 6bd5b89 2309->2359 2360 6bd5b92 2309->2360 2314 6bd5c4e-6bd5c55 2310->2314 2315 6bd5cd9-6bd5cdc 2310->2315 2311->2310 2312->2300 2318 6bd5af3-6bd5afd 2312->2318 2316 6bd5d0b-6bd5d1e 2314->2316 2317 6bd5c5b-6bd5cc6 2314->2317 2319 6bd5cef-6bd5cf2 2315->2319 2320 6bd5cde-6bd5cea 2315->2320 2365 6bd5ccf-6bd5cd6 2317->2365 2318->2300 2323 6bd5b03-6bd5b0d 2318->2323 2324 6bd5cf4-6bd5cfb 2319->2324 2325 6bd5d06-6bd5d09 2319->2325 2320->2319 2323->2300 2328 6bd5b13-6bd5b28 2323->2328 2324->2314 2330 6bd5d01 2324->2330 2325->2316 2332 6bd5d21-6bd5d24 2325->2332 2328->2300 2335 6bd5b2e-6bd5b35 2328->2335 2330->2325 2333 6bd5d26-6bd5d45 2332->2333 2334 6bd5d62-6bd5d65 2332->2334 2355 6bd5dc1-6bd5dcb 2333->2355 2337 6bd5d7f-6bd5d82 2334->2337 2338 6bd5d67-6bd5d7a 2334->2338 2335->2308 2335->2309 2341 6bd5d98-6bd5d9b 2337->2341 2342 6bd5d84-6bd5d93 2337->2342 2338->2337 2344 6bd5d9d-6bd5daa 2341->2344 2345 6bd5daf-6bd5db1 2341->2345 2342->2341 2344->2345 2350 6bd5db8-6bd5dbb 2345->2350 2351 6bd5db3 2345->2351 2350->2304 2350->2355 2351->2350 2359->2360 2360->2281
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPcq$\Ocq
                                          • API String ID: 0-2802517751
                                          • Opcode ID: ea781d29c5cdc5a4bc4e728f8559781a57fa5938e184441b01b028b131134a3f
                                          • Instruction ID: 460efcb4ae33acd872d3852c64a26c251543463e556615865926d404cce98591
                                          • Opcode Fuzzy Hash: ea781d29c5cdc5a4bc4e728f8559781a57fa5938e184441b01b028b131134a3f
                                          • Instruction Fuzzy Hash: 48D1F6B2B101148FDF64DB68D480AAEBBE2FF89710F2584AAE446DF391DA35DC41C791
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fe69339f5e7882becc17105c63f00fc58785e131024beec59b4b0b1e9306f498
                                          • Instruction ID: f28717bb1df6fc13eb0b7d8a3d40ab9a9171aa4d6f889733f1a7f71a4a1ac58e
                                          • Opcode Fuzzy Hash: fe69339f5e7882becc17105c63f00fc58785e131024beec59b4b0b1e9306f498
                                          • Instruction Fuzzy Hash: 2162A074B002059FDB54DB68D594AADB7F2EF84314F1484A9E406EB391FB35EC86CB81
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cfeb5c2efba835239cc34ac767ff6a757cd5357b52c1e5fe1bc8a372d78e19c3
                                          • Instruction ID: b59f5aa71997a57fcd1f7fbf5ce5ccffa4467a85a7ba14ba86efc36a1a4bb5cd
                                          • Opcode Fuzzy Hash: cfeb5c2efba835239cc34ac767ff6a757cd5357b52c1e5fe1bc8a372d78e19c3
                                          • Instruction Fuzzy Hash: CE32C174B102099FDB54DF68D890BAEBBB6FB88314F108565E405EB355EB34EC82CB91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 54e0638d8af4d9f81faf63b5ecaf442384f150d6647f0a608aff0531b54dcca6
                                          • Instruction ID: 54377fec9ebefff1c70364ba4917d987f98ec488475c932be7b0486ceba0c676
                                          • Opcode Fuzzy Hash: 54e0638d8af4d9f81faf63b5ecaf442384f150d6647f0a608aff0531b54dcca6
                                          • Instruction Fuzzy Hash: 0912F3B6F102059BDB74CB64C8806AEB7A2FB84314F2484A9D85A9F344EB74DC46CB91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ad4326b077c33b7e0c0b3698759812aa155f0c1bb9e701e760f1faa742686ab3
                                          • Instruction ID: fde734a34c64d21794915fa1579737ec833911d26d3c3b44319b47bbffc06b84
                                          • Opcode Fuzzy Hash: ad4326b077c33b7e0c0b3698759812aa155f0c1bb9e701e760f1faa742686ab3
                                          • Instruction Fuzzy Hash: ED2271F0E102098FDF64CB68C5907ADB7B2EB45314F2198AAE419EF391EA35DC85CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 526 6bda8b8-6bda8d6 527 6bda8d8-6bda8db 526->527 528 6bda8dd-6bda8f0 527->528 529 6bda8f5-6bda8f8 527->529 528->529 530 6bda90c-6bda90f 529->530 531 6bda8fa-6bda907 529->531 533 6bda929-6bda92c 530->533 534 6bda911-6bda91a 530->534 531->530 538 6bda94f-6bda952 533->538 539 6bda92e-6bda94a 533->539 536 6bdaaef-6bdab26 534->536 537 6bda920-6bda924 534->537 548 6bdab28-6bdab2b 536->548 537->533 540 6bda954-6bda95d 538->540 541 6bda962-6bda965 538->541 539->538 540->541 542 6bda96b-6bda96e 541->542 543 6bdaad5-6bdaade 541->543 546 6bda978-6bda97b 542->546 547 6bda970-6bda975 542->547 543->534 549 6bdaae4-6bdaaee 543->549 552 6bda97d-6bda981 546->552 553 6bda98c-6bda98e 546->553 547->546 550 6bdab2d-6bdab31 548->550 551 6bdab38-6bdab3b 548->551 555 6bdab51-6bdab8c 550->555 556 6bdab33 550->556 557 6bdab3d-6bdab47 551->557 558 6bdab48-6bdab4b 551->558 552->549 559 6bda987 552->559 560 6bda995-6bda998 553->560 561 6bda990 553->561 570 6bdad7f-6bdad92 555->570 571 6bdab92-6bdab9e 555->571 556->551 558->555 562 6bdadb4-6bdadb7 558->562 559->553 560->527 563 6bda99e-6bda9c2 560->563 561->560 564 6bdadb9-6bdadd5 562->564 565 6bdadda-6bdaddd 562->565 584 6bda9c8-6bda9d7 563->584 585 6bdaad2 563->585 564->565 567 6bdadec-6bdadee 565->567 568 6bdaddf 565->568 573 6bdadf5-6bdadf8 567->573 574 6bdadf0 567->574 650 6bdaddf call 6bdae20 568->650 651 6bdaddf call 6bdae12 568->651 575 6bdad94 570->575 581 6bdabbe-6bdac02 571->581 582 6bdaba0-6bdabb9 571->582 573->548 577 6bdadfe-6bdae08 573->577 574->573 583 6bdad95 575->583 576 6bdade5-6bdade7 576->567 600 6bdac1e-6bdac5d 581->600 601 6bdac04-6bdac16 581->601 582->575 583->583 588 6bda9ef-6bdaa2a call 6bd6190 584->588 589 6bda9d9-6bda9df 584->589 585->543 606 6bdaa2c-6bdaa32 588->606 607 6bdaa42-6bdaa59 588->607 590 6bda9e1 589->590 591 6bda9e3-6bda9e5 589->591 590->588 591->588 608 6bdad44-6bdad59 600->608 609 6bdac63-6bdad3e call 6bd6190 600->609 601->600 611 6bdaa34 606->611 612 6bdaa36-6bdaa38 606->612 619 6bdaa5b-6bdaa61 607->619 620 6bdaa71-6bdaa82 607->620 608->570 609->608 611->607 612->607 621 6bdaa65-6bdaa67 619->621 622 6bdaa63 619->622 625 6bdaa9a-6bdaacb 620->625 626 6bdaa84-6bdaa8a 620->626 621->620 622->620 625->585 628 6bdaa8c 626->628 629 6bdaa8e-6bdaa90 626->629 628->625 629->625 650->576 651->576
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: f99739f91ec91fc57c11b6fe5f06608aed4325af82aaa3f5f4369794af1cd8d6
                                          • Instruction ID: e7e10a11d65ad2618af91cea5d58a0df641e4584f2737a6cf7f2bd0119216f7d
                                          • Opcode Fuzzy Hash: f99739f91ec91fc57c11b6fe5f06608aed4325af82aaa3f5f4369794af1cd8d6
                                          • Instruction Fuzzy Hash: 04E16C70E1020A8FDB69DF68D5946AEB7B2FF85300F108569D409AF355EB35DC86CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1098 6b7388a-6b73927 GetCurrentProcess 1102 6b73930-6b73964 GetCurrentThread 1098->1102 1103 6b73929-6b7392f 1098->1103 1104 6b73966-6b7396c 1102->1104 1105 6b7396d-6b739a1 GetCurrentProcess 1102->1105 1103->1102 1104->1105 1106 6b739a3-6b739a9 1105->1106 1107 6b739aa-6b739c5 call 6b73a6a 1105->1107 1106->1107 1111 6b739cb-6b739fa GetCurrentThreadId 1107->1111 1112 6b73a03-6b73a65 1111->1112 1113 6b739fc-6b73a02 1111->1113 1113->1112
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 06B73916
                                          • GetCurrentThread.KERNEL32 ref: 06B73953
                                          • GetCurrentProcess.KERNEL32 ref: 06B73990
                                          • GetCurrentThreadId.KERNEL32 ref: 06B739E9
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3035514891.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6b70000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 69e6f5b592721d541ec1522c617b93479497c497d935853fceb69f9036a7bf61
                                          • Instruction ID: d762c18cfd6e75c502032c3c54a82fd69bb26455e4d9926151287e2dd8d2632f
                                          • Opcode Fuzzy Hash: 69e6f5b592721d541ec1522c617b93479497c497d935853fceb69f9036a7bf61
                                          • Instruction Fuzzy Hash: 655155B1D003098FDB54DFA9D948BAEBBF1EF48314F208459D06AA73A1DB349984CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1120 6b73898-6b73927 GetCurrentProcess 1124 6b73930-6b73964 GetCurrentThread 1120->1124 1125 6b73929-6b7392f 1120->1125 1126 6b73966-6b7396c 1124->1126 1127 6b7396d-6b739a1 GetCurrentProcess 1124->1127 1125->1124 1126->1127 1128 6b739a3-6b739a9 1127->1128 1129 6b739aa-6b739c5 call 6b73a6a 1127->1129 1128->1129 1133 6b739cb-6b739fa GetCurrentThreadId 1129->1133 1134 6b73a03-6b73a65 1133->1134 1135 6b739fc-6b73a02 1133->1135 1135->1134
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 06B73916
                                          • GetCurrentThread.KERNEL32 ref: 06B73953
                                          • GetCurrentProcess.KERNEL32 ref: 06B73990
                                          • GetCurrentThreadId.KERNEL32 ref: 06B739E9
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3035514891.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6b70000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: c78ce7ae6656fb98072a45f9ca51d4a773e9a030fa4df7dd6ad42d18a9d25953
                                          • Instruction ID: 599a86f74f0ea794122661f7e974c07c0907609fd909f464c3287a139ff0230c
                                          • Opcode Fuzzy Hash: c78ce7ae6656fb98072a45f9ca51d4a773e9a030fa4df7dd6ad42d18a9d25953
                                          • Instruction Fuzzy Hash: 565164B1D003098FDB54DFAAD948B9EBBF1EF48314F208459E06AA7361DB349984CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1142 6bd8d40-6bd8d65 1143 6bd8d67-6bd8d6a 1142->1143 1144 6bd9628-6bd962b 1143->1144 1145 6bd8d70-6bd8d85 1143->1145 1146 6bd962d-6bd964c 1144->1146 1147 6bd9651-6bd9653 1144->1147 1153 6bd8d9d-6bd8db3 1145->1153 1154 6bd8d87-6bd8d8d 1145->1154 1146->1147 1148 6bd965a-6bd965d 1147->1148 1149 6bd9655 1147->1149 1148->1143 1151 6bd9663-6bd966d 1148->1151 1149->1148 1159 6bd8dbe-6bd8dc0 1153->1159 1155 6bd8d8f 1154->1155 1156 6bd8d91-6bd8d93 1154->1156 1155->1153 1156->1153 1160 6bd8dd8-6bd8e49 1159->1160 1161 6bd8dc2-6bd8dc8 1159->1161 1172 6bd8e4b-6bd8e6e 1160->1172 1173 6bd8e75-6bd8e91 1160->1173 1162 6bd8dcc-6bd8dce 1161->1162 1163 6bd8dca 1161->1163 1162->1160 1163->1160 1172->1173 1178 6bd8ebd-6bd8ed8 1173->1178 1179 6bd8e93-6bd8eb6 1173->1179 1184 6bd8eda-6bd8efc 1178->1184 1185 6bd8f03-6bd8f1e 1178->1185 1179->1178 1184->1185 1190 6bd8f20-6bd8f3c 1185->1190 1191 6bd8f43-6bd8f51 1185->1191 1190->1191 1192 6bd8f61-6bd8fdb 1191->1192 1193 6bd8f53-6bd8f5c 1191->1193 1199 6bd8fdd-6bd8ffb 1192->1199 1200 6bd9028-6bd903d 1192->1200 1193->1151 1204 6bd8ffd-6bd900c 1199->1204 1205 6bd9017-6bd9026 1199->1205 1200->1144 1204->1205 1205->1199 1205->1200
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: 94916708c0b710603d523ed15d594690c239bde6b4679f59baa021e22a0d1d1a
                                          • Instruction ID: 21e52bd838d8e801a234ee5c8cd2d33b0c366717eb6c36cb1c27ac257447d152
                                          • Opcode Fuzzy Hash: 94916708c0b710603d523ed15d594690c239bde6b4679f59baa021e22a0d1d1a
                                          • Instruction Fuzzy Hash: 17913F70B0021A9FDB54DF65D850BAFB7F6EBC8604F1085A9C409EB384EF749C868B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1208 6bdcf28-6bdcf43 1209 6bdcf45-6bdcf48 1208->1209 1210 6bdcf4a-6bdcf8c 1209->1210 1211 6bdcf91-6bdcf94 1209->1211 1210->1211 1212 6bdcfdd-6bdcfe0 1211->1212 1213 6bdcf96-6bdcfa5 1211->1213 1217 6bdcfef-6bdcff2 1212->1217 1218 6bdcfe2-6bdcfe4 1212->1218 1214 6bdcfb4-6bdcfc0 1213->1214 1215 6bdcfa7-6bdcfac 1213->1215 1219 6bdd945-6bdd97e 1214->1219 1220 6bdcfc6-6bdcfd8 1214->1220 1215->1214 1223 6bdd00f-6bdd012 1217->1223 1224 6bdcff4-6bdd00a 1217->1224 1221 6bdcfea 1218->1221 1222 6bdd411 1218->1222 1242 6bdd980-6bdd983 1219->1242 1220->1212 1221->1217 1228 6bdd414-6bdd420 1222->1228 1225 6bdd05b-6bdd05e 1223->1225 1226 6bdd014-6bdd056 1223->1226 1224->1223 1230 6bdd0a7-6bdd0aa 1225->1230 1231 6bdd060-6bdd0a2 1225->1231 1226->1225 1234 6bdd16c-6bdd17b 1228->1234 1235 6bdd426-6bdd713 1228->1235 1239 6bdd0ac-6bdd0ae 1230->1239 1240 6bdd0b9-6bdd0bc 1230->1240 1231->1230 1237 6bdd17d-6bdd182 1234->1237 1238 6bdd18a-6bdd196 1234->1238 1421 6bdd719-6bdd71f 1235->1421 1422 6bdd93a-6bdd944 1235->1422 1237->1238 1238->1219 1248 6bdd19c-6bdd1ae 1238->1248 1246 6bdd2cf-6bdd2d8 1239->1246 1247 6bdd0b4 1239->1247 1249 6bdd0be-6bdd100 1240->1249 1250 6bdd105-6bdd108 1240->1250 1243 6bdd985 1242->1243 1244 6bdd992-6bdd995 1242->1244 1468 6bdd985 call 6bdda9d 1243->1468 1469 6bdd985 call 6bddab0 1243->1469 1253 6bdd9b8-6bdd9bb 1244->1253 1254 6bdd997-6bdd9b3 1244->1254 1258 6bdd2da-6bdd2df 1246->1258 1259 6bdd2e7-6bdd2f3 1246->1259 1247->1240 1279 6bdd1b3-6bdd1b6 1248->1279 1249->1250 1256 6bdd10a-6bdd14c 1250->1256 1257 6bdd151-6bdd154 1250->1257 1263 6bdd9bd-6bdd9e9 1253->1263 1264 6bdd9ee-6bdd9f0 1253->1264 1254->1253 1256->1257 1257->1228 1268 6bdd15a-6bdd15d 1257->1268 1258->1259 1265 6bdd2f9-6bdd30d 1259->1265 1266 6bdd404-6bdd409 1259->1266 1261 6bdd98b-6bdd98d 1261->1244 1263->1264 1274 6bdd9f7-6bdd9fa 1264->1274 1275 6bdd9f2 1264->1275 1265->1222 1293 6bdd313-6bdd325 1265->1293 1266->1222 1277 6bdd15f-6bdd164 1268->1277 1278 6bdd167-6bdd16a 1268->1278 1274->1242 1281 6bdd9fc-6bdda0b 1274->1281 1275->1274 1277->1278 1278->1234 1278->1279 1285 6bdd1ff-6bdd202 1279->1285 1286 6bdd1b8-6bdd1fa 1279->1286 1306 6bdda0d-6bdda70 call 6bd6190 1281->1306 1307 6bdda72-6bdda87 1281->1307 1290 6bdd24b-6bdd24e 1285->1290 1291 6bdd204-6bdd246 1285->1291 1286->1285 1299 6bdd297-6bdd29a 1290->1299 1300 6bdd250-6bdd292 1290->1300 1291->1290 1315 6bdd349-6bdd34b 1293->1315 1316 6bdd327-6bdd32d 1293->1316 1301 6bdd2bd-6bdd2bf 1299->1301 1302 6bdd29c-6bdd2b8 1299->1302 1300->1299 1312 6bdd2c6-6bdd2c9 1301->1312 1313 6bdd2c1 1301->1313 1302->1301 1306->1307 1327 6bdda88 1307->1327 1312->1209 1312->1246 1313->1312 1332 6bdd355-6bdd361 1315->1332 1323 6bdd32f 1316->1323 1324 6bdd331-6bdd33d 1316->1324 1330 6bdd33f-6bdd347 1323->1330 1324->1330 1327->1327 1330->1332 1343 6bdd36f 1332->1343 1344 6bdd363-6bdd36d 1332->1344 1347 6bdd374-6bdd376 1343->1347 1344->1347 1347->1222 1351 6bdd37c-6bdd398 call 6bd6190 1347->1351 1362 6bdd39a-6bdd39f 1351->1362 1363 6bdd3a7-6bdd3b3 1351->1363 1362->1363 1363->1266 1365 6bdd3b5-6bdd402 1363->1365 1365->1222 1423 6bdd72e-6bdd737 1421->1423 1424 6bdd721-6bdd726 1421->1424 1423->1219 1425 6bdd73d-6bdd750 1423->1425 1424->1423 1427 6bdd92a-6bdd934 1425->1427 1428 6bdd756-6bdd75c 1425->1428 1427->1421 1427->1422 1429 6bdd75e-6bdd763 1428->1429 1430 6bdd76b-6bdd774 1428->1430 1429->1430 1430->1219 1431 6bdd77a-6bdd79b 1430->1431 1434 6bdd79d-6bdd7a2 1431->1434 1435 6bdd7aa-6bdd7b3 1431->1435 1434->1435 1435->1219 1436 6bdd7b9-6bdd7d6 1435->1436 1436->1427 1439 6bdd7dc-6bdd7e2 1436->1439 1439->1219 1440 6bdd7e8-6bdd801 1439->1440 1442 6bdd91d-6bdd924 1440->1442 1443 6bdd807-6bdd82e 1440->1443 1442->1427 1442->1439 1443->1219 1446 6bdd834-6bdd83e 1443->1446 1446->1219 1447 6bdd844-6bdd85b 1446->1447 1449 6bdd85d-6bdd868 1447->1449 1450 6bdd86a-6bdd885 1447->1450 1449->1450 1450->1442 1455 6bdd88b-6bdd8a4 call 6bd6190 1450->1455 1459 6bdd8a6-6bdd8ab 1455->1459 1460 6bdd8b3-6bdd8bc 1455->1460 1459->1460 1460->1219 1461 6bdd8c2-6bdd916 1460->1461 1461->1442 1468->1261 1469->1261
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q
                                          • API String ID: 0-831282457
                                          • Opcode ID: 966b03639ebfee8c834a4315e586b0cc39cd6a4300fe88445f3048d75c8caeb5
                                          • Instruction ID: 423222f267e38390cfeb90449322ac2423965b5ba7d04724cdb8e7023908fa60
                                          • Opcode Fuzzy Hash: 966b03639ebfee8c834a4315e586b0cc39cd6a4300fe88445f3048d75c8caeb5
                                          • Instruction Fuzzy Hash: 52624170A0060A9FCB55EB68D590A5EB7F2FF85304F108A79D0499F359EB71EC4ACB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1470 6bd4790-6bd47b4 1471 6bd47b6-6bd47b9 1470->1471 1472 6bd47bf-6bd48b7 1471->1472 1473 6bd4e98-6bd4e9b 1471->1473 1493 6bd48bd-6bd4905 1472->1493 1494 6bd493a-6bd4941 1472->1494 1474 6bd4e9d-6bd4eb7 1473->1474 1475 6bd4ebc-6bd4ebe 1473->1475 1474->1475 1477 6bd4ec5-6bd4ec8 1475->1477 1478 6bd4ec0 1475->1478 1477->1471 1480 6bd4ece-6bd4edb 1477->1480 1478->1477 1515 6bd490a call 6bd5039 1493->1515 1516 6bd490a call 6bd5048 1493->1516 1495 6bd49c5-6bd49ce 1494->1495 1496 6bd4947-6bd49b7 1494->1496 1495->1480 1513 6bd49b9 1496->1513 1514 6bd49c2 1496->1514 1507 6bd4910-6bd492c 1510 6bd492e 1507->1510 1511 6bd4937 1507->1511 1510->1511 1511->1494 1513->1514 1514->1495 1515->1507 1516->1507
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fcq$XPcq$\Ocq
                                          • API String ID: 0-3575482020
                                          • Opcode ID: cea412262b335a20cd60fa9023ecc683b7904c3bff82bf21cbabcb0f69611432
                                          • Instruction ID: d045813816f8aed4c7ae5b725eb002f92e5bda78ea0bf0279f5806b489a8f79b
                                          • Opcode Fuzzy Hash: cea412262b335a20cd60fa9023ecc683b7904c3bff82bf21cbabcb0f69611432
                                          • Instruction Fuzzy Hash: 4C618F70F102099FEB549FA5C8547AEBAF6FB88700F20846AE109AB395DF758C418B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2498 6bd8d30-6bd8d65 2499 6bd8d67-6bd8d6a 2498->2499 2500 6bd9628-6bd962b 2499->2500 2501 6bd8d70-6bd8d85 2499->2501 2502 6bd962d-6bd964c 2500->2502 2503 6bd9651-6bd9653 2500->2503 2509 6bd8d9d-6bd8db3 2501->2509 2510 6bd8d87-6bd8d8d 2501->2510 2502->2503 2504 6bd965a-6bd965d 2503->2504 2505 6bd9655 2503->2505 2504->2499 2507 6bd9663-6bd966d 2504->2507 2505->2504 2515 6bd8dbe-6bd8dc0 2509->2515 2511 6bd8d8f 2510->2511 2512 6bd8d91-6bd8d93 2510->2512 2511->2509 2512->2509 2516 6bd8dd8-6bd8e49 2515->2516 2517 6bd8dc2-6bd8dc8 2515->2517 2528 6bd8e4b-6bd8e6e 2516->2528 2529 6bd8e75-6bd8e91 2516->2529 2518 6bd8dcc-6bd8dce 2517->2518 2519 6bd8dca 2517->2519 2518->2516 2519->2516 2528->2529 2534 6bd8ebd-6bd8ed8 2529->2534 2535 6bd8e93-6bd8eb6 2529->2535 2540 6bd8eda-6bd8efc 2534->2540 2541 6bd8f03-6bd8f1e 2534->2541 2535->2534 2540->2541 2546 6bd8f20-6bd8f3c 2541->2546 2547 6bd8f43-6bd8f51 2541->2547 2546->2547 2548 6bd8f61-6bd8fdb 2547->2548 2549 6bd8f53-6bd8f5c 2547->2549 2555 6bd8fdd-6bd8ffb 2548->2555 2556 6bd9028-6bd903d 2548->2556 2549->2507 2560 6bd8ffd-6bd900c 2555->2560 2561 6bd9017-6bd9026 2555->2561 2556->2500 2560->2561 2561->2555 2561->2556
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: 1f85e1681b994d795a91079af611d4a295be19a9c6e701e3b898089854a8716e
                                          • Instruction ID: 50588f5af94069d1451665c8dc7fb4fafdfb5cadc5447c8eed614187af07739a
                                          • Opcode Fuzzy Hash: 1f85e1681b994d795a91079af611d4a295be19a9c6e701e3b898089854a8716e
                                          • Instruction Fuzzy Hash: F0511C70B0020A9FDB54DF74D990BAEB3F6EBC8644F14856AD509EB394EE34DC428B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2564 6b7be30-6b7be4f 2565 6b7be51-6b7be5e call 6b7b1e0 2564->2565 2566 6b7be7b-6b7be7f 2564->2566 2571 6b7be74 2565->2571 2572 6b7be60 2565->2572 2567 6b7be93-6b7bed4 2566->2567 2568 6b7be81-6b7be8b 2566->2568 2575 6b7bed6-6b7bede 2567->2575 2576 6b7bee1-6b7beef 2567->2576 2568->2567 2571->2566 2621 6b7be66 call 6b7c0c9 2572->2621 2622 6b7be66 call 6b7c0d8 2572->2622 2575->2576 2578 6b7bf13-6b7bf15 2576->2578 2579 6b7bef1-6b7bef6 2576->2579 2577 6b7be6c-6b7be6e 2577->2571 2580 6b7bfb0-6b7c070 2577->2580 2581 6b7bf18-6b7bf1f 2578->2581 2582 6b7bf01 2579->2582 2583 6b7bef8-6b7beff call 6b7b1ec 2579->2583 2616 6b7c072-6b7c075 2580->2616 2617 6b7c078-6b7c0a3 GetModuleHandleW 2580->2617 2586 6b7bf21-6b7bf29 2581->2586 2587 6b7bf2c-6b7bf33 2581->2587 2585 6b7bf03-6b7bf11 2582->2585 2583->2585 2585->2581 2586->2587 2589 6b7bf35-6b7bf3d 2587->2589 2590 6b7bf40-6b7bf49 call 6b7439c 2587->2590 2589->2590 2595 6b7bf56-6b7bf5b 2590->2595 2596 6b7bf4b-6b7bf53 2590->2596 2597 6b7bf5d-6b7bf64 2595->2597 2598 6b7bf79-6b7bf7d 2595->2598 2596->2595 2597->2598 2600 6b7bf66-6b7bf76 call 6b79d48 call 6b7b1fc 2597->2600 2623 6b7bf80 call 6b7c389 2598->2623 2624 6b7bf80 call 6b7c398 2598->2624 2600->2598 2603 6b7bf83-6b7bf86 2605 6b7bfa9-6b7bfaf 2603->2605 2606 6b7bf88-6b7bfa6 2603->2606 2606->2605 2616->2617 2618 6b7c0a5-6b7c0ab 2617->2618 2619 6b7c0ac-6b7c0c0 2617->2619 2618->2619 2621->2577 2622->2577 2623->2603 2624->2603
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 06B7C096
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3035514891.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6b70000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: fd44428d78ec72258ef98236939cb5abaaced0695e17f71d2213fbc2cef4d9d5
                                          • Instruction ID: 8cf7f69043f345afbdf3f515155e6985c4cf812d6d77ab5fd61fab1494589678
                                          • Opcode Fuzzy Hash: fd44428d78ec72258ef98236939cb5abaaced0695e17f71d2213fbc2cef4d9d5
                                          • Instruction Fuzzy Hash: 908156B0A00B059FD764DF29D44479ABBF1FF88304F008AADD4AA9BA50D771E949CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2625 127f760-127f76b 2626 127f795-127f7ab 2625->2626 2627 127f76d-127f794 2625->2627 2647 127f7ad call 127f752 2626->2647 2648 127f7ad call 127f760 2626->2648 2649 127f7ad call 127f7f0 2626->2649 2650 127f7ad call 127f830 2626->2650 2630 127f7b2-127f7b4 2631 127f7b6-127f7b9 2630->2631 2632 127f7ba-127f819 2630->2632 2639 127f81f-127f8ac GlobalMemoryStatusEx 2632->2639 2640 127f81b-127f81e 2632->2640 2643 127f8b5-127f8dd 2639->2643 2644 127f8ae-127f8b4 2639->2644 2644->2643 2647->2630 2648->2630 2649->2630 2650->2630
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.2974659706.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_1270000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 00e01ccc321210e40d40f4688a14bba7ecafe4a5fa22ea332516e66c116b9b6c
                                          • Instruction ID: b62c447d5bd3603072cb8162e5f4dfc9064335db51a3009cf6a5de6ada476916
                                          • Opcode Fuzzy Hash: 00e01ccc321210e40d40f4688a14bba7ecafe4a5fa22ea332516e66c116b9b6c
                                          • Instruction Fuzzy Hash: 4B412172D183998FCB04DF79D84429EBFF5EF89310F1486AAD558A7241DB349841CBD1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2651 6b7e004-6b7e076 2653 6b7e081-6b7e088 2651->2653 2654 6b7e078-6b7e07e 2651->2654 2655 6b7e093-6b7e0cb 2653->2655 2656 6b7e08a-6b7e090 2653->2656 2654->2653 2657 6b7e0d3-6b7e132 CreateWindowExW 2655->2657 2656->2655 2658 6b7e134-6b7e13a 2657->2658 2659 6b7e13b-6b7e173 2657->2659 2658->2659 2663 6b7e175-6b7e178 2659->2663 2664 6b7e180 2659->2664 2663->2664 2665 6b7e181 2664->2665 2665->2665
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06B7E122
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3035514891.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6b70000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 09b0dfc008649f1d926e57092991e49bc4f42d0171dc900617eba3af904ca48d
                                          • Instruction ID: 96f514624d38c0a4e17285ada17f25b86987b277143b2979d059e5bf88b63ebd
                                          • Opcode Fuzzy Hash: 09b0dfc008649f1d926e57092991e49bc4f42d0171dc900617eba3af904ca48d
                                          • Instruction Fuzzy Hash: F151D1B1D00319AFDB14CFA9C885ADEBBF5FF48310F24856AE819AB210D7719985CF91
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06B7E122
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3035514891.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6b70000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 2caf3666e3d336a4468bee2b92b96d1a60092f9fc92cb0984444a76fa8930260
                                          • Instruction ID: 91a94affce7e0e85e6b5b3a139afeb74236f93a865cf3accdb914eaa325448cc
                                          • Opcode Fuzzy Hash: 2caf3666e3d336a4468bee2b92b96d1a60092f9fc92cb0984444a76fa8930260
                                          • Instruction Fuzzy Hash: 0341C0B1D003199FDB14CFA9C884ADEBBB5FF48314F24856AE819AB210D7719985CF91
                                          APIs
                                          • MoveFileA.KERNEL32(?,00000000,?,?), ref: 01278700
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.2974659706.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_1270000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: FileMove
                                          • String ID:
                                          • API String ID: 3562171763-0
                                          • Opcode ID: 66979957d676267bcd10c458b1abff40f45d28ea3a4ea3ffe1d5dc65f72b8a91
                                          • Instruction ID: 73f89974b9449e6dfbac87209f184fc72bf30585e95af621332741f2131d90c6
                                          • Opcode Fuzzy Hash: 66979957d676267bcd10c458b1abff40f45d28ea3a4ea3ffe1d5dc65f72b8a91
                                          • Instruction Fuzzy Hash: 8F2107B6C112199FCB14CF99D884ADEFBF5FB88310F14845AE918BB205D3759944CBA4
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06B73B67
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3035514891.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6b70000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: fe2f09aaa97cf8ab3e627cce997d252ad6be7aab7c10a85ede50ad1ce287fa94
                                          • Instruction ID: 520d1ade9d2c590dddaedb5f6d1530ba2690e68b3116627cf61a08b2bd7940c3
                                          • Opcode Fuzzy Hash: fe2f09aaa97cf8ab3e627cce997d252ad6be7aab7c10a85ede50ad1ce287fa94
                                          • Instruction Fuzzy Hash: 0B21E5B5900218AFDB10CFAAD984ADEBBF8EB48310F14845AE955A7350D374A944CFA5
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06B73B67
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3035514891.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6b70000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: c2670350a5cdb5220972ceaae5cd4745277cd95b43c9e996c4bebc94c51875ae
                                          • Instruction ID: 8c7ecc53eac70ce13bf96f2cff809320ce2b8a6aa4d82ec9b0bfd9312a901e2f
                                          • Opcode Fuzzy Hash: c2670350a5cdb5220972ceaae5cd4745277cd95b43c9e996c4bebc94c51875ae
                                          • Instruction Fuzzy Hash: 3921C4B5900258DFDB10CFAAD984ADEBBF8EB48310F14845AE954A7350D374A944CFA5
                                          APIs
                                          • MoveFileA.KERNEL32(?,00000000,?,?), ref: 01278700
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.2974659706.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_1270000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: FileMove
                                          • String ID:
                                          • API String ID: 3562171763-0
                                          • Opcode ID: 430981a6856e456d4e8c2191a35d6a24b4701542b67f67948478c32c27571f49
                                          • Instruction ID: 345984233ee0ddde4e57e04543b74eee4c27d89c0978fcdde6be37eef20bc956
                                          • Opcode Fuzzy Hash: 430981a6856e456d4e8c2191a35d6a24b4701542b67f67948478c32c27571f49
                                          • Instruction Fuzzy Hash: F62103B6C11219DFCB14CF99D584ADEFBF1BB88310F24846AE918AB204D3759A44CFA4
                                          APIs
                                          • DeleteFileW.KERNELBASE(00000000), ref: 01278110
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.2974659706.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_1270000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: 61594b02493580300dde1adc136e98eec5daec2872ed272ae7af875b637ee66e
                                          • Instruction ID: 612350a24f414c5a7b527defda7cecd1e61e6956fd5b57eec58ec7334f65d510
                                          • Opcode Fuzzy Hash: 61594b02493580300dde1adc136e98eec5daec2872ed272ae7af875b637ee66e
                                          • Instruction Fuzzy Hash: DF2127B1C1065ADBCB14CF9AD4457AEFBF4FB48320F108169D958B7240D378A944CFA5
                                          APIs
                                          • DeleteFileW.KERNELBASE(00000000), ref: 01278110
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.2974659706.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_1270000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: 3f0714cae1fc4c1247dab1b979300f295a999b026fc9653f66115c4eb98876ef
                                          • Instruction ID: c41e8c4130a0b9b72e25a78a73235a641da365c90a29091a9dca383a9ab9c9c4
                                          • Opcode Fuzzy Hash: 3f0714cae1fc4c1247dab1b979300f295a999b026fc9653f66115c4eb98876ef
                                          • Instruction Fuzzy Hash: A42115B1C1061ADBCB14CF99D5457EEFBB4AF08320F14856AD958B7250D338A944CFA5
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 0127F89F
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.2974659706.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_1270000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: 230e4a1f8e7e4156f6c7c0869d4e52759c4f5620af5e588d8e0182bf510f0895
                                          • Instruction ID: c6516d1b810d5b3f78250dec52d8cd536309c26439ca91a6b4ffaaaefa21bac2
                                          • Opcode Fuzzy Hash: 230e4a1f8e7e4156f6c7c0869d4e52759c4f5620af5e588d8e0182bf510f0895
                                          • Instruction Fuzzy Hash: EB1114B1C1066A9BDB10DF9AC5447DEFBF4EF48320F14856AD818B7240D378A944CFA5
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,06B7C111,00000800,00000000,00000000), ref: 06B7C302
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3035514891.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6b70000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 4db847dfd60cd2d8d2a8d9f2a0a2a7d871edad2b5de11f7b46961a9a73214fdb
                                          • Instruction ID: 22bc6310f3b86a7c85a7bb196b855434c150fa1ff0d3e5985003234caac55d41
                                          • Opcode Fuzzy Hash: 4db847dfd60cd2d8d2a8d9f2a0a2a7d871edad2b5de11f7b46961a9a73214fdb
                                          • Instruction Fuzzy Hash: 4411E4B6D003499FDB20CF9AC844ADEFBF4EB48310F14846EE529A7610C375A545CFA5
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,06B7C111,00000800,00000000,00000000), ref: 06B7C302
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3035514891.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6b70000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: b0032f79435eb72d0b24285c015f0c0a65e731caad0a5ee04022638a6041d33c
                                          • Instruction ID: c0417d75800a5aaabd0916e59afa86e9a538ebc67fc0da15f5d197b04c610ca1
                                          • Opcode Fuzzy Hash: b0032f79435eb72d0b24285c015f0c0a65e731caad0a5ee04022638a6041d33c
                                          • Instruction Fuzzy Hash: B711D0B6D002498FDB20CF9AD544A9EBBF5AB88310F14846ED429A7610C375A645CFA5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 06B7C096
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3035514891.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6b70000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 6f51352797f115ffe5d445d8e18707aaf00ecd1596b789caf2ee4134e0b727cb
                                          • Instruction ID: 614d909f2a87638a8165adbf5dcc301ac34c29b479ab0a2c4aef474377d8b3e9
                                          • Opcode Fuzzy Hash: 6f51352797f115ffe5d445d8e18707aaf00ecd1596b789caf2ee4134e0b727cb
                                          • Instruction Fuzzy Hash: 7A110FB6C002498FCB10CF9AC844ADEFBF4EB88324F10846AD829B7210C375A545CFA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPcq
                                          • API String ID: 0-714321711
                                          • Opcode ID: d21318d48236caf2b402f51ad3334af6b82a3623cf059e7541f298f93fa030e8
                                          • Instruction ID: 21bdc4bd23d50b7558fc5eb9ddafcdae4742c883f4030a4b0712ed7919785789
                                          • Opcode Fuzzy Hash: d21318d48236caf2b402f51ad3334af6b82a3623cf059e7541f298f93fa030e8
                                          • Instruction Fuzzy Hash: 67417D70F102099FDB559FA9C854BAEBAF7FF88700F20C529E105AB395DB749C018B91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: 5494b3eb685469affaa2b987d92bee606fb76fa0687b00734cae13db2fd7a043
                                          • Instruction ID: cdf63c48c8b00ba9dde91208f9b4bac1e2e9eabcef694a1e3c94c2776cf916f5
                                          • Opcode Fuzzy Hash: 5494b3eb685469affaa2b987d92bee606fb76fa0687b00734cae13db2fd7a043
                                          • Instruction Fuzzy Hash: 9041CFB0E0030A9FDB64DFA5C45469EBBB2FF85304F208569E455EF284EB70E846CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: 2c11fc4146f4f60d1af4aa90e60fb72eee6aac7d4702a9854731f8a65d2c8766
                                          • Instruction ID: 6c09e15382345f27b3830a14fe9840aa3f3c24700609a4a0856d917ac4b23ba7
                                          • Opcode Fuzzy Hash: 2c11fc4146f4f60d1af4aa90e60fb72eee6aac7d4702a9854731f8a65d2c8766
                                          • Instruction Fuzzy Hash: 5541C070E007099FCB65DFB5C89069EBBB2FF85304F148569E455EB284EBB0E846CB51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: cfe279c726d6e55ce768929f8475e10a0d641c51dac324f24faef66a8429b8d2
                                          • Instruction ID: dcd8549fb8a76475d6e695396ab29c8855c2fa9b4d3e4c8755c74cb90b67ac51
                                          • Opcode Fuzzy Hash: cfe279c726d6e55ce768929f8475e10a0d641c51dac324f24faef66a8429b8d2
                                          • Instruction Fuzzy Hash: B9310371B102418FDB5A9BB0C55466E7BE2EB88204F1085B9D006EF395EF39CD46C7A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: 5c3428f493a468b804e1a09382f137ddafcc5e6074119c27b8c942d67398270a
                                          • Instruction ID: e70a84c98646241f6b3ec2cf8262e9f18a6658cdad0cb624cbd69b6d6a6c2bfc
                                          • Opcode Fuzzy Hash: 5c3428f493a468b804e1a09382f137ddafcc5e6074119c27b8c942d67398270a
                                          • Instruction Fuzzy Hash: 4131F070B102018FDB599BB4D51466E7AE2EB88204F10857CE006DF394EF35DE46C7A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: |
                                          • API String ID: 0-2343686810
                                          • Opcode ID: 5e9b0cdf3d560a0b3436fd92e8a4405e16f58546eef73b04c5c57a5799c186d4
                                          • Instruction ID: d9d924f14d913480cbc956806ab1c1b31c61b5e0cddbc4f3eda6f41e89211f48
                                          • Opcode Fuzzy Hash: 5e9b0cdf3d560a0b3436fd92e8a4405e16f58546eef73b04c5c57a5799c186d4
                                          • Instruction Fuzzy Hash: F3115B74B142249FDB449B78C804B6E7BF5AF48610F1044AAE90AEB3A4EB359D018B85
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: |
                                          • API String ID: 0-2343686810
                                          • Opcode ID: 9ea1bf75a72fcabfa6ec3da9367ec597b436aed29982af0b82a7f95ae739c14c
                                          • Instruction ID: cd6bd624911e7ac1788a5262e8fb3bdfeb21b53a1a5cec1b13fde6711ed828e7
                                          • Opcode Fuzzy Hash: 9ea1bf75a72fcabfa6ec3da9367ec597b436aed29982af0b82a7f95ae739c14c
                                          • Instruction Fuzzy Hash: 5D116D75B102248FDB44DF78D905B6E7BF1AF48700F10446AE50AEB3A4EB359D018B84
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q
                                          • API String ID: 0-388095546
                                          • Opcode ID: a943779d533fad3979649d63089a2d48c44e4e6b9c938e94c4306298ef04ed8d
                                          • Instruction ID: ed7a48e0fc0e7eb6d9c46981376e293336aee951807f59e2822944a7c85dd219
                                          • Opcode Fuzzy Hash: a943779d533fad3979649d63089a2d48c44e4e6b9c938e94c4306298ef04ed8d
                                          • Instruction Fuzzy Hash: 61F0FFB1B1024A9FDF789E44E9906E873A5EB40204F1404FAD908DF245FF31DD05C790
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 75e7783deaf74fd6586ee049bf3deb4a704703ca1225f92c42602f1b30ffec92
                                          • Instruction ID: 6376eacfda79cae7d24f09f3fa63c75d1e8808855cb6694825387e8f2d43ec16
                                          • Opcode Fuzzy Hash: 75e7783deaf74fd6586ee049bf3deb4a704703ca1225f92c42602f1b30ffec92
                                          • Instruction Fuzzy Hash: 81A1A8F0F102098FEF64CB6CC5947AE77A6FB89310F214865E419EB395DA39DC818751
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ae879a64391f49a7aaa8c24d031f657772ea98fad665013133d0bd4761ed2f57
                                          • Instruction ID: dfa8d59b3973c41f1925f296e041df7e0e3f6ea209beafd4ff638d81a2244e6d
                                          • Opcode Fuzzy Hash: ae879a64391f49a7aaa8c24d031f657772ea98fad665013133d0bd4761ed2f57
                                          • Instruction Fuzzy Hash: 15A14AF0E102098BDFA4CF68C4907ADB7A2EB45314F2599AAE419DF351EB34DC86CB51
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cfc4c73c772b5069db5b503a0e24926ff45e8e18e3e2a01a5d54aaacac725a92
                                          • Instruction ID: aaed5ec8f764e713ed278dc35dd2145b7c90edf68c6c14af358006155d69ea89
                                          • Opcode Fuzzy Hash: cfc4c73c772b5069db5b503a0e24926ff45e8e18e3e2a01a5d54aaacac725a92
                                          • Instruction Fuzzy Hash: 2F61C1B2F101114FCB64AA7DC88466FBAD7EFC4610B25447AD80EDB364EE65DD0287C2
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 876040731aa4cefb4f416044b064ba346c4028de6475c2bd5a09e12b1cd6736a
                                          • Instruction ID: 50bc2973112e038eb1e9b0d127df568388e759b7ac9a0c564e2e1632dcf0b4ae
                                          • Opcode Fuzzy Hash: 876040731aa4cefb4f416044b064ba346c4028de6475c2bd5a09e12b1cd6736a
                                          • Instruction Fuzzy Hash: 15817D70B102099FDB44DFA4D59076EBBF6EF89304F108469D40AEB395EB74EC428B82
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 01c51c2e53334eadabc1eb64b9906b3f9937c3c3117ced1c334d91886b797f44
                                          • Instruction ID: 0d179b56f21e42236a7d5f482c54b35c1615731116aa320dc8965e1d87740ff4
                                          • Opcode Fuzzy Hash: 01c51c2e53334eadabc1eb64b9906b3f9937c3c3117ced1c334d91886b797f44
                                          • Instruction Fuzzy Hash: 3D815D70B002099FDB44DFA5D49476EBBF6EB89304F108469D40AEB395EB75EC428B92
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: da8a213cf8075524aa294116dcf00da03a274e55355af1986e62865f1f92c835
                                          • Instruction ID: 6aa42c1a3c3eeab7715006be957faac59cab5043e104cf28d076e5ec8288f46e
                                          • Opcode Fuzzy Hash: da8a213cf8075524aa294116dcf00da03a274e55355af1986e62865f1f92c835
                                          • Instruction Fuzzy Hash: EC915E70E102198FDF60DF68C880B9DB7B1FF85314F208599D549EB295EB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ac1b2195a980b48003f63cc25c3e7a264094d5a5f2d3f36e2240d13f15925f50
                                          • Instruction ID: ca47278229d4da2f6ad775bdb0711bcc33463494eeda5db34b478554ab3278eb
                                          • Opcode Fuzzy Hash: ac1b2195a980b48003f63cc25c3e7a264094d5a5f2d3f36e2240d13f15925f50
                                          • Instruction Fuzzy Hash: FA914C70E1021A8BDF60DF68C880B9DB7B1FF89314F208599D54DAB355EB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c310a7c5a8d470377a10af77bc83f358da187e3e9e43481aa1a21ae1a6390d35
                                          • Instruction ID: c3728ec74de86204491ec3db69586422a97b47d1f68156c01ec208c46ed97198
                                          • Opcode Fuzzy Hash: c310a7c5a8d470377a10af77bc83f358da187e3e9e43481aa1a21ae1a6390d35
                                          • Instruction Fuzzy Hash: 68711BB1A006099FDB54DFA9D990AAEBBF6FF84304F148569D019EF354EB30E846CB50
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 38b2c404bfd6d682038a35f43216d30c4f20af03f6c2ca141bd746ff668d6ed0
                                          • Instruction ID: 64490198510eecdbc5cdfd41b723b8394d98bb163c55dff4ce16b5fa3d46524f
                                          • Opcode Fuzzy Hash: 38b2c404bfd6d682038a35f43216d30c4f20af03f6c2ca141bd746ff668d6ed0
                                          • Instruction Fuzzy Hash: 55710BB0A006099FDB54DFA9D990AAEBBF6FF84304F148469D419EF354EB30E846CB50
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d37bdcbb060a785936570c1274deb5efd4c4a41c30429144168870751e93afe7
                                          • Instruction ID: 5073a2927b76e1d19dafa52f4926f2e4936c7922ab88af3bc8eee1964d37acc3
                                          • Opcode Fuzzy Hash: d37bdcbb060a785936570c1274deb5efd4c4a41c30429144168870751e93afe7
                                          • Instruction Fuzzy Hash: F451C1B1E04109DFDB14AFB8E4546BDBBB6EF88315F1088B9E01ADB250EB35C945CB81
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f80253aa7fdc90c45df2841a57b74980ed8d98eb4253802a487d2915205bf463
                                          • Instruction ID: 644e8e7f841c9ae8bf2cc6e75d42e8a04956365821fa277e143154cf2d677c2a
                                          • Opcode Fuzzy Hash: f80253aa7fdc90c45df2841a57b74980ed8d98eb4253802a487d2915205bf463
                                          • Instruction Fuzzy Hash: CC51EAB0B24208DFEF64666CD86477F395ED789700F104836E10BDB7A8DE69CC458392
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 45510fff18aed4cd194bc4adb7402d98942702f5d160f47b9c4459c9c6875573
                                          • Instruction ID: 333e3274e833683226d3d083851f609f428e70f59400dcc95f2c772099417182
                                          • Opcode Fuzzy Hash: 45510fff18aed4cd194bc4adb7402d98942702f5d160f47b9c4459c9c6875573
                                          • Instruction Fuzzy Hash: F351EBB0B242089FEF64666CD95477F365ED789300F10483AE00BDB7E8DE69CC458392
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 51a321862cbc622a5544e65aaaa5936915788fefd973d12704b432a8a19f4ea9
                                          • Instruction ID: 785695813354334c9481d27bc2f81c731e311a94cee0efc71d28151b497c2334
                                          • Opcode Fuzzy Hash: 51a321862cbc622a5544e65aaaa5936915788fefd973d12704b432a8a19f4ea9
                                          • Instruction Fuzzy Hash: 7F4143B2E006199FDF70CEA9D880AAFFBB1FB84314F104969D116DB654E731A9458B90
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5bfed11bbf0f2ad7e6e030ce284d4fe3e42a4da1762ce50bc903a87011ddd91d
                                          • Instruction ID: 9195fa1b49d7ecd652cb1b92800011fe1f9e0460553bc39f3fd6fe493f89fecd
                                          • Opcode Fuzzy Hash: 5bfed11bbf0f2ad7e6e030ce284d4fe3e42a4da1762ce50bc903a87011ddd91d
                                          • Instruction Fuzzy Hash: 804123B2E04205DFCB14ABB8E45416EBBB6FF84304F10C8BAD04ADB250EF35C8568792
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 775785bf02e5e6f4ae2027e52cb35820ea0261bd49ff3dfc2fb415fbe95da7e8
                                          • Instruction ID: 04e0a804e23c0b8f34db14951b0c8ef9492b4bf5e425de190b327f85688665a5
                                          • Opcode Fuzzy Hash: 775785bf02e5e6f4ae2027e52cb35820ea0261bd49ff3dfc2fb415fbe95da7e8
                                          • Instruction Fuzzy Hash: 2531A4B2E102058FDF748AA9C48077EFBB2FB85324F2498AAD055DB241E635D945CB91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d1998ae170399f7618278713c16ad4e2d71accd1a5f0b05af395ecd8cd86d9f6
                                          • Instruction ID: 68f51e06f0d375319163b26f5eb4821c147b3c3a7a996275c1c78dc46276d950
                                          • Opcode Fuzzy Hash: d1998ae170399f7618278713c16ad4e2d71accd1a5f0b05af395ecd8cd86d9f6
                                          • Instruction Fuzzy Hash: 9B31A370E1030A8FCF25DFA4C990A9EBBB1FF85304F108969E505EB315EB71E9468B91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2b36555263ef7bfd69da3b8c31f3aa4bebe72ebb309c8c236b27d91b21fb4ff2
                                          • Instruction ID: 59c5ebcf62c0b1ececed317dc4e19efe04f71ace5d3bbd26af8e63ef65fc6e2d
                                          • Opcode Fuzzy Hash: 2b36555263ef7bfd69da3b8c31f3aa4bebe72ebb309c8c236b27d91b21fb4ff2
                                          • Instruction Fuzzy Hash: 26319E70E106159BCB19CFA4D85469EBBB2FF89300F10C969E90AEB340EB71A942CB40
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d176e47f02fe7bbf1164c7e3ecdd291cd17410703ce29c62e52a65cf37796fba
                                          • Instruction ID: 7987304bf3a92ec448828b80d4b44a8ee3d58b8fe06af872a25807199ff544b3
                                          • Opcode Fuzzy Hash: d176e47f02fe7bbf1164c7e3ecdd291cd17410703ce29c62e52a65cf37796fba
                                          • Instruction Fuzzy Hash: B8317E70E106199BCB19CFA5D85469EBBF2FF89300F14C569E90AEB740EB71AD42CB40
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 487a16da048aa917d109998bcca191d6611532bdbf8544c2e1a79974699a80cd
                                          • Instruction ID: e854b93dfa0247624593d62bfd869839cbff8575c35eed0becc74f26debc85a1
                                          • Opcode Fuzzy Hash: 487a16da048aa917d109998bcca191d6611532bdbf8544c2e1a79974699a80cd
                                          • Instruction Fuzzy Hash: 8331BF75B200148FCB58DF68D498A5EBBE2FF8C710F2180A9E506DF3A1DA32DC048B90
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8acaa4014cee4650466322edfde8e85cf68ae8189351bbd1ff15e93515414913
                                          • Instruction ID: 4b7ec4167e78c929c0149f473b0a6e2ae8853fc648e7e968a0566c979d974e0b
                                          • Opcode Fuzzy Hash: 8acaa4014cee4650466322edfde8e85cf68ae8189351bbd1ff15e93515414913
                                          • Instruction Fuzzy Hash: E921AEB5F012159FDB10CF78D881AAEBBF1EB48210F148076E909EB381E775DD428B91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2fb6bc608105eef45f91fa54115b896955b3e14ee839fe2b7b6b406875e5a9f4
                                          • Instruction ID: d8f3a87262f10b2f24a835d5f3cfe77474c71ff670ff08d003f55decfcb3afb5
                                          • Opcode Fuzzy Hash: 2fb6bc608105eef45f91fa54115b896955b3e14ee839fe2b7b6b406875e5a9f4
                                          • Instruction Fuzzy Hash: DF213D357200148FCB54DF69D498A5AB7E6FF8D710F2184A9E506DB365DA71EC048B90
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bd200b8bdedfa09dd8903526e74c76c8fc697aa5c5838eef0cd3cbf9363ee5fa
                                          • Instruction ID: f9dda7cb1f9e790f342834814a4575b987782a7b9250b0850a1366eb283bfb1e
                                          • Opcode Fuzzy Hash: bd200b8bdedfa09dd8903526e74c76c8fc697aa5c5838eef0cd3cbf9363ee5fa
                                          • Instruction Fuzzy Hash: 2F219AB5F002099FDB40CF68D880AAEBBF1EB48610F108079E905EB381E775DC418B91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.2973847752.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_11dd000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: df05afeaa378728ceb6c9a4e8b127692a021e5c7f788f9b32f8c2a49906edf9b
                                          • Instruction ID: 61250263b07f5cc67fcb1bdedf9bffd38b1cfa93d3646ae1f44cf34ef731659a
                                          • Opcode Fuzzy Hash: df05afeaa378728ceb6c9a4e8b127692a021e5c7f788f9b32f8c2a49906edf9b
                                          • Instruction Fuzzy Hash: 3B21F271604204DFDF19DF98E980B26BBA5EBC4314F24C56DD9094B296C33AD446CA62
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e994b100f915767d9360744b75464b648b256145159296ae6ef5aad90143407e
                                          • Instruction ID: 1a4fef078fc8f7006046c35be29492d485f07911cfa596fe8a15b32db2150e43
                                          • Opcode Fuzzy Hash: e994b100f915767d9360744b75464b648b256145159296ae6ef5aad90143407e
                                          • Instruction Fuzzy Hash: B62190B2A007058FCB70CFA9CC80AAFFBF2FF84314F104929D1569B654E331A8498B80
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c607840c095b1f4c2143279f1847cb608757b13e6da5533870aa037476f6c192
                                          • Instruction ID: 2003d1aa3a392934cb8376096e52690014addfe633641db1e0a45046ea144a54
                                          • Opcode Fuzzy Hash: c607840c095b1f4c2143279f1847cb608757b13e6da5533870aa037476f6c192
                                          • Instruction Fuzzy Hash: 4021D671B101199FDF44DBA9E85069EB7B7EB88310F148479D409EB345FB35EC428B85
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.2973847752.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_11dd000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2bd28a187e4324ae490a65c1f10bd7f2836abe2bccfb0677a34ccd946e085a5e
                                          • Instruction ID: 9e80732edcc38e26662c76cfe84908760936d30656a81a4fa05d4d63d9149853
                                          • Opcode Fuzzy Hash: 2bd28a187e4324ae490a65c1f10bd7f2836abe2bccfb0677a34ccd946e085a5e
                                          • Instruction Fuzzy Hash: 34217C755093C08FDB07CF64D990715BF71AB46214F28C5EBD8898F6A7C33A980ACB62
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4425ce373eacb783075927cc8e5bb1b11a3ccb02409e80dd8406e80628e4e6a8
                                          • Instruction ID: 7c049f2863f1b271da4894722d9490988fe69e5045137e5d2f37b97e0f9ca507
                                          • Opcode Fuzzy Hash: 4425ce373eacb783075927cc8e5bb1b11a3ccb02409e80dd8406e80628e4e6a8
                                          • Instruction Fuzzy Hash: 4611E9B4B141148FCB55FB78E850AAE7BE5FB45214F1044B5F119DF345EA35EC068781
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3f36f97d37754dc1c43b1086556e6ec27ba4d896174b3404f708b7b7d6bd1566
                                          • Instruction ID: b58a9d67cee8dbff72b50084895fdd9569fd8bc084c9b9d58e5ca19579f674cc
                                          • Opcode Fuzzy Hash: 3f36f97d37754dc1c43b1086556e6ec27ba4d896174b3404f708b7b7d6bd1566
                                          • Instruction Fuzzy Hash: 351190B1E002299BCB58DB78D8815DEF7F5EB8A310F1085A9D009EB341EA31D945CBD2
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3ca20aa3f7294af08be5644911e9d4e98554e833022d7bcf8e41c93d0fb9a497
                                          • Instruction ID: ae38787ddd9573d8fc01b3a25180e1350b80c4d0b5efa9055751211b0571240f
                                          • Opcode Fuzzy Hash: 3ca20aa3f7294af08be5644911e9d4e98554e833022d7bcf8e41c93d0fb9a497
                                          • Instruction Fuzzy Hash: FC110431B101244FDF549A78C8146AF77EAEBC9301F054479D40AEB340EE38DC028BE2
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5228b9f9da645fb73004060d99aaae421a2c9a534c7c70cb1ecf13bdbfc7a036
                                          • Instruction ID: a2540bab42d9fbe6c8ef5ca8fee56d20709df31bcb51ed8ee07648c8ebf86904
                                          • Opcode Fuzzy Hash: 5228b9f9da645fb73004060d99aaae421a2c9a534c7c70cb1ecf13bdbfc7a036
                                          • Instruction Fuzzy Hash: 8C01F2B6B200110FDB64956DD45072AA7CADBCA710F10847EE10ACB3C6EE21CC024396
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ffa7137313f465ecd4f2c2b1d82b4154a9b1d3dd68dc928e6503d7093200fcea
                                          • Instruction ID: dab7394e3330605916b429e38800517b73b8c726e4ec623978aa8819b77d4ebf
                                          • Opcode Fuzzy Hash: ffa7137313f465ecd4f2c2b1d82b4154a9b1d3dd68dc928e6503d7093200fcea
                                          • Instruction Fuzzy Hash: 0E11D3B5D01259AFCB00CF9AD884ADEFBF4FB49314F10812AE918A7201D374A944CFA5
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5fe16dd54e54f16583bbbce18362c856008fd27e43a4a0abed304ed610b69aca
                                          • Instruction ID: 9946c53a8d9cd64299c85f1273b85ccabb612df952de9f68a9eb832aa046299f
                                          • Opcode Fuzzy Hash: 5fe16dd54e54f16583bbbce18362c856008fd27e43a4a0abed304ed610b69aca
                                          • Instruction Fuzzy Hash: 2121CEB6D01219AFCB00CF9AD984BDEFBF4BB48314F10852AE918A7241D374A954CFA5
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: db341f2030a121652eb6e4f53cd021adf16e9d2347c66399fd7ff323790de941
                                          • Instruction ID: 70a3de7ac04cbba68db22cc1ab68fba082aa890cc7fa92ed2e1324cbfe164b7c
                                          • Opcode Fuzzy Hash: db341f2030a121652eb6e4f53cd021adf16e9d2347c66399fd7ff323790de941
                                          • Instruction Fuzzy Hash: 82012F79B501104FCB209A7CA854B2E6BE6EBC9611F20887EE00ECF340EE20CC038381
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bb056880b229876d9bfef8fa49a39bf891a0051cc6951689cde1112dcce19c63
                                          • Instruction ID: 97e3e67066a6a8e2883d6d099646a4a4b58400aa1463cce44266d41eae82d6c7
                                          • Opcode Fuzzy Hash: bb056880b229876d9bfef8fa49a39bf891a0051cc6951689cde1112dcce19c63
                                          • Instruction Fuzzy Hash: 3801D175B200110FDB64956DD450B2BB7DADBCAB20F10947EE50ECB386EE61DC0243EA
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d95c03df4bda720f996ffedbf607237269765c14785ad070974ee890da4d5254
                                          • Instruction ID: bc314b2fcafe6914ef49fd3310b80b12d254ef27670d1c1b6d06eae5eb46550b
                                          • Opcode Fuzzy Hash: d95c03df4bda720f996ffedbf607237269765c14785ad070974ee890da4d5254
                                          • Instruction Fuzzy Hash: 7B018F76B101285FDB549A79DC106EF72EAEBC9205F04443AD40AEB381EE648C424BE2
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f7394bec1f887c23d7ab9fc5a99ba541fb63621e859878e239944c5f2a4a1395
                                          • Instruction ID: c548e2dd4f8bdcbaf692dac489f05ffaeeb5de61a64b6708047cb098e3fc983e
                                          • Opcode Fuzzy Hash: f7394bec1f887c23d7ab9fc5a99ba541fb63621e859878e239944c5f2a4a1395
                                          • Instruction Fuzzy Hash: F801F475B101114BCB65966DE854B2F77DADBCA610F208879E10ECF344EE21DC0343C5
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1d5e46d6e8a286f8ae44179a5a747234a6cd740a016ad49726e1d0cb95d18c7f
                                          • Instruction ID: 4de376e258ed534b9c5c50742896e052982f3416abd4f41aa667a6453979ce38
                                          • Opcode Fuzzy Hash: 1d5e46d6e8a286f8ae44179a5a747234a6cd740a016ad49726e1d0cb95d18c7f
                                          • Instruction Fuzzy Hash: C301AFB4B102144FDB64EA6DE850B6E7BDAEB89714F109878F10ECB344EE35EC428785
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fa960361850f268020ecd4553bf3adeab16533daa0da792ac849eebd086d7f28
                                          • Instruction ID: 220f620b9e371ba572a9cbd6dca4bc1bb5ad97ea2041bd0b35547d38ae182693
                                          • Opcode Fuzzy Hash: fa960361850f268020ecd4553bf3adeab16533daa0da792ac849eebd086d7f28
                                          • Instruction Fuzzy Hash: FB012D71F2021C9BCB149A65F851D9E7B79F745314F004079E901EB344EB32A805C7C0
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 736ac49c3af1560defeb590d9d9198291218e068ea4b3d18cde770af9b746685
                                          • Instruction ID: c7e2799de8ed475b563492b68b6816a73b1368c17ce33645c5551ba2b35018d9
                                          • Opcode Fuzzy Hash: 736ac49c3af1560defeb590d9d9198291218e068ea4b3d18cde770af9b746685
                                          • Instruction Fuzzy Hash: 52E01AF1E152089EDB61CAB0CA8636A77AADB41344F2048E6D508DB241F277CA514390
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cb0adfad3bfbee73000e632037e407f624bc3d01109aa2e6be7aea780b5184a6
                                          • Instruction ID: 2d8a283ed8f3ee49143c3e65c3c00f38ba2ef28f1b0b07e2474e7d9bd04082de
                                          • Opcode Fuzzy Hash: cb0adfad3bfbee73000e632037e407f624bc3d01109aa2e6be7aea780b5184a6
                                          • Instruction Fuzzy Hash: F0E0ECB1E10109ABDB60DEB5C98575B77ADD701298F2088E6D409CB201F677DA014790
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2222239885
                                          • Opcode ID: ed1d63a3cc0eedc7441aeacbe71a462f058bf36c3032229f4b6ede586d83448b
                                          • Instruction ID: 6a0d0970ee7c45e8e44fa3ff022e7185b99bce7cbc6e9793759a6d78467e1d28
                                          • Opcode Fuzzy Hash: ed1d63a3cc0eedc7441aeacbe71a462f058bf36c3032229f4b6ede586d83448b
                                          • Instruction Fuzzy Hash: 85121A70E002198FDB68DF65C854A9EB7B2FF88304F2095B9D409AB354EF359D86CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: 409f60bb4905f9524dcaeb178a75d370c66140c27bdb5cbea7fc0dea0356dcb8
                                          • Instruction ID: e72fa844be9d770dc632234189bea90a50ecb82383ff849232c3b06891163a57
                                          • Opcode Fuzzy Hash: 409f60bb4905f9524dcaeb178a75d370c66140c27bdb5cbea7fc0dea0356dcb8
                                          • Instruction Fuzzy Hash: 7B916BB0E10209DFEB68DF69D554B6EBBF6EF44700F108469E401AF294EB759C86CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-390881366
                                          • Opcode ID: d03c711c3a468e27faa4593382d66378de2377287c290edd7b2ea8a38e675ade
                                          • Instruction ID: cbb54cd360b3c76705d316eec7bbfc58118fe0b6ae40ef9919b4db8b4529c81b
                                          • Opcode Fuzzy Hash: d03c711c3a468e27faa4593382d66378de2377287c290edd7b2ea8a38e675ade
                                          • Instruction Fuzzy Hash: E8F16E70A00209CFDB58DF64D594AAEB7B2FF85304F208569D405AB369EF75EC86CB84
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: 8608604b35a1452966a754297deabdbd4e2b36526ac1d9cba4f39e72e349b89d
                                          • Instruction ID: 4b91fbdfe1dc20fd821e204c34ba80240409713c19cb7b6de058ef5c9f44b874
                                          • Opcode Fuzzy Hash: 8608604b35a1452966a754297deabdbd4e2b36526ac1d9cba4f39e72e349b89d
                                          • Instruction Fuzzy Hash: E671AFB1E102098FDB68CF69D584A6DBBF2FF84704F2585A9D005AF354EB71D845CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: 3579ef929d3c5002195fb86d9b87d31d62ad59ce74c73bfae8da0507b9651de2
                                          • Instruction ID: 2822068fe8c56ee892eaad64edee0ac85cd0327eaec3f46de5bda2f2a316261a
                                          • Opcode Fuzzy Hash: 3579ef929d3c5002195fb86d9b87d31d62ad59ce74c73bfae8da0507b9651de2
                                          • Instruction Fuzzy Hash: 5DB15D70A10209CFDB68DF69D594AAEB7B2FF84315F248469E0099B355EB35DC86CB80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LR^q$LR^q$$^q$$^q
                                          • API String ID: 0-2454687669
                                          • Opcode ID: ad4ceb465964bec066081ca63d41fa83425ece61aa7602f527ac01779407adc4
                                          • Instruction ID: 359e29a8d95e1b2edb6a057138c80c82bbcfcc4e5a45aab5c8cd4c24d8349b61
                                          • Opcode Fuzzy Hash: ad4ceb465964bec066081ca63d41fa83425ece61aa7602f527ac01779407adc4
                                          • Instruction Fuzzy Hash: 1651AE70B102059FDB58DF28D990A6AB7E6FB88705F1485A8E4069F3A5EB30EC45CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3037464372.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6bd0000_UTiPLNuHYu.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: a951a6f530a4eb4dc1b505914eecc9d44179a40a887c819ff5d4c6c57614e53b
                                          • Instruction ID: 769afa4ca2b7c76ef7a74ecef4f0dd441da547322273178f6e7b99a22a410c0a
                                          • Opcode Fuzzy Hash: a951a6f530a4eb4dc1b505914eecc9d44179a40a887c819ff5d4c6c57614e53b
                                          • Instruction Fuzzy Hash: D851CFB0F102098FDF65DB64D980A6EB7B2EB84300F1096AAD405EF355EB35EC46CB91

                                          Execution Graph

                                          Execution Coverage:11.4%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:233
                                          Total number of Limit Nodes:16
                                          execution_graph 19961 884668 19962 88467a 19961->19962 19963 884686 19962->19963 19965 884779 19962->19965 19966 88479d 19965->19966 19970 884888 19966->19970 19974 884878 19966->19974 19972 8848af 19970->19972 19971 88498c 19971->19971 19972->19971 19978 8844b0 19972->19978 19975 8848af 19974->19975 19976 8844b0 CreateActCtxA 19975->19976 19977 88498c 19975->19977 19976->19977 19979 885918 CreateActCtxA 19978->19979 19981 8859db 19979->19981 19981->19981 20003 88af78 20004 88af87 20003->20004 20007 88b070 20003->20007 20015 88b061 20003->20015 20008 88b081 20007->20008 20009 88b0a4 20007->20009 20008->20009 20023 88b308 20008->20023 20027 88b2f9 20008->20027 20009->20004 20010 88b2a8 GetModuleHandleW 20012 88b2d5 20010->20012 20011 88b09c 20011->20009 20011->20010 20012->20004 20016 88b081 20015->20016 20017 88b0a4 20015->20017 20016->20017 20021 88b308 LoadLibraryExW 20016->20021 20022 88b2f9 LoadLibraryExW 20016->20022 20017->20004 20018 88b09c 20018->20017 20019 88b2a8 GetModuleHandleW 20018->20019 20020 88b2d5 20019->20020 20020->20004 20021->20018 20022->20018 20024 88b31c 20023->20024 20026 88b341 20024->20026 20031 88aa88 20024->20031 20026->20011 20028 88b31c 20027->20028 20029 88aa88 LoadLibraryExW 20028->20029 20030 88b341 20028->20030 20029->20030 20030->20011 20032 88b4e8 LoadLibraryExW 20031->20032 20034 88b561 20032->20034 20034->20026 19982 4466da0 19983 4466f2b 19982->19983 19984 4466dc6 19982->19984 19984->19983 19986 4461c40 19984->19986 19987 4467428 PostMessageW 19986->19987 19988 4467494 19987->19988 19988->19984 20035 4463f70 20036 4463dec 20035->20036 20037 4463e13 20036->20037 20041 4465c56 20036->20041 20064 4465be9 20036->20064 20086 4465bf8 20036->20086 20042 4465be4 20041->20042 20043 4465c59 20041->20043 20044 4465c36 20042->20044 20108 4466842 20042->20108 20113 44668b8 20042->20113 20118 44663b8 20042->20118 20122 4465f18 20042->20122 20128 446631b 20042->20128 20134 44662bb 20042->20134 20138 44663fc 20042->20138 20142 4466013 20042->20142 20148 4466295 20042->20148 20153 4466275 20042->20153 20158 4465fe8 20042->20158 20164 4465f08 20042->20164 20170 44669ea 20042->20170 20175 446686d 20042->20175 20180 446622c 20042->20180 20185 446638f 20042->20185 20190 4466aaf 20042->20190 20194 44666c1 20042->20194 20199 4466641 20042->20199 20043->20036 20044->20036 20065 4465c12 20064->20065 20066 4465c36 20065->20066 20067 4466842 2 API calls 20065->20067 20068 4466641 2 API calls 20065->20068 20069 44666c1 2 API calls 20065->20069 20070 4466aaf 2 API calls 20065->20070 20071 446638f 2 API calls 20065->20071 20072 446622c 2 API calls 20065->20072 20073 446686d 2 API calls 20065->20073 20074 44669ea 2 API calls 20065->20074 20075 4465f08 2 API calls 20065->20075 20076 4465fe8 2 API calls 20065->20076 20077 4466275 2 API calls 20065->20077 20078 4466295 2 API calls 20065->20078 20079 4466013 2 API calls 20065->20079 20080 44663fc 2 API calls 20065->20080 20081 44662bb 2 API calls 20065->20081 20082 446631b 2 API calls 20065->20082 20083 4465f18 2 API calls 20065->20083 20084 44663b8 2 API calls 20065->20084 20085 44668b8 2 API calls 20065->20085 20066->20036 20067->20066 20068->20066 20069->20066 20070->20066 20071->20066 20072->20066 20073->20066 20074->20066 20075->20066 20076->20066 20077->20066 20078->20066 20079->20066 20080->20066 20081->20066 20082->20066 20083->20066 20084->20066 20085->20066 20087 4465c12 20086->20087 20088 4465c36 20087->20088 20089 4466842 2 API calls 20087->20089 20090 4466641 2 API calls 20087->20090 20091 44666c1 2 API calls 20087->20091 20092 4466aaf 2 API calls 20087->20092 20093 446638f 2 API calls 20087->20093 20094 446622c 2 API calls 20087->20094 20095 446686d 2 API calls 20087->20095 20096 44669ea 2 API calls 20087->20096 20097 4465f08 2 API calls 20087->20097 20098 4465fe8 2 API calls 20087->20098 20099 4466275 2 API calls 20087->20099 20100 4466295 2 API calls 20087->20100 20101 4466013 2 API calls 20087->20101 20102 44663fc 2 API calls 20087->20102 20103 44662bb 2 API calls 20087->20103 20104 446631b 2 API calls 20087->20104 20105 4465f18 2 API calls 20087->20105 20106 44663b8 2 API calls 20087->20106 20107 44668b8 2 API calls 20087->20107 20088->20036 20089->20088 20090->20088 20091->20088 20092->20088 20093->20088 20094->20088 20095->20088 20096->20088 20097->20088 20098->20088 20099->20088 20100->20088 20101->20088 20102->20088 20103->20088 20104->20088 20105->20088 20106->20088 20107->20088 20109 4466845 20108->20109 20204 44630c8 20109->20204 20208 44630c0 20109->20208 20110 4466899 20110->20044 20114 4466885 20113->20114 20116 44630c0 ResumeThread 20114->20116 20117 44630c8 ResumeThread 20114->20117 20115 4466899 20115->20044 20116->20115 20117->20115 20212 4463740 20118->20212 20216 4463748 20118->20216 20119 44663dc 20119->20044 20123 4465f4b 20122->20123 20124 446602b 20123->20124 20220 44639c4 20123->20220 20224 44639d0 20123->20224 20124->20044 20129 4466328 20128->20129 20131 446617c 20129->20131 20132 44630c0 ResumeThread 20129->20132 20133 44630c8 ResumeThread 20129->20133 20130 4466899 20130->20044 20131->20044 20132->20130 20133->20130 20136 4463740 WriteProcessMemory 20134->20136 20137 4463748 WriteProcessMemory 20134->20137 20135 44662e9 20135->20044 20136->20135 20137->20135 20228 4463171 20138->20228 20232 4463178 20138->20232 20139 4466416 20144 4465ff1 20142->20144 20143 446602b 20143->20044 20144->20143 20146 44639c4 CreateProcessA 20144->20146 20147 44639d0 CreateProcessA 20144->20147 20145 4466151 20145->20044 20146->20145 20147->20145 20149 44662aa 20148->20149 20236 4463830 20149->20236 20240 4463838 20149->20240 20150 4466a8f 20154 446644c 20153->20154 20156 4463830 ReadProcessMemory 20154->20156 20157 4463838 ReadProcessMemory 20154->20157 20155 4466a8f 20156->20155 20157->20155 20160 4465ff1 20158->20160 20159 446602b 20159->20044 20160->20159 20162 44639c4 CreateProcessA 20160->20162 20163 44639d0 CreateProcessA 20160->20163 20161 4466151 20161->20044 20162->20161 20163->20161 20166 4465f4b 20164->20166 20165 446602b 20165->20044 20166->20165 20168 44639c4 CreateProcessA 20166->20168 20169 44639d0 CreateProcessA 20166->20169 20167 4466151 20167->20044 20168->20167 20169->20167 20171 44669eb 20170->20171 20173 4463740 WriteProcessMemory 20171->20173 20174 4463748 WriteProcessMemory 20171->20174 20172 4466a0c 20173->20172 20174->20172 20176 4466873 20175->20176 20178 44630c0 ResumeThread 20176->20178 20179 44630c8 ResumeThread 20176->20179 20177 4466899 20177->20044 20178->20177 20179->20177 20181 446623d 20180->20181 20183 4463740 WriteProcessMemory 20181->20183 20184 4463748 WriteProcessMemory 20181->20184 20182 4466a0c 20183->20182 20184->20182 20186 44662ba 20185->20186 20187 44662e9 20186->20187 20188 4463740 WriteProcessMemory 20186->20188 20189 4463748 WriteProcessMemory 20186->20189 20187->20044 20188->20187 20189->20187 20192 4463171 Wow64SetThreadContext 20190->20192 20193 4463178 Wow64SetThreadContext 20190->20193 20191 4466ac9 20192->20191 20193->20191 20195 44666c7 20194->20195 20197 4463830 ReadProcessMemory 20195->20197 20198 4463838 ReadProcessMemory 20195->20198 20196 4466a8f 20197->20196 20198->20196 20200 4466647 20199->20200 20244 4463250 20200->20244 20248 4463249 20200->20248 20201 4466663 20205 4463108 ResumeThread 20204->20205 20207 4463139 20205->20207 20207->20110 20209 4463108 ResumeThread 20208->20209 20211 4463139 20209->20211 20211->20110 20213 4463748 WriteProcessMemory 20212->20213 20215 44637e7 20213->20215 20215->20119 20217 4463790 WriteProcessMemory 20216->20217 20219 44637e7 20217->20219 20219->20119 20221 44639d0 CreateProcessA 20220->20221 20223 4463c1b 20221->20223 20225 4463a59 CreateProcessA 20224->20225 20227 4463c1b 20225->20227 20229 44631bd Wow64SetThreadContext 20228->20229 20231 4463205 20229->20231 20231->20139 20233 44631bd Wow64SetThreadContext 20232->20233 20235 4463205 20233->20235 20235->20139 20237 4463883 ReadProcessMemory 20236->20237 20239 44638c7 20237->20239 20239->20150 20241 4463883 ReadProcessMemory 20240->20241 20243 44638c7 20241->20243 20243->20150 20245 4463290 VirtualAllocEx 20244->20245 20247 44632cd 20245->20247 20247->20201 20249 4463290 VirtualAllocEx 20248->20249 20251 44632cd 20249->20251 20251->20201 19989 88d300 19990 88d346 19989->19990 19994 88d4da 19990->19994 19997 88d4e0 19990->19997 19991 88d433 20000 88ce10 19994->20000 19998 88d50e 19997->19998 19999 88ce10 DuplicateHandle 19997->19999 19998->19991 19999->19998 20001 88d548 DuplicateHandle 20000->20001 20002 88d50e 20001->20002 20002->19991 20252 4463fde 20254 4463dec 20252->20254 20253 4463e13 20254->20253 20255 4465c56 12 API calls 20254->20255 20256 4465bf8 12 API calls 20254->20256 20257 4465be9 12 API calls 20254->20257 20255->20254 20256->20254 20257->20254

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 317 44639c4-4463a65 320 4463a67-4463a71 317->320 321 4463a9e-4463abe 317->321 320->321 322 4463a73-4463a75 320->322 326 4463af7-4463b26 321->326 327 4463ac0-4463aca 321->327 324 4463a77-4463a81 322->324 325 4463a98-4463a9b 322->325 328 4463a85-4463a94 324->328 329 4463a83 324->329 325->321 337 4463b5f-4463c19 CreateProcessA 326->337 338 4463b28-4463b32 326->338 327->326 330 4463acc-4463ace 327->330 328->328 331 4463a96 328->331 329->328 332 4463ad0-4463ada 330->332 333 4463af1-4463af4 330->333 331->325 335 4463ade-4463aed 332->335 336 4463adc 332->336 333->326 335->335 339 4463aef 335->339 336->335 349 4463c22-4463ca8 337->349 350 4463c1b-4463c21 337->350 338->337 340 4463b34-4463b36 338->340 339->333 342 4463b38-4463b42 340->342 343 4463b59-4463b5c 340->343 344 4463b46-4463b55 342->344 345 4463b44 342->345 343->337 344->344 346 4463b57 344->346 345->344 346->343 360 4463caa-4463cae 349->360 361 4463cb8-4463cbc 349->361 350->349 360->361 362 4463cb0 360->362 363 4463cbe-4463cc2 361->363 364 4463ccc-4463cd0 361->364 362->361 363->364 365 4463cc4 363->365 366 4463cd2-4463cd6 364->366 367 4463ce0-4463ce4 364->367 365->364 366->367 370 4463cd8 366->370 368 4463cf6-4463cfd 367->368 369 4463ce6-4463cec 367->369 371 4463d14 368->371 372 4463cff-4463d0e 368->372 369->368 370->367 374 4463d15 371->374 372->371 374->374
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04463C06
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 4befe0f2391b6b7c98435beb3437c8aa5870ec06bfa6a7913498b3c9f1a554fb
                                          • Instruction ID: 40a1223c591e0f3e3815994d629f5a5376c8dac89716155262d95d8634d0124e
                                          • Opcode Fuzzy Hash: 4befe0f2391b6b7c98435beb3437c8aa5870ec06bfa6a7913498b3c9f1a554fb
                                          • Instruction Fuzzy Hash: DA913B71D00259DFEF10DF68C941BDEBBB2BF44314F1485AAE809A7290DB74A985CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 375 44639d0-4463a65 377 4463a67-4463a71 375->377 378 4463a9e-4463abe 375->378 377->378 379 4463a73-4463a75 377->379 383 4463af7-4463b26 378->383 384 4463ac0-4463aca 378->384 381 4463a77-4463a81 379->381 382 4463a98-4463a9b 379->382 385 4463a85-4463a94 381->385 386 4463a83 381->386 382->378 394 4463b5f-4463c19 CreateProcessA 383->394 395 4463b28-4463b32 383->395 384->383 387 4463acc-4463ace 384->387 385->385 388 4463a96 385->388 386->385 389 4463ad0-4463ada 387->389 390 4463af1-4463af4 387->390 388->382 392 4463ade-4463aed 389->392 393 4463adc 389->393 390->383 392->392 396 4463aef 392->396 393->392 406 4463c22-4463ca8 394->406 407 4463c1b-4463c21 394->407 395->394 397 4463b34-4463b36 395->397 396->390 399 4463b38-4463b42 397->399 400 4463b59-4463b5c 397->400 401 4463b46-4463b55 399->401 402 4463b44 399->402 400->394 401->401 403 4463b57 401->403 402->401 403->400 417 4463caa-4463cae 406->417 418 4463cb8-4463cbc 406->418 407->406 417->418 419 4463cb0 417->419 420 4463cbe-4463cc2 418->420 421 4463ccc-4463cd0 418->421 419->418 420->421 422 4463cc4 420->422 423 4463cd2-4463cd6 421->423 424 4463ce0-4463ce4 421->424 422->421 423->424 427 4463cd8 423->427 425 4463cf6-4463cfd 424->425 426 4463ce6-4463cec 424->426 428 4463d14 425->428 429 4463cff-4463d0e 425->429 426->425 427->424 431 4463d15 428->431 429->428 431->431
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04463C06
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: f986664f2cb366fbff43c093caead4dee3f85f17e41b91626f661bd35d6bd21a
                                          • Instruction ID: 1b5c3d5b8e80775a34275eb44a68e082c1b90a8f180971756aa1ec96bd73d44c
                                          • Opcode Fuzzy Hash: f986664f2cb366fbff43c093caead4dee3f85f17e41b91626f661bd35d6bd21a
                                          • Instruction Fuzzy Hash: 63914C71D00259DFDF10DF68C941BDEBBB2BF44314F1485AAE809A7250DB74A985CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 432 88b070-88b07f 433 88b0ab-88b0af 432->433 434 88b081-88b08e call 88aa24 432->434 436 88b0b1-88b0bb 433->436 437 88b0c3-88b104 433->437 440 88b090 434->440 441 88b0a4 434->441 436->437 443 88b111-88b11f 437->443 444 88b106-88b10e 437->444 488 88b096 call 88b308 440->488 489 88b096 call 88b2f9 440->489 441->433 445 88b121-88b126 443->445 446 88b143-88b145 443->446 444->443 448 88b128-88b12f call 88aa30 445->448 449 88b131 445->449 450 88b148-88b14f 446->450 447 88b09c-88b09e 447->441 451 88b1e0-88b2a0 447->451 453 88b133-88b141 448->453 449->453 454 88b15c-88b163 450->454 455 88b151-88b159 450->455 483 88b2a8-88b2d3 GetModuleHandleW 451->483 484 88b2a2-88b2a5 451->484 453->450 457 88b170-88b179 call 88aa40 454->457 458 88b165-88b16d 454->458 455->454 463 88b17b-88b183 457->463 464 88b186-88b18b 457->464 458->457 463->464 466 88b1a9-88b1b6 464->466 467 88b18d-88b194 464->467 473 88b1b8-88b1d6 466->473 474 88b1d9-88b1df 466->474 467->466 468 88b196-88b1a6 call 88aa50 call 88aa60 467->468 468->466 473->474 485 88b2dc-88b2f0 483->485 486 88b2d5-88b2db 483->486 484->483 486->485 488->447 489->447
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0088B2C6
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934570960.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_880000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 6aca2758a228c87ee0492e4b64b9533665ec9e048e8f040ce2d2778446b87d38
                                          • Instruction ID: e1b794cccd9b0e4855ee2498c685b436e44e4c36105f7d180670dac19f080ab8
                                          • Opcode Fuzzy Hash: 6aca2758a228c87ee0492e4b64b9533665ec9e048e8f040ce2d2778446b87d38
                                          • Instruction Fuzzy Hash: D0713370A00B058FD724EF69D55475ABBF2FF88304F008A2ED08ADBA50DB75E949CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 490 885a84-885b14
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934570960.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_880000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d039ef6c8ea21361e8977322141059c43ca6039074638f34134ce05afb58e298
                                          • Instruction ID: 3c6012fd79e4d6433d969940e7fc992736a7c9df241ed3b33fd503feb22729fe
                                          • Opcode Fuzzy Hash: d039ef6c8ea21361e8977322141059c43ca6039074638f34134ce05afb58e298
                                          • Instruction Fuzzy Hash: 0931EC71804A58CFCB10EFA8D8846EDBBF0FF56324F24828AC019EB251D775AD46CB41

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 493 88590d-88598c 495 88598f-8859d9 CreateActCtxA 493->495 497 8859db-8859e1 495->497 498 8859e2-885a3c 495->498 497->498 505 885a4b-885a4f 498->505 506 885a3e-885a41 498->506 507 885a60 505->507 508 885a51-885a5d 505->508 506->505 510 885a61 507->510 508->507 510->510
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 008859C9
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934570960.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_880000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 4b4e923ab5431839589a8b50e52d50ad09983b16f70d06bc49796f84a6299b31
                                          • Instruction ID: 2c6fb3446229a50dfe4a9359886362703d4834215456869f6345bc9e46b4d370
                                          • Opcode Fuzzy Hash: 4b4e923ab5431839589a8b50e52d50ad09983b16f70d06bc49796f84a6299b31
                                          • Instruction Fuzzy Hash: 9341D1B0D00629CFDB24DFA9C884BCDBBF5BF48304F24816AD418AB255DB756986CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 511 8844b0-8859d9 CreateActCtxA 515 8859db-8859e1 511->515 516 8859e2-885a3c 511->516 515->516 523 885a4b-885a4f 516->523 524 885a3e-885a41 516->524 525 885a60 523->525 526 885a51-885a5d 523->526 524->523 528 885a61 525->528 526->525 528->528
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 008859C9
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934570960.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_880000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: c7304b98557fc20b64343a01d608701f0ded0079d4bd7d5f1d1d5ff59fd119a5
                                          • Instruction ID: 8b56a7c7ddce332cab12e3bd6394cefb247d9e70871d061f7519001bd3bcf62a
                                          • Opcode Fuzzy Hash: c7304b98557fc20b64343a01d608701f0ded0079d4bd7d5f1d1d5ff59fd119a5
                                          • Instruction Fuzzy Hash: A841BFB0C00629CBDB24DFA9C884B9DBBF5FF49304F24816AD408AB255DB756945CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 529 4463740-4463796 532 44637a6-44637e5 WriteProcessMemory 529->532 533 4463798-44637a4 529->533 535 44637e7-44637ed 532->535 536 44637ee-446381e 532->536 533->532 535->536
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 044637D8
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 99172c5718196accb1f8b57cfb8064b2771144b20dc38fcbc045314af4a924dc
                                          • Instruction ID: 440ade7cd41235bb99e5e608b22390233fdce0d29b97755ad213c358a19fbbfc
                                          • Opcode Fuzzy Hash: 99172c5718196accb1f8b57cfb8064b2771144b20dc38fcbc045314af4a924dc
                                          • Instruction Fuzzy Hash: D92135B59003499FDF10DFA9C981BEEBBF5FF48314F10842AE959A7240C778A944CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 540 4463748-4463796 542 44637a6-44637e5 WriteProcessMemory 540->542 543 4463798-44637a4 540->543 545 44637e7-44637ed 542->545 546 44637ee-446381e 542->546 543->542 545->546
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 044637D8
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: ee7a714775534da765ccdb01317472f2672038c089aea8a418d25720c74d9ba0
                                          • Instruction ID: 5475456f7f02163f15d106b4233ce52c7dc1d462337bc837e0e8c9e4e24588ca
                                          • Opcode Fuzzy Hash: ee7a714775534da765ccdb01317472f2672038c089aea8a418d25720c74d9ba0
                                          • Instruction Fuzzy Hash: 272169B59003499FCF10DFA9C880BDEBBF5FF48310F10842AE959A7240C778A944CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 550 88ce10-88d5dc DuplicateHandle 552 88d5de-88d5e4 550->552 553 88d5e5-88d602 550->553 552->553
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0088D50E,?,?,?,?,?), ref: 0088D5CF
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934570960.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_880000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 8ff1927b05931d421f394a310b2932d68482c2cebec43e161552ad2a90e01c11
                                          • Instruction ID: 00b7ee4b3e3d5cbf861e5a9c4a3dce0d1fd79766f3404c50588510e490d82b25
                                          • Opcode Fuzzy Hash: 8ff1927b05931d421f394a310b2932d68482c2cebec43e161552ad2a90e01c11
                                          • Instruction Fuzzy Hash: 5C2105B5900348AFDB10DFA9D584AEEBFF4FB48314F10801AE914A3351D374A940CFA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 566 4463830-44638c5 ReadProcessMemory 569 44638c7-44638cd 566->569 570 44638ce-44638fe 566->570 569->570
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 044638B8
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 88e623c7f6aab53289f18115be464bbbc5f6ec216720965aea259871fcc99249
                                          • Instruction ID: 3acc31510243f506f46089e2c5582128bded70505c53c909c76d0ffb53e4aca3
                                          • Opcode Fuzzy Hash: 88e623c7f6aab53289f18115be464bbbc5f6ec216720965aea259871fcc99249
                                          • Instruction Fuzzy Hash: 8B2128B1D002599FDB10DFAAC881BEEFBF5FF48310F10842AE959A7250C7389545CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 556 4463171-44631c3 558 44631c5-44631d1 556->558 559 44631d3-4463203 Wow64SetThreadContext 556->559 558->559 561 4463205-446320b 559->561 562 446320c-446323c 559->562 561->562
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 044631F6
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 031563d413de8061d008b642317d3d5a2c45a0921648b7417132817edac8f9a5
                                          • Instruction ID: 6bf2e8fb7fc256a971809327762e053fea91d7a05de549743c0c03c3cc78576c
                                          • Opcode Fuzzy Hash: 031563d413de8061d008b642317d3d5a2c45a0921648b7417132817edac8f9a5
                                          • Instruction Fuzzy Hash: A92157B1D002498FDB10DFAAC8857EEBFF4EF48364F10842AD859A7241C778A945CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 574 88d540-88d545 575 88d54d-88d5dc DuplicateHandle 574->575 576 88d5de-88d5e4 575->576 577 88d5e5-88d602 575->577 576->577
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0088D50E,?,?,?,?,?), ref: 0088D5CF
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934570960.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_880000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: c070288ab381699ff73d1c7a68ac3d1c99719d928e0f25586d5ba0e87dff0c9e
                                          • Instruction ID: 3a7aca21f791636451f15df04b51ac60425f31f811092b4f64f1131c7188c9b2
                                          • Opcode Fuzzy Hash: c070288ab381699ff73d1c7a68ac3d1c99719d928e0f25586d5ba0e87dff0c9e
                                          • Instruction Fuzzy Hash: 5621E4B5900249DFDB10DFA9D984ADEBBF5FB48314F14841AE954A7350C374A944CFA1
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 044638B8
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 23075f51db731a37291666362484a23c2ff8aaee692df08384bdee2c8f95cc61
                                          • Instruction ID: 0ee168edac92f7c018f1ea242b1223138085962d10d2e1210e1d13037b4a5cad
                                          • Opcode Fuzzy Hash: 23075f51db731a37291666362484a23c2ff8aaee692df08384bdee2c8f95cc61
                                          • Instruction Fuzzy Hash: 972128B1C002599FDB10DFAAC841BEEFBF5FF48310F10842AE959A7250C738A544CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 580 4463178-44631c3 582 44631c5-44631d1 580->582 583 44631d3-4463203 Wow64SetThreadContext 580->583 582->583 585 4463205-446320b 583->585 586 446320c-446323c 583->586 585->586
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 044631F6
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 2c0f3812e164a7632c9375a46d8efb8ebeb8560c73ef7ff06ba653301a76e9f0
                                          • Instruction ID: 3241ce4c50f79abe3c5ada96cbd080c37a26c5cfa74cafccc0d537064d144d29
                                          • Opcode Fuzzy Hash: 2c0f3812e164a7632c9375a46d8efb8ebeb8560c73ef7ff06ba653301a76e9f0
                                          • Instruction Fuzzy Hash: 922138B1D002498FDB10DFAAC8857EEBFF4EF48324F10842AD859A7240C778A944CFA5
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0088B341,00000800,00000000,00000000), ref: 0088B552
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934570960.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_880000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 7eeed29377caf4e986bd4a8c932e950e70a165d5946974ab9aac25b4f533b42b
                                          • Instruction ID: 1ea6f7d879c8386d56d0e2ece65101d5425b4632dd7da89600aececfea6c6ebc
                                          • Opcode Fuzzy Hash: 7eeed29377caf4e986bd4a8c932e950e70a165d5946974ab9aac25b4f533b42b
                                          • Instruction Fuzzy Hash: 691114B69003499FDB10DF9AD444ADEFBF4FB88320F10842AD519A7211C375A945CFA4
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 044632BE
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 5de036e8755c2a4df5aca07998aace0b898d6a5f3dcdb2687f52317d688a1ffa
                                          • Instruction ID: 5f7cdd02ec1b5711221db59d2d8a99e406dccf826d2bca662997923a084cf2cd
                                          • Opcode Fuzzy Hash: 5de036e8755c2a4df5aca07998aace0b898d6a5f3dcdb2687f52317d688a1ffa
                                          • Instruction Fuzzy Hash: 7F1126B69002499FCB10DFA9C844BDEFFF5EF88324F24881AE559A7250C775A544CFA1
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 044632BE
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 5cad91917f2c39674d398df9827efe8b42b1a0a69be59c0e4681ff0f519954d0
                                          • Instruction ID: 93619807cea76619dae3fb99a70523d57d16f264e2653464819e2e1721c89d70
                                          • Opcode Fuzzy Hash: 5cad91917f2c39674d398df9827efe8b42b1a0a69be59c0e4681ff0f519954d0
                                          • Instruction Fuzzy Hash: 871114B19002499BCB10DFAAC844BDEFFF5EB88324F10881AE559A7250C775A544CFA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 8a7dadef71d80f79f706a72af2df584b46ecb03a34a363be8d229451ccf7596f
                                          • Instruction ID: 4fd96f01f524819f67dc348577d9c3fee6f817d3f5d4c3e5976f35b8ac69bd7c
                                          • Opcode Fuzzy Hash: 8a7dadef71d80f79f706a72af2df584b46ecb03a34a363be8d229451ccf7596f
                                          • Instruction Fuzzy Hash: 571158B1D002488BDB10DFAAC4447DEFFF5EF88324F20841AD559A7240C774A544CF95
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0088B341,00000800,00000000,00000000), ref: 0088B552
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934570960.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_880000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: e5145b892f042ebd88cdc8c58190eda513656b06e9ab09444fd5178d5b0c3e73
                                          • Instruction ID: 7a8a71565e0b54bbc39fb187ee93101183234ddbd582d4363f8ce760bb368bfe
                                          • Opcode Fuzzy Hash: e5145b892f042ebd88cdc8c58190eda513656b06e9ab09444fd5178d5b0c3e73
                                          • Instruction Fuzzy Hash: EB111FB6900249CFDB10DFAAD584B9EFBF4FB88310F14842AD569A7220C375A945CFA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 316f42c9a1575fc748d144ed1f3a82e57ea69c6d0777d2e36705ac453e0924b8
                                          • Instruction ID: 2b2f31f3e69e0b25b32945b317607278cc7ec644b956323c6baf957b5c0edb47
                                          • Opcode Fuzzy Hash: 316f42c9a1575fc748d144ed1f3a82e57ea69c6d0777d2e36705ac453e0924b8
                                          • Instruction Fuzzy Hash: 1A1128B1D002488BDB10DFAAC4457DEFBF5EB88324F20841AD559A7250C775A544CF95
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0088B2C6
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934570960.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_880000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 144af92be81b4d0bf29351b05dc059a806f98cb1701200b17e92314d8e6eb164
                                          • Instruction ID: 701d46f2203ddf4023be02ad3fdf62f5c2a575074e7c4917f52cada9ffb20cdd
                                          • Opcode Fuzzy Hash: 144af92be81b4d0bf29351b05dc059a806f98cb1701200b17e92314d8e6eb164
                                          • Instruction Fuzzy Hash: C4110FB5C002498FCB10DF9AD444ADEFBF4EF88320F10842AD458A7210C379A545CFA1
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 04467485
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 4f3a64330bdbfd3ffa8ce0923286b759ee51c5ca09972f1f810f12307503121d
                                          • Instruction ID: 1bc563d3b03f207a545cd753750b22f674de526f99807ca29d7875dcb12c956e
                                          • Opcode Fuzzy Hash: 4f3a64330bdbfd3ffa8ce0923286b759ee51c5ca09972f1f810f12307503121d
                                          • Instruction Fuzzy Hash: 531103B5900348DFDB10DF9AC849BDEBFF8EB48324F10841AE959A7200C375A944CFA5
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 04467485
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1937886971.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_4460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 5ae026768db267c184544d75d7f2f5f5d859ed77543533d89187b1ae8434220f
                                          • Instruction ID: 872438cacba24a0131d3de6c53444ca32235cd37d7b662d9e49bf2d611b46ebe
                                          • Opcode Fuzzy Hash: 5ae026768db267c184544d75d7f2f5f5d859ed77543533d89187b1ae8434220f
                                          • Instruction Fuzzy Hash: CC1103B5800348DFDB10DF99D889BDEBFF8EB48324F10841AE958A7200C375A544CFA1
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0088B2C6
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934570960.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_880000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: abc5f45d595075fa1cc21466b702839072f0548e1f1609c98487d5c904c9889a
                                          • Instruction ID: 03ba3a85cbfc22c9117ae98414ab98725d4ac002454c73e3dd07aced76de21dd
                                          • Opcode Fuzzy Hash: abc5f45d595075fa1cc21466b702839072f0548e1f1609c98487d5c904c9889a
                                          • Instruction Fuzzy Hash: 69110FB6C00249CECB10EFAAD544B9EFBF4AF88314F14842AC468BB610C379A545CFA1
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934209222.00000000007FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_7fd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3a6a9b7cf306012582770e9d59a7e2812b6e7f67c534eaabbc9aff627f77e885
                                          • Instruction ID: 4729f8b090149d4547052ab5206bd5b69fc1936d6423ed369857266a93a23652
                                          • Opcode Fuzzy Hash: 3a6a9b7cf306012582770e9d59a7e2812b6e7f67c534eaabbc9aff627f77e885
                                          • Instruction Fuzzy Hash: D5212871504248DFCB25DF14D9C0B36BF66FB94318F20C569EA050B356C33ADC66D6A1
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934299215.000000000080D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0080D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_80d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a7da2f8802f36ddeefa5841c8a12f9feeb2ec90622ac3a97da53c303a8ea5b3
                                          • Instruction ID: f54d9ada72c76e723abb6e2a898d04ca390e6a43691bd904f9bb3d19e72f9221
                                          • Opcode Fuzzy Hash: 0a7da2f8802f36ddeefa5841c8a12f9feeb2ec90622ac3a97da53c303a8ea5b3
                                          • Instruction Fuzzy Hash: 5E210471604304EFDB45DF94D9C0B26BBA5FB84318F20C66DE8098B296C33AE846CA61
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934299215.000000000080D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0080D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_80d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 66304083c56d650c4f220383bc0ca4ff3706e2fe9555e141a00ac8b8229b96a7
                                          • Instruction ID: f48541c1794cb8ffd5dcce0506f9d7b8ec77b3171e674f956f98a6936f02c3dd
                                          • Opcode Fuzzy Hash: 66304083c56d650c4f220383bc0ca4ff3706e2fe9555e141a00ac8b8229b96a7
                                          • Instruction Fuzzy Hash: 7721F271604704DFDB54DF54D984B26BBA5FB84318F20C569D84E8B296C33AD847CA61
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934209222.00000000007FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_7fd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: ac381f4bb18569f08c8331cf7c02f00690a7231e067a17df1bc55b5f44ff78ff
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 1C11D376504284CFCB16CF14D5C4B26BF72FB94318F24C6A9D9490B756C33AD86ACBA2
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934299215.000000000080D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0080D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_80d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 3be3a9b1e166b9522f44902ad43285d2c7e2c59cbd312116f8e84a6f806dd698
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: B011BB75504780CFCB11CF54D9C4B16BBA2FB84314F24C6AAD8098B696C33AD80ACBA2
                                          Memory Dump Source
                                          • Source File: 0000000D.00000002.1934299215.000000000080D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0080D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_13_2_80d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 27bcb61bcf89bd699d9786b9b6493ac9602cdfd004a2058dc69aaee1e20f3bce
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: F811BB75504380DFDB02CF54C9C4B15BBA2FB84314F24C6AAD8498B696C33AE80ACB61

                                          Execution Graph

                                          Execution Coverage:10.1%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:157
                                          Total number of Limit Nodes:12
                                          execution_graph 38737 6c1bb70 38738 6c1bbb2 38737->38738 38739 6c1bbb8 LoadLibraryExW 38737->38739 38738->38739 38740 6c1bbe9 38739->38740 38741 6c13458 DuplicateHandle 38742 6c134ee 38741->38742 38743 12dd030 38744 12dd048 38743->38744 38745 12dd0a2 38744->38745 38750 6c1dbd1 38744->38750 38753 6c1a87c 38744->38753 38757 6c1daa8 38744->38757 38761 6c1da97 38744->38761 38765 6c1a8b4 38750->38765 38752 6c1dbe7 38752->38745 38754 6c1a887 38753->38754 38755 6c1dbe7 38754->38755 38756 6c1a8b4 GetModuleHandleW 38754->38756 38755->38745 38756->38755 38758 6c1dace 38757->38758 38759 6c1a87c GetModuleHandleW 38758->38759 38760 6c1dada 38759->38760 38760->38745 38762 6c1daa5 38761->38762 38763 6c1a87c GetModuleHandleW 38762->38763 38764 6c1dada 38763->38764 38764->38745 38766 6c1a8bf 38765->38766 38767 6c1a77c GetModuleHandleW 38766->38767 38768 6c1dc49 38767->38768 38769 6c1a6ac GetModuleHandleW 38768->38769 38770 6c1dcb8 38768->38770 38769->38770 38577 1460848 38580 146084e 38577->38580 38578 146091b 38580->38578 38583 146138f 38580->38583 38587 6c12108 38580->38587 38591 6c120f8 38580->38591 38585 1461393 38583->38585 38584 14614ba 38584->38580 38585->38584 38595 1468258 38585->38595 38588 6c12117 38587->38588 38608 6c11864 38588->38608 38592 6c12117 38591->38592 38593 6c11864 4 API calls 38592->38593 38594 6c12138 38593->38594 38594->38580 38596 1468262 38595->38596 38597 146827c 38596->38597 38600 6c2fa30 38596->38600 38604 6c2fa1f 38596->38604 38597->38585 38602 6c2fa45 38600->38602 38601 6c2fc5a 38601->38597 38602->38601 38603 6c2fc70 GlobalMemoryStatusEx GlobalMemoryStatusEx 38602->38603 38603->38602 38606 6c2fa45 38604->38606 38605 6c2fc5a 38605->38597 38606->38605 38607 6c2fc70 GlobalMemoryStatusEx GlobalMemoryStatusEx 38606->38607 38607->38606 38610 6c1186f 38608->38610 38612 6c12fcc 38610->38612 38611 6c13abe 38611->38611 38614 6c12fd7 38612->38614 38613 6c141e4 38613->38611 38614->38613 38617 6c15e67 38614->38617 38621 6c15e68 38614->38621 38618 6c15e68 38617->38618 38619 6c15ead 38618->38619 38625 6c16018 38618->38625 38619->38613 38622 6c15e89 38621->38622 38623 6c15ead 38622->38623 38624 6c16018 4 API calls 38622->38624 38623->38613 38624->38623 38626 6c16025 38625->38626 38628 6c1605e 38626->38628 38629 6c15230 38626->38629 38628->38619 38630 6c1523b 38629->38630 38632 6c160d0 38630->38632 38633 6c15264 38630->38633 38632->38632 38634 6c1526f 38633->38634 38640 6c15274 38634->38640 38636 6c1613f 38644 6c1b438 38636->38644 38653 6c1b450 38636->38653 38637 6c16179 38637->38632 38643 6c1527f 38640->38643 38641 6c173c8 38641->38636 38642 6c15e68 4 API calls 38642->38641 38643->38641 38643->38642 38646 6c1b481 38644->38646 38648 6c1b581 38644->38648 38645 6c1b48d 38645->38637 38646->38645 38662 6c1b6c8 38646->38662 38666 6c1b6b8 38646->38666 38647 6c1b4cd 38671 6c1c9b9 38647->38671 38683 6c1c9c8 38647->38683 38648->38637 38655 6c1b481 38653->38655 38657 6c1b581 38653->38657 38654 6c1b48d 38654->38637 38655->38654 38658 6c1b6c8 3 API calls 38655->38658 38659 6c1b6b8 3 API calls 38655->38659 38656 6c1b4cd 38660 6c1c9b9 2 API calls 38656->38660 38661 6c1c9c8 2 API calls 38656->38661 38657->38637 38658->38656 38659->38656 38660->38657 38661->38657 38695 6c1b708 38662->38695 38704 6c1b718 38662->38704 38663 6c1b6d2 38663->38647 38667 6c1b6c8 38666->38667 38669 6c1b708 2 API calls 38667->38669 38670 6c1b718 2 API calls 38667->38670 38668 6c1b6d2 38668->38647 38669->38668 38670->38668 38672 6c1c9f3 38671->38672 38713 6c1a77c 38672->38713 38675 6c1ca76 38678 6c1caa2 38675->38678 38728 6c1a6ac 38675->38728 38681 6c1a77c GetModuleHandleW 38681->38675 38684 6c1c9f3 38683->38684 38685 6c1a77c GetModuleHandleW 38684->38685 38686 6c1ca5a 38685->38686 38692 6c1cf20 GetModuleHandleW 38686->38692 38693 6c1ce78 GetModuleHandleW 38686->38693 38694 6c1a77c GetModuleHandleW 38686->38694 38687 6c1ca76 38688 6c1a6ac GetModuleHandleW 38687->38688 38690 6c1caa2 38687->38690 38689 6c1cae6 38688->38689 38691 6c1d890 CreateWindowExW 38689->38691 38691->38690 38692->38687 38693->38687 38694->38687 38696 6c1b70d 38695->38696 38697 6c1b74c 38696->38697 38698 6c1a6ac GetModuleHandleW 38696->38698 38697->38663 38699 6c1b734 38698->38699 38699->38697 38703 6c1b9a3 GetModuleHandleW 38699->38703 38700 6c1b744 38700->38697 38701 6c1b950 GetModuleHandleW 38700->38701 38702 6c1b97d 38701->38702 38702->38663 38703->38700 38705 6c1b729 38704->38705 38708 6c1b74c 38704->38708 38706 6c1a6ac GetModuleHandleW 38705->38706 38707 6c1b734 38706->38707 38707->38708 38712 6c1b9a3 GetModuleHandleW 38707->38712 38708->38663 38709 6c1b950 GetModuleHandleW 38711 6c1b97d 38709->38711 38710 6c1b744 38710->38708 38710->38709 38711->38663 38712->38710 38714 6c1a787 38713->38714 38715 6c1ca5a 38714->38715 38716 6c1d080 GetModuleHandleW 38714->38716 38717 6c1d090 GetModuleHandleW 38714->38717 38715->38681 38718 6c1ce78 38715->38718 38723 6c1cf20 38715->38723 38716->38715 38717->38715 38719 6c1ce88 38718->38719 38720 6c1ce93 38719->38720 38721 6c1d080 GetModuleHandleW 38719->38721 38722 6c1d090 GetModuleHandleW 38719->38722 38720->38675 38721->38720 38722->38720 38724 6c1cf4d 38723->38724 38725 6c1cfce 38724->38725 38726 6c1d080 GetModuleHandleW 38724->38726 38727 6c1d090 GetModuleHandleW 38724->38727 38726->38725 38727->38725 38729 6c1b908 GetModuleHandleW 38728->38729 38731 6c1b97d 38729->38731 38732 6c1d890 38731->38732 38733 6c1d8a6 38732->38733 38734 6c1d8de CreateWindowExW 38732->38734 38733->38678 38736 6c1da14 38734->38736 38736->38736

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 651 6c23490-6c234b1 652 6c234b3-6c234b6 651->652 653 6c234b8-6c234d7 652->653 654 6c234dc-6c234df 652->654 653->654 655 6c23c80-6c23c82 654->655 656 6c234e5-6c23504 654->656 658 6c23c84 655->658 659 6c23c89-6c23c8c 655->659 664 6c23506-6c23509 656->664 665 6c2351d-6c23527 656->665 658->659 659->652 660 6c23c92-6c23c9b 659->660 664->665 666 6c2350b-6c2351b 664->666 668 6c2352d-6c2353c 665->668 666->668 779 6c2353e call 6c23cb0 668->779 780 6c2353e call 6c23ca8 668->780 670 6c23543-6c23548 671 6c23555-6c23832 670->671 672 6c2354a-6c23550 670->672 693 6c23c72-6c23c7f 671->693 694 6c23838-6c238e7 671->694 672->660 703 6c23910 694->703 704 6c238e9-6c2390e 694->704 706 6c23919-6c2392c 703->706 704->706 708 6c23932-6c23954 call 6c2307c 706->708 709 6c23c59-6c23c65 706->709 708->709 713 6c2395a-6c23964 708->713 709->694 710 6c23c6b 709->710 710->693 713->709 714 6c2396a-6c23975 713->714 714->709 715 6c2397b-6c23a51 714->715 727 6c23a53-6c23a55 715->727 728 6c23a5f-6c23a8f 715->728 727->728 732 6c23a91-6c23a93 728->732 733 6c23a9d-6c23aa9 728->733 732->733 734 6c23aab-6c23aaf 733->734 735 6c23b09-6c23b0d 733->735 734->735 738 6c23ab1-6c23adb 734->738 736 6c23b13-6c23b4f 735->736 737 6c23c4a-6c23c53 735->737 749 6c23b51-6c23b53 736->749 750 6c23b5d-6c23b6b 736->750 737->709 737->715 745 6c23ae9-6c23b06 call 6c23088 738->745 746 6c23add-6c23adf 738->746 745->735 746->745 749->750 753 6c23b82-6c23b8d 750->753 754 6c23b6d-6c23b78 750->754 758 6c23ba5-6c23bb6 753->758 759 6c23b8f-6c23b95 753->759 754->753 757 6c23b7a 754->757 757->753 763 6c23bb8-6c23bbe 758->763 764 6c23bce-6c23bda 758->764 760 6c23b97 759->760 761 6c23b99-6c23b9b 759->761 760->758 761->758 765 6c23bc2-6c23bc4 763->765 766 6c23bc0 763->766 768 6c23bf2-6c23c43 764->768 769 6c23bdc-6c23be2 764->769 765->764 766->764 768->737 770 6c23be6-6c23be8 769->770 771 6c23be4 769->771 770->768 771->768 779->670 780->670
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: ffc249e3d53c1ccb2bc0eb8ef2bc610746ec7e69c363e24dd909fb933012c67d
                                          • Instruction ID: d8d13c73f14231c7096ffc295d62bcc0d11038f12501ad314990bc642aa3a7d7
                                          • Opcode Fuzzy Hash: ffc249e3d53c1ccb2bc0eb8ef2bc610746ec7e69c363e24dd909fb933012c67d
                                          • Instruction Fuzzy Hash: 15322231E1076ACFCB14EFB5C85459DB7B5FFC9300F1086AAD409AB264EB349A85CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1323 6c27d70-6c27d8e 1324 6c27d90-6c27d93 1323->1324 1325 6c27db4-6c27db7 1324->1325 1326 6c27d95-6c27daf 1324->1326 1327 6c27dc4-6c27dc7 1325->1327 1328 6c27db9-6c27dc3 1325->1328 1326->1325 1330 6c27dea-6c27ded 1327->1330 1331 6c27dc9-6c27de5 1327->1331 1332 6c27e04-6c27e06 1330->1332 1333 6c27def-6c27dfd 1330->1333 1331->1330 1335 6c27e08 1332->1335 1336 6c27e0d-6c27e10 1332->1336 1339 6c27e16-6c27e2c 1333->1339 1341 6c27dff 1333->1341 1335->1336 1336->1324 1336->1339 1343 6c27e32-6c27e3b 1339->1343 1344 6c28047-6c28051 1339->1344 1341->1332 1345 6c28052-6c28087 1343->1345 1346 6c27e41-6c27e5e 1343->1346 1349 6c28089-6c2808c 1345->1349 1353 6c28034-6c28041 1346->1353 1354 6c27e64-6c27e8c 1346->1354 1351 6c28092-6c280a1 1349->1351 1352 6c282c1-6c282c4 1349->1352 1364 6c280a3-6c280be 1351->1364 1365 6c280c0-6c28104 1351->1365 1355 6c282c6-6c282e2 1352->1355 1356 6c282e7-6c282ea 1352->1356 1353->1343 1353->1344 1354->1353 1378 6c27e92-6c27e9b 1354->1378 1355->1356 1358 6c282f0-6c282fc 1356->1358 1359 6c28395-6c28397 1356->1359 1367 6c28307-6c28309 1358->1367 1360 6c28399 1359->1360 1361 6c2839e-6c283a1 1359->1361 1360->1361 1361->1349 1366 6c283a7-6c283b0 1361->1366 1364->1365 1374 6c28295-6c282ab 1365->1374 1375 6c2810a-6c2811b 1365->1375 1372 6c28321-6c28325 1367->1372 1373 6c2830b-6c28311 1367->1373 1376 6c28333 1372->1376 1377 6c28327-6c28331 1372->1377 1379 6c28313 1373->1379 1380 6c28315-6c28317 1373->1380 1374->1352 1388 6c28280-6c2828f 1375->1388 1389 6c28121-6c2813e 1375->1389 1381 6c28338-6c2833a 1376->1381 1377->1381 1378->1345 1383 6c27ea1-6c27ebd 1378->1383 1379->1372 1380->1372 1386 6c2834b-6c28384 1381->1386 1387 6c2833c-6c2833f 1381->1387 1393 6c28022-6c2802e 1383->1393 1394 6c27ec3-6c27eed 1383->1394 1386->1351 1406 6c2838a-6c28394 1386->1406 1387->1366 1388->1374 1388->1375 1389->1388 1401 6c28144-6c2823a call 6c26598 1389->1401 1393->1353 1393->1378 1407 6c27ef3-6c27f1b 1394->1407 1408 6c28018-6c2801d 1394->1408 1456 6c28248 1401->1456 1457 6c2823c-6c28246 1401->1457 1407->1408 1415 6c27f21-6c27f4f 1407->1415 1408->1393 1415->1408 1420 6c27f55-6c27f5e 1415->1420 1420->1408 1422 6c27f64-6c27f96 1420->1422 1429 6c27fa1-6c27fbd 1422->1429 1430 6c27f98-6c27f9c 1422->1430 1429->1393 1432 6c27fbf-6c28016 call 6c26598 1429->1432 1430->1408 1431 6c27f9e 1430->1431 1431->1429 1432->1393 1458 6c2824d-6c2824f 1456->1458 1457->1458 1458->1388 1459 6c28251-6c28256 1458->1459 1460 6c28264 1459->1460 1461 6c28258-6c28262 1459->1461 1462 6c28269-6c2826b 1460->1462 1461->1462 1462->1388 1463 6c2826d-6c28279 1462->1463 1463->1388
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: d7f638dd31447587267faf3dda540af45cb3a20b7c11c5ffa15419e9de7c7f5f
                                          • Instruction ID: ed1ddc9745fcc41e2326d7f21f5dfea46b85d58176991db0151cc6722db6653f
                                          • Opcode Fuzzy Hash: d7f638dd31447587267faf3dda540af45cb3a20b7c11c5ffa15419e9de7c7f5f
                                          • Instruction Fuzzy Hash: 1802D030B012268FCB54DB69D484AAEB7E2FF84304F148529E906DB394DB35ED86CB91
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bc9e5c4b667326c58272218513c5d40c37cffd2cd6e09e3613db62d8aca725a2
                                          • Instruction ID: f827dbd518d552c03d7ccd2f183b76ab174b5a65bdee1403fff243cd4ecc9e1d
                                          • Opcode Fuzzy Hash: bc9e5c4b667326c58272218513c5d40c37cffd2cd6e09e3613db62d8aca725a2
                                          • Instruction Fuzzy Hash: 0862C334B002268FDB54EB6AD584BADB7F2EF84304F148529E806DB354DB35ED46CBA0
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 258f3c4ca43162404e16de58523bdeb16ba77a41e505d49d0ff2bf3227aaa880
                                          • Instruction ID: 3a6f1e3c3e97015d10378eeb0448b49b5a718efe553c08d574b2900089b118c0
                                          • Opcode Fuzzy Hash: 258f3c4ca43162404e16de58523bdeb16ba77a41e505d49d0ff2bf3227aaa880
                                          • Instruction Fuzzy Hash: 23329234B002169FDF94DB69D880BAEB7B2FB84314F108529E909EB355DB35ED42CB91
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3e1bdc3ae868cbf1c508d00c23cdecdbea8ca782161dc4c1c785504ddc124f98
                                          • Instruction ID: 16d1c589ffe4be2fd8822b363ad24eccb73983cb0d6f42ccfe42cbebc4a44009
                                          • Opcode Fuzzy Hash: 3e1bdc3ae868cbf1c508d00c23cdecdbea8ca782161dc4c1c785504ddc124f98
                                          • Instruction Fuzzy Hash: E512F475F102269BDB64DB64C8C06AFB7B2EB85310F64883AD85ADB344DB34DD46CB81
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 067b8ee67cafae5b484d822b28c08d2d6422150c99bcddad36b95730645ae7bb
                                          • Instruction ID: 42f853257d6f86b8b1a40fd5ef4bded4076e2456b8a5e523321cb9e7cd874731
                                          • Opcode Fuzzy Hash: 067b8ee67cafae5b484d822b28c08d2d6422150c99bcddad36b95730645ae7bb
                                          • Instruction Fuzzy Hash: CC228134E1022A8FDF64DB69C4C07ADB7B6FB85318F24882AE819DB355CA35DD81CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 527 6c2acc8-6c2ace6 528 6c2ace8-6c2aceb 527->528 529 6c2ad05-6c2ad08 528->529 530 6c2aced-6c2ad00 528->530 531 6c2ad0a-6c2ad17 529->531 532 6c2ad1c-6c2ad1f 529->532 530->529 531->532 534 6c2ad21-6c2ad2a 532->534 535 6c2ad39-6c2ad3c 532->535 537 6c2ad30-6c2ad34 534->537 538 6c2aeff-6c2af36 534->538 539 6c2ad3e-6c2ad5a 535->539 540 6c2ad5f-6c2ad62 535->540 537->535 550 6c2af38-6c2af3b 538->550 539->540 541 6c2ad72-6c2ad75 540->541 542 6c2ad64-6c2ad6d 540->542 543 6c2aee5-6c2aeee 541->543 544 6c2ad7b-6c2ad7e 541->544 542->541 543->534 549 6c2aef4-6c2aefe 543->549 547 6c2ad80-6c2ad85 544->547 548 6c2ad88-6c2ad8b 544->548 547->548 551 6c2ad9c-6c2ad9e 548->551 552 6c2ad8d-6c2ad91 548->552 553 6c2af48-6c2af4b 550->553 554 6c2af3d-6c2af41 550->554 559 6c2ada0 551->559 560 6c2ada5-6c2ada8 551->560 552->549 558 6c2ad97 552->558 556 6c2af58-6c2af5b 553->556 557 6c2af4d-6c2af57 553->557 561 6c2af43 554->561 562 6c2af61-6c2af9c 554->562 556->562 563 6c2b1c4-6c2b1c7 556->563 558->551 559->560 560->528 564 6c2adae-6c2add2 560->564 561->553 571 6c2afa2-6c2afae 562->571 572 6c2b18f-6c2b1a2 562->572 565 6c2b1ea-6c2b1ed 563->565 566 6c2b1c9-6c2b1e5 563->566 584 6c2aee2 564->584 585 6c2add8-6c2ade7 564->585 568 6c2b1ef call 6c2b220 565->568 569 6c2b1fc-6c2b1fe 565->569 566->565 577 6c2b1f5-6c2b1f7 568->577 575 6c2b200 569->575 576 6c2b205-6c2b208 569->576 581 6c2afb0-6c2afc9 571->581 582 6c2afce-6c2b012 571->582 573 6c2b1a4 572->573 573->563 575->576 576->550 579 6c2b20e-6c2b218 576->579 577->569 581->573 600 6c2b014-6c2b026 582->600 601 6c2b02e-6c2b06d 582->601 584->543 588 6c2ade9-6c2adef 585->588 589 6c2adff-6c2ae3a call 6c26598 585->589 590 6c2adf3-6c2adf5 588->590 591 6c2adf1 588->591 606 6c2ae52-6c2ae69 589->606 607 6c2ae3c-6c2ae42 589->607 590->589 591->589 600->601 608 6c2b073-6c2b14e call 6c26598 601->608 609 6c2b154-6c2b169 601->609 619 6c2ae81-6c2ae92 606->619 620 6c2ae6b-6c2ae71 606->620 611 6c2ae46-6c2ae48 607->611 612 6c2ae44 607->612 608->609 609->572 611->606 612->606 625 6c2ae94-6c2ae9a 619->625 626 6c2aeaa-6c2aedb 619->626 621 6c2ae73 620->621 622 6c2ae75-6c2ae77 620->622 621->619 622->619 628 6c2ae9e-6c2aea0 625->628 629 6c2ae9c 625->629 626->584 628->626 629->626
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: bf5a60b8abbb70eda14c83c47fd049a3547f4691afc3db915fbcf03b4b6413fa
                                          • Instruction ID: cb58677d37cf58651cde9d14497331df6793ce89c4cfbfbaec67b7c428526fb6
                                          • Opcode Fuzzy Hash: bf5a60b8abbb70eda14c83c47fd049a3547f4691afc3db915fbcf03b4b6413fa
                                          • Instruction Fuzzy Hash: 79E16030E1021A8FDB59DFA9D9806AEB7B2FF85304F10852DD815AB354DB35DD86CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 781 6c2b648-6c2b668 782 6c2b66a-6c2b66d 781->782 783 6c2b684-6c2b687 782->783 784 6c2b66f-6c2b673 782->784 787 6c2b689-6c2b68b 783->787 788 6c2b68e-6c2b691 783->788 785 6c2b9db-6c2ba16 784->785 786 6c2b679-6c2b67f 784->786 797 6c2ba18-6c2ba1b 785->797 786->783 787->788 789 6c2b6a3-6c2b6a6 788->789 790 6c2b693 788->790 791 6c2b81a-6c2b81b 789->791 792 6c2b6ac-6c2b6af 789->792 794 6c2b69b-6c2b69e 790->794 798 6c2b820-6c2b823 791->798 795 6c2b6b1-6c2b6b5 792->795 796 6c2b6c6-6c2b6c9 792->796 794->789 795->785 799 6c2b6bb-6c2b6c1 795->799 802 6c2b6f0-6c2b6f3 796->802 803 6c2b6cb-6c2b6cf 796->803 800 6c2ba3e-6c2ba41 797->800 801 6c2ba1d-6c2ba39 797->801 798->791 804 6c2b825-6c2b828 798->804 799->796 808 6c2ba47-6c2ba6f 800->808 809 6c2bcad-6c2bcaf 800->809 801->800 810 6c2b716-6c2b719 802->810 811 6c2b6f5-6c2b711 802->811 803->785 805 6c2b6d5-6c2b6e5 803->805 806 6c2b845-6c2b848 804->806 807 6c2b82a-6c2b833 804->807 805->791 837 6c2b6eb 805->837 818 6c2b857-6c2b85a 806->818 819 6c2b84a-6c2b850 806->819 807->785 815 6c2b839-6c2b840 807->815 856 6c2ba71-6c2ba74 808->856 857 6c2ba79-6c2babd 808->857 816 6c2bcb1 809->816 817 6c2bcb6-6c2bcb9 809->817 812 6c2b71b-6c2b71f 810->812 813 6c2b73c-6c2b73f 810->813 811->810 812->785 824 6c2b725-6c2b735 812->824 825 6c2b741-6c2b744 813->825 826 6c2b749-6c2b74c 813->826 815->806 816->817 817->797 828 6c2bcbf-6c2bcc8 817->828 822 6c2b864-6c2b867 818->822 823 6c2b85c-6c2b861 818->823 829 6c2b852 819->829 830 6c2b87c-6c2b882 819->830 831 6c2b877-6c2b87a 822->831 832 6c2b869-6c2b872 822->832 823->822 824->803 849 6c2b737 824->849 825->826 835 6c2b759-6c2b75c 826->835 836 6c2b74e-6c2b754 826->836 829->818 830->785 833 6c2b888-6c2b88f 830->833 831->830 840 6c2b894-6c2b897 831->840 832->831 833->840 842 6c2b773-6c2b776 835->842 843 6c2b75e-6c2b762 835->843 836->835 837->802 847 6c2b899-6c2b89d 840->847 848 6c2b8be-6c2b8c1 840->848 845 6c2b786-6c2b789 842->845 846 6c2b778-6c2b781 842->846 843->785 844 6c2b768-6c2b76e 843->844 844->842 850 6c2b78b-6c2b794 845->850 851 6c2b799-6c2b79c 845->851 846->845 847->785 853 6c2b8a3-6c2b8b3 847->853 854 6c2b8c3-6c2b8d8 848->854 855 6c2b8ff-6c2b902 848->855 849->813 850->851 860 6c2b7b2-6c2b7b5 851->860 861 6c2b79e-6c2b7a7 851->861 853->812 872 6c2b8b9 853->872 854->785 868 6c2b8de-6c2b8fa 854->868 858 6c2b957-6c2b95a 855->858 859 6c2b904-6c2b952 call 6c26598 855->859 856->828 899 6c2bca2-6c2bcac 857->899 900 6c2bac3-6c2bacc 857->900 858->861 863 6c2b960-6c2b963 858->863 859->858 865 6c2b7d7-6c2b7da 860->865 866 6c2b7b7-6c2b7d2 860->866 861->807 864 6c2b7ad 861->864 863->819 869 6c2b969-6c2b96c 863->869 864->860 873 6c2b7e7-6c2b7ea 865->873 874 6c2b7dc-6c2b7e2 865->874 866->865 868->855 877 6c2b9a7-6c2b9aa 869->877 878 6c2b96e-6c2b983 869->878 872->848 875 6c2b7fa-6c2b7fd 873->875 876 6c2b7ec-6c2b7f5 873->876 874->873 875->791 881 6c2b7ff-6c2b802 875->881 876->875 885 6c2b9be-6c2b9c0 877->885 886 6c2b9ac-6c2b9b3 877->886 878->785 895 6c2b985-6c2b9a2 878->895 889 6c2b804-6c2b810 881->889 890 6c2b815-6c2b818 881->890 887 6c2b9c2 885->887 888 6c2b9c7-6c2b9ca 885->888 886->876 893 6c2b9b9 886->893 887->888 888->782 894 6c2b9d0-6c2b9da 888->894 889->890 890->791 890->798 893->885 895->877 903 6c2bad2-6c2bb3e call 6c26598 900->903 904 6c2bc98-6c2bc9d 900->904 915 6c2bb44-6c2bb49 903->915 916 6c2bc38-6c2bc4d 903->916 904->899 918 6c2bb65 915->918 919 6c2bb4b-6c2bb51 915->919 916->904 920 6c2bb67-6c2bb6d 918->920 921 6c2bb53-6c2bb55 919->921 922 6c2bb57-6c2bb59 919->922 923 6c2bb82-6c2bb8f 920->923 924 6c2bb6f-6c2bb75 920->924 925 6c2bb63 921->925 922->925 932 6c2bb91-6c2bb97 923->932 933 6c2bba7-6c2bbb4 923->933 926 6c2bc23-6c2bc32 924->926 927 6c2bb7b 924->927 925->920 926->915 926->916 927->923 928 6c2bbb6-6c2bbc3 927->928 929 6c2bbea-6c2bbf7 927->929 938 6c2bbc5-6c2bbcb 928->938 939 6c2bbdb-6c2bbe8 928->939 940 6c2bbf9-6c2bbff 929->940 941 6c2bc0f-6c2bc1c 929->941 934 6c2bb9b-6c2bb9d 932->934 935 6c2bb99 932->935 933->926 934->933 935->933 943 6c2bbcf-6c2bbd1 938->943 944 6c2bbcd 938->944 939->926 945 6c2bc03-6c2bc05 940->945 946 6c2bc01 940->946 941->926 943->939 944->939 945->941 946->941
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: 14aec70d549d52dc7a1fa8d4e1bf260478cc26b063f8e80ed9104969a77955af
                                          • Instruction ID: fa48f518d372c49c812eb6fff81b2d62b58168efe6eb1a21534cc73947820cac
                                          • Opcode Fuzzy Hash: 14aec70d549d52dc7a1fa8d4e1bf260478cc26b063f8e80ed9104969a77955af
                                          • Instruction Fuzzy Hash: B202AE30E1022B8FDB64DF69D5806ADB7B2EB85308F14896AD809DB355DB30ED85CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 949 6c29148-6c2916d 950 6c2916f-6c29172 949->950 951 6c29a30-6c29a33 950->951 952 6c29178-6c2918d 950->952 953 6c29a35-6c29a54 951->953 954 6c29a59-6c29a5b 951->954 959 6c291a5-6c291bb 952->959 960 6c2918f-6c29195 952->960 953->954 956 6c29a62-6c29a65 954->956 957 6c29a5d 954->957 956->950 961 6c29a6b-6c29a75 956->961 957->956 966 6c291c6-6c291c8 959->966 962 6c29197 960->962 963 6c29199-6c2919b 960->963 962->959 963->959 967 6c291e0-6c29251 966->967 968 6c291ca-6c291d0 966->968 979 6c29253-6c29276 967->979 980 6c2927d-6c29299 967->980 969 6c291d2 968->969 970 6c291d4-6c291d6 968->970 969->967 970->967 979->980 985 6c292c5-6c292e0 980->985 986 6c2929b-6c292be 980->986 991 6c292e2-6c29304 985->991 992 6c2930b-6c29326 985->992 986->985 991->992 997 6c2934b-6c29359 992->997 998 6c29328-6c29344 992->998 999 6c2935b-6c29364 997->999 1000 6c29369-6c293e3 997->1000 998->997 999->961 1006 6c29430-6c29445 1000->1006 1007 6c293e5-6c29403 1000->1007 1006->951 1011 6c29405-6c29414 1007->1011 1012 6c2941f-6c2942e 1007->1012 1011->1012 1012->1006 1012->1007
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: 0d78cc76f937e3f43d8be6970ff74c55a399c73cb4069deb619020392435da3d
                                          • Instruction ID: 49a3ae8d8f150efa56ed2ca15c36c0149fa48db02d53223494c00180c53b5046
                                          • Opcode Fuzzy Hash: 0d78cc76f937e3f43d8be6970ff74c55a399c73cb4069deb619020392435da3d
                                          • Instruction Fuzzy Hash: 2F912F30F1022A9FDB54DB66D9507AEB3F6AFC8204F108569D809EB348EB74DD46CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1015 6c2cf38-6c2cf53 1016 6c2cf55-6c2cf58 1015->1016 1017 6c2cfa1-6c2cfa4 1016->1017 1018 6c2cf5a-6c2cf9c 1016->1018 1019 6c2cfa6-6c2cfb5 1017->1019 1020 6c2cfed-6c2cff0 1017->1020 1018->1017 1021 6c2cfb7-6c2cfbc 1019->1021 1022 6c2cfc4-6c2cfd0 1019->1022 1024 6c2cff2-6c2cff4 1020->1024 1025 6c2cfff-6c2d002 1020->1025 1021->1022 1026 6c2cfd6-6c2cfe8 1022->1026 1027 6c2d955-6c2d98e 1022->1027 1028 6c2d421 1024->1028 1029 6c2cffa 1024->1029 1030 6c2d004-6c2d01a 1025->1030 1031 6c2d01f-6c2d022 1025->1031 1026->1020 1048 6c2d990-6c2d993 1027->1048 1034 6c2d424-6c2d430 1028->1034 1029->1025 1030->1031 1032 6c2d024-6c2d066 1031->1032 1033 6c2d06b-6c2d06e 1031->1033 1032->1033 1040 6c2d070-6c2d0b2 1033->1040 1041 6c2d0b7-6c2d0ba 1033->1041 1037 6c2d436-6c2d723 1034->1037 1038 6c2d17c-6c2d18b 1034->1038 1228 6c2d94a-6c2d954 1037->1228 1229 6c2d729-6c2d72f 1037->1229 1044 6c2d19a-6c2d1a6 1038->1044 1045 6c2d18d-6c2d192 1038->1045 1040->1041 1046 6c2d0c9-6c2d0cc 1041->1046 1047 6c2d0bc-6c2d0be 1041->1047 1044->1027 1055 6c2d1ac-6c2d1be 1044->1055 1045->1044 1058 6c2d115-6c2d118 1046->1058 1059 6c2d0ce-6c2d110 1046->1059 1053 6c2d0c4 1047->1053 1054 6c2d2df-6c2d2e8 1047->1054 1056 6c2d9a2-6c2d9a5 1048->1056 1057 6c2d995 call 6c2daad 1048->1057 1053->1046 1063 6c2d2f7-6c2d303 1054->1063 1064 6c2d2ea-6c2d2ef 1054->1064 1078 6c2d1c3-6c2d1c6 1055->1078 1066 6c2d9a7-6c2d9c3 1056->1066 1067 6c2d9c8-6c2d9cb 1056->1067 1069 6c2d99b-6c2d99d 1057->1069 1061 6c2d161-6c2d164 1058->1061 1062 6c2d11a-6c2d15c 1058->1062 1059->1058 1061->1034 1073 6c2d16a-6c2d16d 1061->1073 1062->1061 1070 6c2d414-6c2d419 1063->1070 1071 6c2d309-6c2d31d 1063->1071 1064->1063 1066->1067 1074 6c2d9fe-6c2da00 1067->1074 1075 6c2d9cd-6c2d9f9 1067->1075 1069->1056 1070->1028 1071->1028 1099 6c2d323-6c2d335 1071->1099 1083 6c2d177-6c2d17a 1073->1083 1084 6c2d16f-6c2d174 1073->1084 1085 6c2da02 1074->1085 1086 6c2da07-6c2da0a 1074->1086 1075->1074 1087 6c2d1c8-6c2d20a 1078->1087 1088 6c2d20f-6c2d212 1078->1088 1083->1038 1083->1078 1084->1083 1085->1086 1086->1048 1093 6c2da0c-6c2da1b 1086->1093 1087->1088 1096 6c2d214-6c2d256 1088->1096 1097 6c2d25b-6c2d25e 1088->1097 1114 6c2da82-6c2da97 1093->1114 1115 6c2da1d-6c2da80 call 6c26598 1093->1115 1096->1097 1105 6c2d260-6c2d2a2 1097->1105 1106 6c2d2a7-6c2d2aa 1097->1106 1122 6c2d337-6c2d33d 1099->1122 1123 6c2d359-6c2d35b 1099->1123 1105->1106 1108 6c2d2ac-6c2d2c8 1106->1108 1109 6c2d2cd-6c2d2cf 1106->1109 1108->1109 1119 6c2d2d1 1109->1119 1120 6c2d2d6-6c2d2d9 1109->1120 1137 6c2da98 1114->1137 1115->1114 1119->1120 1120->1016 1120->1054 1131 6c2d341-6c2d34d 1122->1131 1132 6c2d33f 1122->1132 1128 6c2d365-6c2d371 1123->1128 1149 6c2d373-6c2d37d 1128->1149 1150 6c2d37f 1128->1150 1138 6c2d34f-6c2d357 1131->1138 1132->1138 1137->1137 1138->1128 1152 6c2d384-6c2d386 1149->1152 1150->1152 1152->1028 1155 6c2d38c-6c2d3a8 call 6c26598 1152->1155 1168 6c2d3b7-6c2d3c3 1155->1168 1169 6c2d3aa-6c2d3af 1155->1169 1168->1070 1171 6c2d3c5-6c2d412 1168->1171 1169->1168 1171->1028 1230 6c2d731-6c2d736 1229->1230 1231 6c2d73e-6c2d747 1229->1231 1230->1231 1231->1027 1232 6c2d74d-6c2d760 1231->1232 1234 6c2d766-6c2d76c 1232->1234 1235 6c2d93a-6c2d944 1232->1235 1236 6c2d77b-6c2d784 1234->1236 1237 6c2d76e-6c2d773 1234->1237 1235->1228 1235->1229 1236->1027 1238 6c2d78a-6c2d7ab 1236->1238 1237->1236 1241 6c2d7ba-6c2d7c3 1238->1241 1242 6c2d7ad-6c2d7b2 1238->1242 1241->1027 1243 6c2d7c9-6c2d7e6 1241->1243 1242->1241 1243->1235 1246 6c2d7ec-6c2d7f2 1243->1246 1246->1027 1247 6c2d7f8-6c2d811 1246->1247 1249 6c2d817-6c2d83e 1247->1249 1250 6c2d92d-6c2d934 1247->1250 1249->1027 1253 6c2d844-6c2d84e 1249->1253 1250->1235 1250->1246 1253->1027 1254 6c2d854-6c2d86b 1253->1254 1256 6c2d87a-6c2d895 1254->1256 1257 6c2d86d-6c2d878 1254->1257 1256->1250 1262 6c2d89b-6c2d8b4 call 6c26598 1256->1262 1257->1256 1266 6c2d8c3-6c2d8cc 1262->1266 1267 6c2d8b6-6c2d8bb 1262->1267 1266->1027 1268 6c2d8d2-6c2d926 1266->1268 1267->1266 1268->1250
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q
                                          • API String ID: 0-831282457
                                          • Opcode ID: 348d417f8722aab134a90ecb8963404dc560d60caa3b458df8bcf50850ee0611
                                          • Instruction ID: 58b4fdac9de019dc5f15b4cadc8f03e016dc3e1f55f1e2db00fb724bf2722784
                                          • Opcode Fuzzy Hash: 348d417f8722aab134a90ecb8963404dc560d60caa3b458df8bcf50850ee0611
                                          • Instruction Fuzzy Hash: 59623D30A002169FCB55EF69D590A5DB7B2FF84304F208A69D41A9F369DB71FD86CB80

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1276 6c24b98-6c24bbc 1277 6c24bbe-6c24bc1 1276->1277 1278 6c252a0-6c252a3 1277->1278 1279 6c24bc7-6c24cbf 1277->1279 1280 6c252c4-6c252c6 1278->1280 1281 6c252a5-6c252bf 1278->1281 1299 6c24d42-6c24d49 1279->1299 1300 6c24cc5-6c24d12 call 6c25440 1279->1300 1282 6c252c8 1280->1282 1283 6c252cd-6c252d0 1280->1283 1281->1280 1282->1283 1283->1277 1286 6c252d6-6c252e3 1283->1286 1301 6c24d4f-6c24dbf 1299->1301 1302 6c24dcd-6c24dd6 1299->1302 1313 6c24d18-6c24d34 1300->1313 1319 6c24dc1 1301->1319 1320 6c24dca 1301->1320 1302->1286 1316 6c24d36 1313->1316 1317 6c24d3f-6c24d40 1313->1317 1316->1317 1317->1299 1319->1320 1320->1302
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fcq$XPcq$\Ocq
                                          • API String ID: 0-3575482020
                                          • Opcode ID: 7c88930e46a163eac5a4e8e0ae05c575fade3348bbec76c78efab841d4fb8cae
                                          • Instruction ID: 3db548c02ec294f89914a424259462140cd013f1a8c613351d29aa9e22876953
                                          • Opcode Fuzzy Hash: 7c88930e46a163eac5a4e8e0ae05c575fade3348bbec76c78efab841d4fb8cae
                                          • Instruction Fuzzy Hash: 1D619030F002199FEB58AFA5C8547AEBAF6FF88300F208429E505EB395DB758D418B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1697 6c2a39a-6c2a3a0 1698 6c2a3a3-6c2a3c8 1697->1698 1699 6c2a35d 1697->1699 1700 6c2a3ca-6c2a3cd 1698->1700 1701 6c2a37f-6c2a381 1699->1701 1702 6c2a35f 1699->1702 1705 6c2a3cf-6c2a3e8 1700->1705 1706 6c2a3ed-6c2a3f0 1700->1706 1703 6c2a383 1701->1703 1704 6c2a388-6c2a38b 1701->1704 1707 6c2a36b-6c2a37a 1702->1707 1703->1704 1708 6c2a310-6c2a313 1704->1708 1709 6c2a38d-6c2a391 1704->1709 1705->1706 1710 6c2a523-6c2a526 1706->1710 1711 6c2a3f6-6c2a423 call 6c22088 1706->1711 1707->1701 1712 6c2a335-6c2a338 1708->1712 1713 6c2a315-6c2a330 1708->1713 1715 6c2a533-6c2a536 1710->1715 1716 6c2a528-6c2a532 1710->1716 1746 6c2a518-6c2a522 1711->1746 1747 6c2a429-6c2a44d 1711->1747 1718 6c2a35a 1712->1718 1719 6c2a33a-6c2a355 1712->1719 1713->1712 1720 6c2a5e6-6c2a5e9 1715->1720 1721 6c2a53c-6c2a5d5 call 6c22088 1715->1721 1718->1699 1719->1718 1725 6c2a604-6c2a607 1720->1725 1726 6c2a5eb-6c2a5f9 1720->1726 1721->1711 1758 6c2a5db-6c2a5e5 1721->1758 1729 6c2a62a-6c2a62c 1725->1729 1730 6c2a609-6c2a625 1725->1730 1726->1721 1737 6c2a5ff 1726->1737 1735 6c2a633-6c2a636 1729->1735 1736 6c2a62e 1729->1736 1730->1729 1735->1700 1741 6c2a63c-6c2a645 1735->1741 1736->1735 1737->1725 1754 6c2a457 1747->1754 1755 6c2a44f-6c2a455 1747->1755 1757 6c2a45d-6c2a512 call 6c26598 call 6c22088 1754->1757 1755->1757 1757->1746 1757->1747
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: X!@$x!@
                                          • API String ID: 0-2527372166
                                          • Opcode ID: e91e2dbac1de4b3c1862a7fda30ed7c672b57042cba2f872ce42c875e8ae25ea
                                          • Instruction ID: 07483a539f5f093e40aed2c0eab0fc9b538ddc71b835440a352815d74d766975
                                          • Opcode Fuzzy Hash: e91e2dbac1de4b3c1862a7fda30ed7c672b57042cba2f872ce42c875e8ae25ea
                                          • Instruction Fuzzy Hash: 3D71A231F002168FCB55EBA9D8906ADB7B2FF88214F108939E919E7354DB31ED46CB80

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1776 6c29139-6c2916d 1777 6c2916f-6c29172 1776->1777 1778 6c29a30-6c29a33 1777->1778 1779 6c29178-6c2918d 1777->1779 1780 6c29a35-6c29a54 1778->1780 1781 6c29a59-6c29a5b 1778->1781 1786 6c291a5-6c291bb 1779->1786 1787 6c2918f-6c29195 1779->1787 1780->1781 1783 6c29a62-6c29a65 1781->1783 1784 6c29a5d 1781->1784 1783->1777 1788 6c29a6b-6c29a75 1783->1788 1784->1783 1793 6c291c6-6c291c8 1786->1793 1789 6c29197 1787->1789 1790 6c29199-6c2919b 1787->1790 1789->1786 1790->1786 1794 6c291e0-6c29251 1793->1794 1795 6c291ca-6c291d0 1793->1795 1806 6c29253-6c29276 1794->1806 1807 6c2927d-6c29299 1794->1807 1796 6c291d2 1795->1796 1797 6c291d4-6c291d6 1795->1797 1796->1794 1797->1794 1806->1807 1812 6c292c5-6c292e0 1807->1812 1813 6c2929b-6c292be 1807->1813 1818 6c292e2-6c29304 1812->1818 1819 6c2930b-6c29326 1812->1819 1813->1812 1818->1819 1824 6c2934b-6c29359 1819->1824 1825 6c29328-6c29344 1819->1825 1826 6c2935b-6c29364 1824->1826 1827 6c29369-6c293e3 1824->1827 1825->1824 1826->1788 1833 6c29430-6c29445 1827->1833 1834 6c293e5-6c29403 1827->1834 1833->1778 1838 6c29405-6c29414 1834->1838 1839 6c2941f-6c2942e 1834->1839 1838->1839 1839->1833 1839->1834
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: 6ec26dcc2d889cf18f62e5f4f856b098b25a8dd8f1cf57683448741024be37fa
                                          • Instruction ID: 31ba7a97ca0bcd59ff7bf4e4f5016ec37bc194db6ca9b83e428468d27041a889
                                          • Opcode Fuzzy Hash: 6ec26dcc2d889cf18f62e5f4f856b098b25a8dd8f1cf57683448741024be37fa
                                          • Instruction Fuzzy Hash: 80515530B101169FDB54DB76D950BAFB3F6ABC8644F108569D809EB388EB34DD42CB91
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035156358.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: e64ec642118ebfcbad766d2252daee353ad7adf356ca358a18113e5d46c48da0
                                          • Instruction ID: e94e92eb51e463a561247022608cbb51efc9b9649e4783baaadc1338f822e530
                                          • Opcode Fuzzy Hash: e64ec642118ebfcbad766d2252daee353ad7adf356ca358a18113e5d46c48da0
                                          • Instruction Fuzzy Hash: 94812370A10B058FD764DF2AD44179ABBF1BF89204F008A2ED49ADBB50DB74E945CF90
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06C1DA02
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035156358.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: ea22966a471ac212d59245c40716e76c582c4f1800821fe530d252c491777457
                                          • Instruction ID: bf787d89a2c1b25a502350e504f53d75ccd001ee18928f0a7716eda63afd008e
                                          • Opcode Fuzzy Hash: ea22966a471ac212d59245c40716e76c582c4f1800821fe530d252c491777457
                                          • Instruction Fuzzy Hash: BA5102B1C00349AFDF05CFA9C980ADDBFB6BF49310F14816AE819AB221D771A955DF90
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06C1DA02
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035156358.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: f0357b9f30857c67fca7a745ce1db4d2a921dae97d9313f13c11d18c0d36210c
                                          • Instruction ID: 147c6bc9d1c1b15aca051cea24135d0cf907891a8823c08e37af16b1becdea8d
                                          • Opcode Fuzzy Hash: f0357b9f30857c67fca7a745ce1db4d2a921dae97d9313f13c11d18c0d36210c
                                          • Instruction Fuzzy Hash: 7D41B0B1D00349DFDF14CF99C884ADEBBB5BF49310F24812AE819AB210D771A985CF91
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 0146F0BF
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.2978391843.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_1460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: 09023b9e917d27303b22e5b3a13793462b8b7f836070cdaeef6db66364cb2eb3
                                          • Instruction ID: b3d7ad444f97057f0b9627efc40380699d81201877abed44be5a7b4cc1c7a34d
                                          • Opcode Fuzzy Hash: 09023b9e917d27303b22e5b3a13793462b8b7f836070cdaeef6db66364cb2eb3
                                          • Instruction Fuzzy Hash: 712189B1C0025A9FCB14DFA9D8047DEFBF4AF48320F10856AE854A7251D778A845CBA6
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06C134DF
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035156358.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 540e5a57dc6faa18a6b87ffe5078afac08ac3dc87a49bc703d563e4a6164c2fc
                                          • Instruction ID: 0adbeb31f8743009cba1c0c40cb0a4fa9096366667db396be8613605cd11bc7e
                                          • Opcode Fuzzy Hash: 540e5a57dc6faa18a6b87ffe5078afac08ac3dc87a49bc703d563e4a6164c2fc
                                          • Instruction Fuzzy Hash: 1B21E3B5D002589FDB10CF99D984ADEBFF5EB48310F14805AE918A7350D375A950CFA1
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06C134DF
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035156358.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: b1732dc230aa7649925877120a3840db7c8863da7a5634323cd5f034fa3d6dc4
                                          • Instruction ID: 9a7cdb7d535356d1192506198dd441d6aca2eb6679e7bddf5705541eb4ab799e
                                          • Opcode Fuzzy Hash: b1732dc230aa7649925877120a3840db7c8863da7a5634323cd5f034fa3d6dc4
                                          • Instruction Fuzzy Hash: 0F21E4B5D002589FDB10CF9AD984ADEBFF8EB48310F14801AE918A7350D375A940CFA5
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 06C1BBDA
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035156358.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 6701c8ec1a962325445f1cd4b6287fa9d5a9232830d7c3372ad60f9275b9bc71
                                          • Instruction ID: 0989909648c7a77251b7c4c6f084d89e36292f474607a64305b48b6b0219ae69
                                          • Opcode Fuzzy Hash: 6701c8ec1a962325445f1cd4b6287fa9d5a9232830d7c3372ad60f9275b9bc71
                                          • Instruction Fuzzy Hash: FE1144B6C002098FCB10CF9AC844ADEFBF4EB49320F10802ED459A7210C374A545CFA5
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 06C1BBDA
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035156358.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 2c7628c6b7bd52bbe2ce137ca74e993cb450838913e879a0c2d0a35f17ae4bc9
                                          • Instruction ID: 54fd6140a8d7a2e958a2af9adeecbf189dd5f0e975fc8f4d269dc64c3e11f048
                                          • Opcode Fuzzy Hash: 2c7628c6b7bd52bbe2ce137ca74e993cb450838913e879a0c2d0a35f17ae4bc9
                                          • Instruction Fuzzy Hash: 481104B6D003099FDB10CF9AC884ADEFBF4EB49310F10846ED459A7610C779A945CFA5
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 0146F0BF
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.2978391843.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_1460000_mpTrle.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: 8b6b3701ae6b26093e27c6aa35a9668ba6a9ee2fbb1630d1f5bbd6e1d61b2fd2
                                          • Instruction ID: 5a7faa0226467e556674e96139e5e0354e259d08d04cf385098dfdefdb562097
                                          • Opcode Fuzzy Hash: 8b6b3701ae6b26093e27c6aa35a9668ba6a9ee2fbb1630d1f5bbd6e1d61b2fd2
                                          • Instruction Fuzzy Hash: 591120B1C0026A9BCB10DF9AC444BDEFBF8EF48324F10812AD818A7250D378A944CFA5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,06C1B734), ref: 06C1B96E
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035156358.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: d181111ee36db1307e05261e8b636414d0786c173010080a2c49a7fb350d2d6e
                                          • Instruction ID: 85e6a30012777111ed1bb02e6bbc3dc9a6bacccb2c5a8807b90a6e3bc9150712
                                          • Opcode Fuzzy Hash: d181111ee36db1307e05261e8b636414d0786c173010080a2c49a7fb350d2d6e
                                          • Instruction Fuzzy Hash: 161102B5D00249CFDB10DF9AC444ADEFBF4EF49214F10842AD459AB210D375A945CFA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPcq
                                          • API String ID: 0-714321711
                                          • Opcode ID: ba9c1d9d4cf26015d28bfd86451c1b1c0ae2d1684bcd30ee05ad90e79eaacb10
                                          • Instruction ID: 44036fb8eccf4abaa5f14ce8cc6e4c10c94abc96cde65cf9896893262559f048
                                          • Opcode Fuzzy Hash: ba9c1d9d4cf26015d28bfd86451c1b1c0ae2d1684bcd30ee05ad90e79eaacb10
                                          • Instruction Fuzzy Hash: E3416E30B102199FDB599FA5C854BAEBBF7FF88700F208529E105AB395DB759C01CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: 47bc3e87fce1b177792fd6ec28b22a232cafd0070f7c1364188d35ce5487ac54
                                          • Instruction ID: 040e7dc85cad3616d124fe749a9b1f03941e2431574fdd9f28c4b4e317f7aa11
                                          • Opcode Fuzzy Hash: 47bc3e87fce1b177792fd6ec28b22a232cafd0070f7c1364188d35ce5487ac54
                                          • Instruction Fuzzy Hash: 6741B230E00726DFDF65DFA5C59469EBBB2BF95300F204929E806EB240DB71E946CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: f2286e761756d1e42acb4634e1f828f71912f99825dfbbe1a20f2f8c43afa4ca
                                          • Instruction ID: 527380befc33a336f3ed6647b181a466daff481a0800a1cdbfd9d20494dfb9ba
                                          • Opcode Fuzzy Hash: f2286e761756d1e42acb4634e1f828f71912f99825dfbbe1a20f2f8c43afa4ca
                                          • Instruction Fuzzy Hash: B1312470B102128FCB59AB74D45866E7AE3BF88210F10852CD406DB384DF79DE02C7A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q
                                          • API String ID: 0-388095546
                                          • Opcode ID: d6147899e1180ec292bc950efe1e18cc4b48ae3cfa69229481095861c19f4aab
                                          • Instruction ID: 00b09a1c5e14d4f1ae168a81a3cb75cd775bddccbe3f94bb14b95621cf160a5e
                                          • Opcode Fuzzy Hash: d6147899e1180ec292bc950efe1e18cc4b48ae3cfa69229481095861c19f4aab
                                          • Instruction Fuzzy Hash: 7CF0A435E052279FDF649B46EA905AC73A5FB40314F14412DDE05DB249D731EA09C791
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca5b9e90f0107a1df2a5e74091d3d04eec99f266e5e72249b143d772d5e0a04a
                                          • Instruction ID: 19f74de0b42ccb7ad6226e1ae44ffad232fb28bd4861cf75eaa6ff0aaa6a0c79
                                          • Opcode Fuzzy Hash: ca5b9e90f0107a1df2a5e74091d3d04eec99f266e5e72249b143d772d5e0a04a
                                          • Instruction Fuzzy Hash: 6361D2B1F000224FCF54AA7EC89866FBAD7AFC4614B154439D80EDB364DEA6DD0287D2
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f640fd1c17ba94342cc3293ca799cb8773ecd36e0ac9376cd85ea90afabaa80f
                                          • Instruction ID: f5dbe2547ad7e468703f375a8765f45e250ed2726cee9a52a378b1bf8cc04c5d
                                          • Opcode Fuzzy Hash: f640fd1c17ba94342cc3293ca799cb8773ecd36e0ac9376cd85ea90afabaa80f
                                          • Instruction Fuzzy Hash: 50815034B002169FDB58DFA5D45475EB7F2AF88304F108529E90ADB394EB74ED428B91
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 222e47854a545b7e1bd3fcb3f3fe8d65d0ffa0e8bfbeebe45c071930faa31799
                                          • Instruction ID: 320fe1c020c2e8d9b935d3858932f8df608df0f80672268e32d74895d0cb6ea4
                                          • Opcode Fuzzy Hash: 222e47854a545b7e1bd3fcb3f3fe8d65d0ffa0e8bfbeebe45c071930faa31799
                                          • Instruction Fuzzy Hash: D2914F30E1021A8FDF64DF68C890B9DB7B1FF89304F20859AD549EB255DB70AA85CB91
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e13dbd1f8c80d07608521c9e44c765391bae9ca15a3d3f31bc5e05e5c87b5ba0
                                          • Instruction ID: 3e50fcdb3ee0572dbad27986d095a4460a4e77f113b833cfdff1fafc3918bfb0
                                          • Opcode Fuzzy Hash: e13dbd1f8c80d07608521c9e44c765391bae9ca15a3d3f31bc5e05e5c87b5ba0
                                          • Instruction Fuzzy Hash: 48913C30E1021A8BDF64DF68C890B9DB7B1FF89304F20C599D549AB255EB70AA858F91
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 08abc7a58d2232e41e7369407f29cf328ac8ae8bf1f42915f9e674c313c69430
                                          • Instruction ID: ee3bf469836cd1dad27ba02de72c9032fd57cf02788b9408aa632a195721a7e1
                                          • Opcode Fuzzy Hash: 08abc7a58d2232e41e7369407f29cf328ac8ae8bf1f42915f9e674c313c69430
                                          • Instruction Fuzzy Hash: 18713D70A0021A9FDB54DFA9D980A9EBBF6FF88304F248529D419EB354DB30ED46CB51
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d10fae9846ae154d82c6a153d7eab8f2d174f172c4bfae9c2f0c11d5e0c72d72
                                          • Instruction ID: fbf6af3bab8872e76447edd4f2e1f55031f8c85382191b20e4582e3ec93c24fb
                                          • Opcode Fuzzy Hash: d10fae9846ae154d82c6a153d7eab8f2d174f172c4bfae9c2f0c11d5e0c72d72
                                          • Instruction Fuzzy Hash: F7713D30A0021A9FDB54DFA9D980A9EBBF6FF88304F148529D419EB364DB30ED46CB50
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3c7d76bddd1d23df0a3d0c57b1d2d8ca99157693498505233eec3201a8bbcd56
                                          • Instruction ID: 06a0b9670a32f9f4da1dea44da948750490c44e4c476d82ab98d00fb480751ba
                                          • Opcode Fuzzy Hash: 3c7d76bddd1d23df0a3d0c57b1d2d8ca99157693498505233eec3201a8bbcd56
                                          • Instruction Fuzzy Hash: EC51F331E0011ADFDF24EF78E4946ADBBB2EF84314F10886EE916D7251DB319946CB81
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a92f263a4fb91c34a64783c144f25bc06d78767215a246f918baaaade5e1dea4
                                          • Instruction ID: ce0a1c88a96c470195b31b05d75b67b5706c4846941c4432f814ac676d7a849a
                                          • Opcode Fuzzy Hash: a92f263a4fb91c34a64783c144f25bc06d78767215a246f918baaaade5e1dea4
                                          • Instruction Fuzzy Hash: 66510730F502299FEF64676CD95473F266ED789300F10092EE81ED33A9CA69CD855392
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 87e8b3230250b7ffe9d8e0b5c88ca19864186bb9efbcd0b830ffa32805c1d804
                                          • Instruction ID: d3e6dc40e0d7a180b1548d16b172464d233693666768f791a2e35e840a902006
                                          • Opcode Fuzzy Hash: 87e8b3230250b7ffe9d8e0b5c88ca19864186bb9efbcd0b830ffa32805c1d804
                                          • Instruction Fuzzy Hash: AA511630F5022D9FEF646A6CD95473F266ED788710F20092EE81ED33A9CA69CD815392
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8d6d08c7a3b7de38681c8a162e77dc9ae288aed10a7b12c322ac889caffd2922
                                          • Instruction ID: 65e5912c7fdf6071b3d86aedbf3a18d0a30152c710dd49390ab82b655c3f3228
                                          • Opcode Fuzzy Hash: 8d6d08c7a3b7de38681c8a162e77dc9ae288aed10a7b12c322ac889caffd2922
                                          • Instruction Fuzzy Hash: F6418C71E0061A8FCB60CFA9D881AAFFBF2EB88310F50492AE516D7650D330E9558B91
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b6c1c69dc207e6e79d3d16ea014148ef84d7f6acfa19019f045f722c046837c2
                                          • Instruction ID: cf17be07ea4623ef86bfa3ebb7d899d9006be5bc59fee183fafce6c4d9020668
                                          • Opcode Fuzzy Hash: b6c1c69dc207e6e79d3d16ea014148ef84d7f6acfa19019f045f722c046837c2
                                          • Instruction Fuzzy Hash: D9318170E102168BDF74CB69C8C076FF7A2EB85220FA4893ED855DB345C635DA41CB91
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 641aa3eb523229d5130cbfbcc9f814d8bb09931c5c12f4f6d4227e5daf6b312e
                                          • Instruction ID: 61dae97021e389229bfffb00a3eed0fabdd4c6f93a553075ce2c54c0b4d2dcf1
                                          • Opcode Fuzzy Hash: 641aa3eb523229d5130cbfbcc9f814d8bb09931c5c12f4f6d4227e5daf6b312e
                                          • Instruction Fuzzy Hash: 7D31B430E1071A9FCF15EF65C890A9EB7B6FF85304F108929E806A7304DB70F9468B91
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e0cf4c1c84328e15fcedac3d86086ca1acb588b1aa4f922a05d1591752557b9f
                                          • Instruction ID: 6c6825d772a98fd5c5c2518240d7bc21492d562d067b76b8f7facc4fcb2c727d
                                          • Opcode Fuzzy Hash: e0cf4c1c84328e15fcedac3d86086ca1acb588b1aa4f922a05d1591752557b9f
                                          • Instruction Fuzzy Hash: 23318D34E106169BCF19DF65C894A9EB7B2FF89300F108529E916EB354DB35ED86CB40
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5cbea3484e35001ed664f807899717995fac2af4f6c093b69cd528a11f95ca4c
                                          • Instruction ID: 99cf85c85549c81b4da7625017b6165bd86e84a654c0d7aa592b1228f9c75b1d
                                          • Opcode Fuzzy Hash: 5cbea3484e35001ed664f807899717995fac2af4f6c093b69cd528a11f95ca4c
                                          • Instruction Fuzzy Hash: 00318034E1061A9BCF59DFA5D854A9EB7B2FF89300F108529E916EB350DB71ED82CB40
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 53e65b476c69aa48f2639c0ae9172f1797a8aed79ed94262e62784de453e14db
                                          • Instruction ID: b221f707650de765fb45ae236f82eaefa08fb345c4f6157b9baf289d0eef4a18
                                          • Opcode Fuzzy Hash: 53e65b476c69aa48f2639c0ae9172f1797a8aed79ed94262e62784de453e14db
                                          • Instruction Fuzzy Hash: 1B219175F002269FDB00DF79E840AAEBBF5AB48210F148169F909EB354E738DD018B95
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 45d80cfcb1bd032fa34b1e95f3b1755acea3db36701d3260d2d55fa427085e93
                                          • Instruction ID: 40707a6779cf66dde6d2cb6c53dcbe23963cd6289a68b758c2f659ae339ba401
                                          • Opcode Fuzzy Hash: 45d80cfcb1bd032fa34b1e95f3b1755acea3db36701d3260d2d55fa427085e93
                                          • Instruction Fuzzy Hash: 6821A175F002269FDB40DF6AE840AAEB7F1EB48710F108169FA09E7354E778DD018B91
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.2973844249.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_12dd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ba9de6794eadb805fe4ed30e1da8769014f1c90a65bc222312eb0dbcf45873c6
                                          • Instruction ID: 53719f6d07af5cf23a9de2bf314d1ba8e5801db189955cf984cb5815d936aac4
                                          • Opcode Fuzzy Hash: ba9de6794eadb805fe4ed30e1da8769014f1c90a65bc222312eb0dbcf45873c6
                                          • Instruction Fuzzy Hash: 59213471514608DFCB11DFA8D9C0B26BBA5FBC4314F20C56DD9094B296C37BD447CA62
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b2124490d610a4b71cb72106eafbbc3d5886e17bb6f9f40b8c716c2db77b9b4b
                                          • Instruction ID: 2b2a0356fea559ba5a0284ff250d0766d7f87c03c52cfd6206bcb2586a43023f
                                          • Opcode Fuzzy Hash: b2124490d610a4b71cb72106eafbbc3d5886e17bb6f9f40b8c716c2db77b9b4b
                                          • Instruction Fuzzy Hash: A321A271E0022A5FCB65EB69D8405DEB7F6EB89310F10856AD40EE7304DA35DA41CBA1
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.2973844249.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_12dd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 453469b1faa9eaa072d4d69917e7301fe27867dcd7a712141f0d5a9a92c8655d
                                          • Instruction ID: 560220c665a8e3298c66e3cd4024458a32e9607f745f2c327e191ed804029330
                                          • Opcode Fuzzy Hash: 453469b1faa9eaa072d4d69917e7301fe27867dcd7a712141f0d5a9a92c8655d
                                          • Instruction Fuzzy Hash: 6A218E7550D7C48FDB03CF64C990711BF71AB46214F28C5EBD9898F6A7C23A980ACB62
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f15e9fb4a3497ce7a22682c72a1917f8518c63e862a7c32daafd9a38fb2d1c92
                                          • Instruction ID: 70e5caf99adefbbf950719baedb2a1fecdb8cfa4610aa3ce0f527ce724eb856a
                                          • Opcode Fuzzy Hash: f15e9fb4a3497ce7a22682c72a1917f8518c63e862a7c32daafd9a38fb2d1c92
                                          • Instruction Fuzzy Hash: 89118E35B101259FDB48D669C814AAF73EAABC8711B00853AD90AEB340EE659C428B92
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3d5f20e8e57931ffc7cb331accb3da79e1a3915fa59cbc646fcda8715fce9156
                                          • Instruction ID: ebc15c805b6a50444e130d401b8d684e230e573788da2320c8ae320a24d9358f
                                          • Opcode Fuzzy Hash: 3d5f20e8e57931ffc7cb331accb3da79e1a3915fa59cbc646fcda8715fce9156
                                          • Instruction Fuzzy Hash: B001B175B104221BDB68A2AEE854B5BA6CBDBC9614F24C43EE60EC7344DD62DD0243A6
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a9081fcb12c8ab5455097a1dcb243d4390beda8887e55c0b28ca53da1048e48f
                                          • Instruction ID: d1477c5f4664012da4a7c3b44ec96ca8f10c1f4d6f777416996fbca2de6ae7a1
                                          • Opcode Fuzzy Hash: a9081fcb12c8ab5455097a1dcb243d4390beda8887e55c0b28ca53da1048e48f
                                          • Instruction Fuzzy Hash: 6321C4B5D01269AFCB00DF9AD884ADEFFB4FB49310F10852AE918A7201C374A554CFA5
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 75c96fa986f37f5ba6e9ced1a2ebec25f15a072650f20f2917174ff02e9e91ed
                                          • Instruction ID: 737dba0f6a3b70aa6f8d5eb0c4f68cc8f15dc152dcb3be43bc5e289bb67d4a79
                                          • Opcode Fuzzy Hash: 75c96fa986f37f5ba6e9ced1a2ebec25f15a072650f20f2917174ff02e9e91ed
                                          • Instruction Fuzzy Hash: F5012F7AB101251FDB21A62DE894B6BB3EADBC9710F10883DE90AC7340DE21CD434392
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 69d7dadd39969095c5c8fe2f7b9a6e1cfbd61692039575df120ade850ade874c
                                          • Instruction ID: e11a45ab251b2f28bf4629c4b4f0fe2633ab087bcabd4a7a67e708355d7392ef
                                          • Opcode Fuzzy Hash: 69d7dadd39969095c5c8fe2f7b9a6e1cfbd61692039575df120ade850ade874c
                                          • Instruction Fuzzy Hash: 5A01D432F100265BDB589569DC10AEF73EBEBC8610F00813AE90AE7340EF659C4247E2
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ba45a8592f2a9dcdc618a1cd5da905f3b846dfbbd823733806aea4e2c328af0c
                                          • Instruction ID: 3d27d3dd59c4c48b4aab63b020d50971fa62091185b8f8078046add13f31d9bc
                                          • Opcode Fuzzy Hash: ba45a8592f2a9dcdc618a1cd5da905f3b846dfbbd823733806aea4e2c328af0c
                                          • Instruction Fuzzy Hash: 1411B0B5D01259AFCB00DF9AD884ADEFFB4FB49320F10852AE918A7241D374A954CFA5
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 81c0870362a0ad7648b68522b9ed1094acedba9a450a8f164a37d6281a7621f0
                                          • Instruction ID: c968ee8129649165521048e9fd1fcb3c85ec2581831a8b31af14141892297068
                                          • Opcode Fuzzy Hash: 81c0870362a0ad7648b68522b9ed1094acedba9a450a8f164a37d6281a7621f0
                                          • Instruction Fuzzy Hash: CD01D670B104221BDB68A6AED45471BA2DBDBC9710F20C43EEA0EC7344DD61DD0243D5
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 319d1e415a21588a5b15f9824befc3d6ca76bdae84fa297a9eca44c3a5a3ffa8
                                          • Instruction ID: a69515180d8df6bd0dee52fc975384547e9b97fa1e8f17d858584cba265b0bed
                                          • Opcode Fuzzy Hash: 319d1e415a21588a5b15f9824befc3d6ca76bdae84fa297a9eca44c3a5a3ffa8
                                          • Instruction Fuzzy Hash: E7018F35F101211FDB60AA7DD850B6E77DAEB89750F148428E50AD7344EA21DC428785
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 931b11adfc3b75d8c9ea45e6330757b861350018636ced09f1310fd0e636dfb6
                                          • Instruction ID: d5d0deac95578637d12d1c8db661d635dc4cc4301870b3f764919eb60720bf5b
                                          • Opcode Fuzzy Hash: 931b11adfc3b75d8c9ea45e6330757b861350018636ced09f1310fd0e636dfb6
                                          • Instruction Fuzzy Hash: D501D175B1042A1BCB64A66DE85472EA3EADBC9610F14883DE91AC7340DE21DD424385
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d0c421560f5e03e99f8bbec5bdf366aac9301f9df3f599def12b983d78982a0f
                                          • Instruction ID: 20788599b7bb2607e7c5176b1d0ab208a2f99dc0245539d962c70386e1da4c60
                                          • Opcode Fuzzy Hash: d0c421560f5e03e99f8bbec5bdf366aac9301f9df3f599def12b983d78982a0f
                                          • Instruction Fuzzy Hash: A0018130B001211FCB54AA6DD85072E73D6FB89750F14842CE50EC7344DB21DD428785
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 01aec7ab1314ca6b52ba18e72a1a79451619ee34b4b4ecf3c86ea11381852293
                                          • Instruction ID: b81194c124d1b86e5c37cd57d3d13aba57e41771708ca13e33629e9ea1057f40
                                          • Opcode Fuzzy Hash: 01aec7ab1314ca6b52ba18e72a1a79451619ee34b4b4ecf3c86ea11381852293
                                          • Instruction Fuzzy Hash: 7CE0D871E16159ABDF60CEB5CD4975B77ADEB01208F2088B9D809D7202E136EB4183E1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2222239885
                                          • Opcode ID: b7347e4456879037717899f6eb465671bcb0a20ea0fda58d7f721c586f3a56af
                                          • Instruction ID: 51240521e5a8d697785126f3d1703bf092a2901180700893859038df0d2b5230
                                          • Opcode Fuzzy Hash: b7347e4456879037717899f6eb465671bcb0a20ea0fda58d7f721c586f3a56af
                                          • Instruction Fuzzy Hash: 2212FA30E0022ACFDB64EF65C994A9DB7F6BF88704F208569D409AB364DB319D85CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: c9884f88907314755a3a7cd0d2a67fb5e48b74c4d2ebfc2fbb1ea007c6ef8780
                                          • Instruction ID: 899c9859b403638da6b1e579c3a6eece8939ce3a5a0cacd2ce45d02657953ee9
                                          • Opcode Fuzzy Hash: c9884f88907314755a3a7cd0d2a67fb5e48b74c4d2ebfc2fbb1ea007c6ef8780
                                          • Instruction Fuzzy Hash: B2918E30E0022ADFDB68EFA6D954B6EBBF2AF84704F10852DE8019B354DB759D45CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-390881366
                                          • Opcode ID: 674758cbc16ac3dcf85cdb63e210f6b47db8af46eb2f822f85a7bbfacfa04a58
                                          • Instruction ID: d2dc18dab3e22d742a7a09cc731404f4ccbb647f3744e66a988451bcfb1d3878
                                          • Opcode Fuzzy Hash: 674758cbc16ac3dcf85cdb63e210f6b47db8af46eb2f822f85a7bbfacfa04a58
                                          • Instruction Fuzzy Hash: 17F17230B0021ACFDB58EF69C594A5EB7F6BF84304F248529E8069B369DB75EC42CB51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: 1187dae836211e014b55ef753687d9b7834be3bee3b4c4b275ac75ff5d135119
                                          • Instruction ID: 11e0d9fd016f72c2deffe25603d7203f415bd55e518e37041ef5efbab19d941e
                                          • Opcode Fuzzy Hash: 1187dae836211e014b55ef753687d9b7834be3bee3b4c4b275ac75ff5d135119
                                          • Instruction Fuzzy Hash: 48B16F30B0121A8FDB58EF69C5906AEB7B6FF84304F248529E406DB355DB74DC86CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LR^q$LR^q$$^q$$^q
                                          • API String ID: 0-2454687669
                                          • Opcode ID: 06e1fb85bff2d336740308c397fb92ca4f61dd1541207ae123f9c54658e83ef6
                                          • Instruction ID: bf064fffaa1337f208b677be0041fe6482602d07a3cc48670f6a37dbe562bc6d
                                          • Opcode Fuzzy Hash: 06e1fb85bff2d336740308c397fb92ca4f61dd1541207ae123f9c54658e83ef6
                                          • Instruction Fuzzy Hash: 65510730B012168FDB58EB29D950A6AB7F2FF88304F14866DE9159F369DB30EC44CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000013.00000002.3035600388.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_19_2_6c20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: 7ce0e70c4faecbe6bd66c382fbd6159e409f8d2a11e55d9b11586c26971d56cb
                                          • Instruction ID: db87afdd00353b00e6449f80220b621318e4652f03acbd322f793e16abdb7056
                                          • Opcode Fuzzy Hash: 7ce0e70c4faecbe6bd66c382fbd6159e409f8d2a11e55d9b11586c26971d56cb
                                          • Instruction Fuzzy Hash: 89519130E102168FDF65DBA9D9806AEB3B2EB88311F20852EDC05DB354DB31DD46CB91

                                          Execution Graph

                                          Execution Coverage:10.3%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:236
                                          Total number of Limit Nodes:13
                                          execution_graph 21268 119d548 DuplicateHandle 21269 119d5de 21268->21269 21270 1194668 21271 119467a 21270->21271 21272 1194686 21271->21272 21276 1194779 21271->21276 21281 1193e28 21272->21281 21274 11946a5 21277 119479d 21276->21277 21285 1194888 21277->21285 21289 1194878 21277->21289 21282 1193e33 21281->21282 21297 1195d58 21282->21297 21284 119709e 21284->21274 21287 11948af 21285->21287 21286 119498c 21286->21286 21287->21286 21293 11944b0 21287->21293 21291 11948af 21289->21291 21290 119498c 21290->21290 21291->21290 21292 11944b0 CreateActCtxA 21291->21292 21292->21290 21294 1195918 CreateActCtxA 21293->21294 21296 11959db 21294->21296 21296->21296 21298 1195d63 21297->21298 21301 1195d78 21298->21301 21300 1197145 21300->21284 21302 1195d83 21301->21302 21305 1195da8 21302->21305 21304 1197222 21304->21300 21306 1195db3 21305->21306 21309 1195dd8 21306->21309 21308 1197325 21308->21304 21310 1195de3 21309->21310 21312 119888b 21310->21312 21315 119af40 21310->21315 21311 11988c9 21311->21308 21312->21311 21319 119d037 21312->21319 21324 119af78 21315->21324 21328 119af67 21315->21328 21316 119af56 21316->21312 21320 119d059 21319->21320 21321 119d07d 21320->21321 21355 119d1e8 21320->21355 21359 119d1e7 21320->21359 21321->21311 21333 119b061 21324->21333 21338 119b070 21324->21338 21325 119af87 21325->21316 21329 119af78 21328->21329 21331 119b061 LoadLibraryExW 21329->21331 21332 119b070 LoadLibraryExW 21329->21332 21330 119af87 21330->21316 21331->21330 21332->21330 21334 119b081 21333->21334 21335 119b09c 21333->21335 21334->21335 21343 119b2f9 21334->21343 21347 119b308 21334->21347 21335->21325 21339 119b081 21338->21339 21340 119b09c 21338->21340 21339->21340 21341 119b2f9 LoadLibraryExW 21339->21341 21342 119b308 LoadLibraryExW 21339->21342 21340->21325 21341->21340 21342->21340 21344 119b31c 21343->21344 21345 119b341 21344->21345 21351 119aa88 21344->21351 21345->21335 21348 119b31c 21347->21348 21349 119aa88 LoadLibraryExW 21348->21349 21350 119b341 21348->21350 21349->21350 21350->21335 21352 119b4e8 LoadLibraryExW 21351->21352 21354 119b561 21352->21354 21354->21345 21356 119d1f5 21355->21356 21357 119d22f 21356->21357 21363 119cd48 21356->21363 21357->21321 21360 119d1f5 21359->21360 21361 119d22f 21360->21361 21362 119cd48 LoadLibraryExW 21360->21362 21361->21321 21362->21361 21364 119cd4d 21363->21364 21366 119db40 21364->21366 21367 119ce74 21364->21367 21366->21366 21368 119ce7f 21367->21368 21369 1195dd8 LoadLibraryExW 21368->21369 21370 119dbaf 21369->21370 21370->21366 21085 2bc3fde 21087 2bc3dec 21085->21087 21086 2bc3e13 21087->21086 21090 2bc5bf8 21087->21090 21110 2bc5be9 21087->21110 21091 2bc5c12 21090->21091 21096 2bc5c36 21091->21096 21130 2bc63fc 21091->21130 21134 2bc66c1 21091->21134 21139 2bc5f08 21091->21139 21145 2bc5fe8 21091->21145 21150 2bc638f 21091->21150 21155 2bc6aaf 21091->21155 21159 2bc686d 21091->21159 21164 2bc662c 21091->21164 21169 2bc622c 21091->21169 21174 2bc6013 21091->21174 21180 2bc6275 21091->21180 21185 2bc6295 21091->21185 21190 2bc62bb 21091->21190 21194 2bc631b 21091->21194 21200 2bc5f18 21091->21200 21206 2bc68b8 21091->21206 21211 2bc63b8 21091->21211 21096->21087 21111 2bc5c12 21110->21111 21112 2bc63fc 2 API calls 21111->21112 21113 2bc63b8 2 API calls 21111->21113 21114 2bc68b8 2 API calls 21111->21114 21115 2bc5f18 2 API calls 21111->21115 21116 2bc5c36 21111->21116 21117 2bc631b 2 API calls 21111->21117 21118 2bc62bb 2 API calls 21111->21118 21119 2bc6295 2 API calls 21111->21119 21120 2bc6275 2 API calls 21111->21120 21121 2bc6013 2 API calls 21111->21121 21122 2bc622c 2 API calls 21111->21122 21123 2bc662c 2 API calls 21111->21123 21124 2bc686d 2 API calls 21111->21124 21125 2bc6aaf 2 API calls 21111->21125 21126 2bc638f 2 API calls 21111->21126 21127 2bc5fe8 2 API calls 21111->21127 21128 2bc5f08 2 API calls 21111->21128 21129 2bc66c1 2 API calls 21111->21129 21112->21116 21113->21116 21114->21116 21115->21116 21116->21087 21117->21116 21118->21116 21119->21116 21120->21116 21121->21116 21122->21116 21123->21116 21124->21116 21125->21116 21126->21116 21127->21116 21128->21116 21129->21116 21215 2bc3178 21130->21215 21219 2bc3171 21130->21219 21131 2bc6416 21135 2bc66c7 21134->21135 21223 2bc3838 21135->21223 21227 2bc3830 21135->21227 21136 2bc6a8f 21141 2bc5f4b 21139->21141 21140 2bc602b 21140->21096 21141->21140 21231 2bc39c4 21141->21231 21235 2bc39d0 21141->21235 21146 2bc5ff1 21145->21146 21148 2bc39c4 CreateProcessA 21146->21148 21149 2bc39d0 CreateProcessA 21146->21149 21147 2bc6151 21147->21096 21148->21147 21149->21147 21151 2bc62ba 21150->21151 21152 2bc62e9 21151->21152 21239 2bc3748 21151->21239 21243 2bc3740 21151->21243 21152->21096 21157 2bc3178 Wow64SetThreadContext 21155->21157 21158 2bc3171 Wow64SetThreadContext 21155->21158 21156 2bc6ac9 21157->21156 21158->21156 21160 2bc6873 21159->21160 21247 2bc30c8 21160->21247 21251 2bc30c0 21160->21251 21161 2bc6899 21161->21096 21165 2bc6647 21164->21165 21255 2bc3250 21165->21255 21259 2bc3249 21165->21259 21166 2bc6663 21170 2bc623d 21169->21170 21172 2bc3748 WriteProcessMemory 21170->21172 21173 2bc3740 WriteProcessMemory 21170->21173 21171 2bc6a0c 21172->21171 21173->21171 21175 2bc602b 21174->21175 21176 2bc5ff1 21174->21176 21175->21096 21176->21175 21178 2bc39c4 CreateProcessA 21176->21178 21179 2bc39d0 CreateProcessA 21176->21179 21177 2bc6151 21177->21096 21178->21177 21179->21177 21181 2bc644c 21180->21181 21183 2bc3838 ReadProcessMemory 21181->21183 21184 2bc3830 ReadProcessMemory 21181->21184 21182 2bc6a8f 21183->21182 21184->21182 21186 2bc62aa 21185->21186 21188 2bc3838 ReadProcessMemory 21186->21188 21189 2bc3830 ReadProcessMemory 21186->21189 21187 2bc6a8f 21188->21187 21189->21187 21192 2bc3748 WriteProcessMemory 21190->21192 21193 2bc3740 WriteProcessMemory 21190->21193 21191 2bc62e9 21191->21096 21192->21191 21193->21191 21195 2bc6328 21194->21195 21197 2bc617c 21195->21197 21198 2bc30c8 ResumeThread 21195->21198 21199 2bc30c0 ResumeThread 21195->21199 21196 2bc6899 21196->21096 21197->21096 21198->21196 21199->21196 21202 2bc5f4b 21200->21202 21201 2bc602b 21201->21096 21202->21201 21204 2bc39c4 CreateProcessA 21202->21204 21205 2bc39d0 CreateProcessA 21202->21205 21203 2bc6151 21203->21096 21204->21203 21205->21203 21207 2bc6885 21206->21207 21209 2bc30c8 ResumeThread 21207->21209 21210 2bc30c0 ResumeThread 21207->21210 21208 2bc6899 21208->21096 21209->21208 21210->21208 21213 2bc3748 WriteProcessMemory 21211->21213 21214 2bc3740 WriteProcessMemory 21211->21214 21212 2bc63dc 21212->21096 21213->21212 21214->21212 21216 2bc31bd Wow64SetThreadContext 21215->21216 21218 2bc3205 21216->21218 21218->21131 21220 2bc31bd Wow64SetThreadContext 21219->21220 21222 2bc3205 21220->21222 21222->21131 21224 2bc3883 ReadProcessMemory 21223->21224 21226 2bc38c7 21224->21226 21226->21136 21228 2bc3883 ReadProcessMemory 21227->21228 21230 2bc38c7 21228->21230 21230->21136 21232 2bc3a59 CreateProcessA 21231->21232 21234 2bc3c1b 21232->21234 21234->21234 21236 2bc3a59 CreateProcessA 21235->21236 21238 2bc3c1b 21236->21238 21238->21238 21240 2bc3790 WriteProcessMemory 21239->21240 21242 2bc37e7 21240->21242 21242->21152 21244 2bc3748 WriteProcessMemory 21243->21244 21246 2bc37e7 21244->21246 21246->21152 21248 2bc3108 ResumeThread 21247->21248 21250 2bc3139 21248->21250 21250->21161 21252 2bc3108 ResumeThread 21251->21252 21254 2bc3139 21252->21254 21254->21161 21256 2bc3290 VirtualAllocEx 21255->21256 21258 2bc32cd 21256->21258 21258->21166 21260 2bc3290 VirtualAllocEx 21259->21260 21262 2bc32cd 21260->21262 21262->21166 21371 2bc7268 21372 2bc73f3 21371->21372 21374 2bc728e 21371->21374 21374->21372 21375 2bc6d7c 21374->21375 21376 2bc74e8 PostMessageW 21375->21376 21377 2bc7554 21376->21377 21377->21374 21378 119d300 21379 119d346 GetCurrentProcess 21378->21379 21381 119d398 GetCurrentThread 21379->21381 21382 119d391 21379->21382 21383 119d3ce 21381->21383 21384 119d3d5 GetCurrentProcess 21381->21384 21382->21381 21383->21384 21387 119d40b 21384->21387 21385 119d433 GetCurrentThreadId 21386 119d464 21385->21386 21387->21385 21388 119b260 21389 119b2a8 GetModuleHandleW 21388->21389 21390 119b2a2 21388->21390 21391 119b2d5 21389->21391 21390->21389 21263 2bc3f70 21265 2bc3dec 21263->21265 21264 2bc3e13 21265->21264 21266 2bc5bf8 12 API calls 21265->21266 21267 2bc5be9 12 API calls 21265->21267 21266->21265 21267->21265

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 316 119d300-119d38f GetCurrentProcess 320 119d398-119d3cc GetCurrentThread 316->320 321 119d391-119d397 316->321 322 119d3ce-119d3d4 320->322 323 119d3d5-119d409 GetCurrentProcess 320->323 321->320 322->323 325 119d40b-119d411 323->325 326 119d412-119d42d call 119d4dd 323->326 325->326 328 119d433-119d462 GetCurrentThreadId 326->328 330 119d46b-119d4cd 328->330 331 119d464-119d46a 328->331 331->330
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 0119D37E
                                          • GetCurrentThread.KERNEL32 ref: 0119D3BB
                                          • GetCurrentProcess.KERNEL32 ref: 0119D3F8
                                          • GetCurrentThreadId.KERNEL32 ref: 0119D451
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008305745.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_1190000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 08ce4e17c8247843d82fa18fc29be3370ae594ad2ff70148be5e0a6877179449
                                          • Instruction ID: 67e85a57aa29731ce8405d6dce4f3c3e48051a33ea32aef034dae528701f98c7
                                          • Opcode Fuzzy Hash: 08ce4e17c8247843d82fa18fc29be3370ae594ad2ff70148be5e0a6877179449
                                          • Instruction Fuzzy Hash: D25124B09003498FEB18DFAAD649B9EBBF1BF49314F20C559D019A7360DB349984CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 294 119d2ff-119d38f GetCurrentProcess 298 119d398-119d3cc GetCurrentThread 294->298 299 119d391-119d397 294->299 300 119d3ce-119d3d4 298->300 301 119d3d5-119d409 GetCurrentProcess 298->301 299->298 300->301 303 119d40b-119d411 301->303 304 119d412-119d42d call 119d4dd 301->304 303->304 306 119d433-119d462 GetCurrentThreadId 304->306 308 119d46b-119d4cd 306->308 309 119d464-119d46a 306->309 309->308
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 0119D37E
                                          • GetCurrentThread.KERNEL32 ref: 0119D3BB
                                          • GetCurrentProcess.KERNEL32 ref: 0119D3F8
                                          • GetCurrentThreadId.KERNEL32 ref: 0119D451
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008305745.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_1190000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: a81ff354e74cb132318d0a4698ef7ba7eda32012a1a99096295f116ad6f77b2d
                                          • Instruction ID: 6f751af844d314205f154859a5a1dc475da5808011e6c70e1fd7d2fe92feeaea
                                          • Opcode Fuzzy Hash: a81ff354e74cb132318d0a4698ef7ba7eda32012a1a99096295f116ad6f77b2d
                                          • Instruction Fuzzy Hash: 5D5124B09002498FEB18DFAAD649BDEBBF1BF89314F20C559D019A7360DB349984CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 361 2bc39c4-2bc3a65 363 2bc3a9e-2bc3abe 361->363 364 2bc3a67-2bc3a71 361->364 369 2bc3af7-2bc3b26 363->369 370 2bc3ac0-2bc3aca 363->370 364->363 365 2bc3a73-2bc3a75 364->365 367 2bc3a98-2bc3a9b 365->367 368 2bc3a77-2bc3a81 365->368 367->363 371 2bc3a85-2bc3a94 368->371 372 2bc3a83 368->372 380 2bc3b5f-2bc3c19 CreateProcessA 369->380 381 2bc3b28-2bc3b32 369->381 370->369 373 2bc3acc-2bc3ace 370->373 371->371 374 2bc3a96 371->374 372->371 375 2bc3ad0-2bc3ada 373->375 376 2bc3af1-2bc3af4 373->376 374->367 378 2bc3adc 375->378 379 2bc3ade-2bc3aed 375->379 376->369 378->379 379->379 382 2bc3aef 379->382 392 2bc3c1b-2bc3c21 380->392 393 2bc3c22-2bc3ca8 380->393 381->380 383 2bc3b34-2bc3b36 381->383 382->376 385 2bc3b38-2bc3b42 383->385 386 2bc3b59-2bc3b5c 383->386 387 2bc3b44 385->387 388 2bc3b46-2bc3b55 385->388 386->380 387->388 388->388 389 2bc3b57 388->389 389->386 392->393 403 2bc3cb8-2bc3cbc 393->403 404 2bc3caa-2bc3cae 393->404 405 2bc3ccc-2bc3cd0 403->405 406 2bc3cbe-2bc3cc2 403->406 404->403 407 2bc3cb0 404->407 409 2bc3ce0-2bc3ce4 405->409 410 2bc3cd2-2bc3cd6 405->410 406->405 408 2bc3cc4 406->408 407->403 408->405 412 2bc3cf6-2bc3cfd 409->412 413 2bc3ce6-2bc3cec 409->413 410->409 411 2bc3cd8 410->411 411->409 414 2bc3cff-2bc3d0e 412->414 415 2bc3d14 412->415 413->412 414->415 416 2bc3d15 415->416 416->416
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02BC3C06
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 67cc379f6923aa3c03ef314f1fb1ed6b4b4dfb74051705c868ea6f0c77001abe
                                          • Instruction ID: 1a2302dc2f6b44892f368be6447b0c42bee5e1e9814c93cee65efc5fa3c7c23b
                                          • Opcode Fuzzy Hash: 67cc379f6923aa3c03ef314f1fb1ed6b4b4dfb74051705c868ea6f0c77001abe
                                          • Instruction Fuzzy Hash: 5FA14871D0021ADFDB10DF68C841BEEBBF2EF48314F6485A9E818A7290DB759985CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 418 2bc39d0-2bc3a65 420 2bc3a9e-2bc3abe 418->420 421 2bc3a67-2bc3a71 418->421 426 2bc3af7-2bc3b26 420->426 427 2bc3ac0-2bc3aca 420->427 421->420 422 2bc3a73-2bc3a75 421->422 424 2bc3a98-2bc3a9b 422->424 425 2bc3a77-2bc3a81 422->425 424->420 428 2bc3a85-2bc3a94 425->428 429 2bc3a83 425->429 437 2bc3b5f-2bc3c19 CreateProcessA 426->437 438 2bc3b28-2bc3b32 426->438 427->426 430 2bc3acc-2bc3ace 427->430 428->428 431 2bc3a96 428->431 429->428 432 2bc3ad0-2bc3ada 430->432 433 2bc3af1-2bc3af4 430->433 431->424 435 2bc3adc 432->435 436 2bc3ade-2bc3aed 432->436 433->426 435->436 436->436 439 2bc3aef 436->439 449 2bc3c1b-2bc3c21 437->449 450 2bc3c22-2bc3ca8 437->450 438->437 440 2bc3b34-2bc3b36 438->440 439->433 442 2bc3b38-2bc3b42 440->442 443 2bc3b59-2bc3b5c 440->443 444 2bc3b44 442->444 445 2bc3b46-2bc3b55 442->445 443->437 444->445 445->445 446 2bc3b57 445->446 446->443 449->450 460 2bc3cb8-2bc3cbc 450->460 461 2bc3caa-2bc3cae 450->461 462 2bc3ccc-2bc3cd0 460->462 463 2bc3cbe-2bc3cc2 460->463 461->460 464 2bc3cb0 461->464 466 2bc3ce0-2bc3ce4 462->466 467 2bc3cd2-2bc3cd6 462->467 463->462 465 2bc3cc4 463->465 464->460 465->462 469 2bc3cf6-2bc3cfd 466->469 470 2bc3ce6-2bc3cec 466->470 467->466 468 2bc3cd8 467->468 468->466 471 2bc3cff-2bc3d0e 469->471 472 2bc3d14 469->472 470->469 471->472 473 2bc3d15 472->473 473->473
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02BC3C06
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 3e888e9520f224cfbe97709a1267b63b18ae273f7bcd067447e44f2054e76d05
                                          • Instruction ID: fc6cb20a75c3e02a4c61d24d392fca043755231ac2db1ccd6549f7d77553321e
                                          • Opcode Fuzzy Hash: 3e888e9520f224cfbe97709a1267b63b18ae273f7bcd067447e44f2054e76d05
                                          • Instruction Fuzzy Hash: 90914871D002199FDB10DFA8C841BEEBBF2EF48314F6485A9E818A7250DB759985CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 475 1195a84-1195a8f 477 1195b09-1195b1b 475->477
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008305745.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_1190000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7b36b691f5d00202ad4799c78d6a305c29ce491ebe5e447a8fc7a6eba17f4b0b
                                          • Instruction ID: 31518926e92ac215e3e6c947abc2254e3ca8337cf786f3a29a7537be81a87ef0
                                          • Opcode Fuzzy Hash: 7b36b691f5d00202ad4799c78d6a305c29ce491ebe5e447a8fc7a6eba17f4b0b
                                          • Instruction Fuzzy Hash: 3941F371800749CFDF5ACFA8C8447ADBFB6EF46324F14428AC06AAB265D7355946CF41

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 479 11944b0-11959d9 CreateActCtxA 483 11959db-11959e1 479->483 484 11959e2-1195a3c 479->484 483->484 491 1195a4b-1195a4f 484->491 492 1195a3e-1195a41 484->492 493 1195a51-1195a5d 491->493 494 1195a60 491->494 492->491 493->494 496 1195a61 494->496 496->496
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 011959C9
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008305745.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_1190000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: ac585787c1d528182d5f109bfa89d0a9dfb9d642c13d0c852475459c707bd6e8
                                          • Instruction ID: 912be274165fa8876d73f1d9a1489876b3d3f6d5140c6ce706fd68940082ad12
                                          • Opcode Fuzzy Hash: ac585787c1d528182d5f109bfa89d0a9dfb9d642c13d0c852475459c707bd6e8
                                          • Instruction Fuzzy Hash: 9B41F2B0C00719CBDF28DFA9C84578EBBB6BF49304F20806AD418BB255DB756945CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 497 119590d-119598c 499 119598f-11959d9 CreateActCtxA 497->499 501 11959db-11959e1 499->501 502 11959e2-1195a3c 499->502 501->502 509 1195a4b-1195a4f 502->509 510 1195a3e-1195a41 502->510 511 1195a51-1195a5d 509->511 512 1195a60 509->512 510->509 511->512 514 1195a61 512->514 514->514
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 011959C9
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008305745.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_1190000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 1140294052f1f1f2f7b279123748fab932fc67725eb505c0f9632acdbf12c13f
                                          • Instruction ID: e8e50db081f0c534b2ed725bede6b900aeffe1a6368f164e5a2a3946e9d9faa6
                                          • Opcode Fuzzy Hash: 1140294052f1f1f2f7b279123748fab932fc67725eb505c0f9632acdbf12c13f
                                          • Instruction Fuzzy Hash: AC41F1B0C00719CADB24DFAAC8857CDBBB6BF49314F24806AD418BB255DB756946CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 515 2bc3740-2bc3796 518 2bc3798-2bc37a4 515->518 519 2bc37a6-2bc37e5 WriteProcessMemory 515->519 518->519 521 2bc37ee-2bc381e 519->521 522 2bc37e7-2bc37ed 519->522 522->521
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02BC37D8
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 0bd8c1ae5b1a4e4100aa12a37ca8dd03b276f9276fd75639c4661dbfe58ee101
                                          • Instruction ID: fd3ceefab055088ea96f0bebdc220499440aeebaaf4b717e6be842e40e14a0d0
                                          • Opcode Fuzzy Hash: 0bd8c1ae5b1a4e4100aa12a37ca8dd03b276f9276fd75639c4661dbfe58ee101
                                          • Instruction Fuzzy Hash: B02157B69003199FCB10CFA9C885BDEBBF5FF48314F10842AE958A7240D778A944CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 526 2bc3748-2bc3796 528 2bc3798-2bc37a4 526->528 529 2bc37a6-2bc37e5 WriteProcessMemory 526->529 528->529 531 2bc37ee-2bc381e 529->531 532 2bc37e7-2bc37ed 529->532 532->531
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02BC37D8
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 2ae56cdc9cf1e9943c49d65a97f47a9b27a8f133ff4a20bc46c9d6e037d9d05b
                                          • Instruction ID: 929aac57d3a6168d30edf19d7a6d49ed5ee65966a1d49ad35c4434978ec94cde
                                          • Opcode Fuzzy Hash: 2ae56cdc9cf1e9943c49d65a97f47a9b27a8f133ff4a20bc46c9d6e037d9d05b
                                          • Instruction Fuzzy Hash: 552127B59003599FCB10CFA9C985BDEBBF5FF48314F10842AE958A7250C7789944CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 536 2bc3171-2bc31c3 538 2bc31c5-2bc31d1 536->538 539 2bc31d3-2bc3203 Wow64SetThreadContext 536->539 538->539 541 2bc320c-2bc323c 539->541 542 2bc3205-2bc320b 539->542 542->541
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02BC31F6
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 5844d3a02ae0133dcc2e4ef638266155a933ecbb068f0a6cec513e0dafcf1aeb
                                          • Instruction ID: 3f03abb6ae2d051b0523a99d65cf608573494eb9b0e8a65dc7350f02cc5144f9
                                          • Opcode Fuzzy Hash: 5844d3a02ae0133dcc2e4ef638266155a933ecbb068f0a6cec513e0dafcf1aeb
                                          • Instruction Fuzzy Hash: 502125B19002098FDB10DFAAC4857AEBFF4EB48324F10C46ED459A7241CB789985CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 564 2bc3838-2bc38c5 ReadProcessMemory 567 2bc38ce-2bc38fe 564->567 568 2bc38c7-2bc38cd 564->568 568->567
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02BC38B8
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: f5dddfb188e48f68df9ce500fa110993d45613743ee47cdb574a61f00bd83424
                                          • Instruction ID: 7710b10c73c287a1a544e471d3a6120a94d49a307452ee656577e482f36d6d14
                                          • Opcode Fuzzy Hash: f5dddfb188e48f68df9ce500fa110993d45613743ee47cdb574a61f00bd83424
                                          • Instruction Fuzzy Hash: B92128B19002599FCB10DFAAC845ADEFBF5FF48310F508429E558A7250C738A544CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 556 2bc3830-2bc38c5 ReadProcessMemory 559 2bc38ce-2bc38fe 556->559 560 2bc38c7-2bc38cd 556->560 560->559
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02BC38B8
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 58090571f8e8a2fd7de7eab993e34ee6ec8dbb2cd2c8916b10cb8643a1007083
                                          • Instruction ID: 0ed9d53cbf2f432c7f88ca1a5489912e26cd2b411fd08a1850c4ab5a42fb0705
                                          • Opcode Fuzzy Hash: 58090571f8e8a2fd7de7eab993e34ee6ec8dbb2cd2c8916b10cb8643a1007083
                                          • Instruction Fuzzy Hash: 4D2114B2D002599FCB10CFA9C985BEEBBF5FF48314F14886AE559A7250C738A544CFA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 546 2bc3178-2bc31c3 548 2bc31c5-2bc31d1 546->548 549 2bc31d3-2bc3203 Wow64SetThreadContext 546->549 548->549 551 2bc320c-2bc323c 549->551 552 2bc3205-2bc320b 549->552 552->551
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02BC31F6
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 0f17611c45791249d53a2381a8275d967ec18b974e3e17d388e8de2cce2bb68d
                                          • Instruction ID: 5ad80a0a62980a615aa4e08c4fb5d7fe7c2e11fb1d84b242367180e2c554bbfa
                                          • Opcode Fuzzy Hash: 0f17611c45791249d53a2381a8275d967ec18b974e3e17d388e8de2cce2bb68d
                                          • Instruction Fuzzy Hash: C72138B19002098FDB10DFAAC4857EEBBF4EF48324F50C46DD459A7240C7789984CFA5
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0119D5CF
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008305745.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_1190000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: d71d99306808aa6e117cd76d66420b0320138e552777ff7a1cb3f2ba08ddfb4f
                                          • Instruction ID: 54503179995dd91a902f0636cfaad474ef0ee41bb05b4ba8335c1a5a98a716f4
                                          • Opcode Fuzzy Hash: d71d99306808aa6e117cd76d66420b0320138e552777ff7a1cb3f2ba08ddfb4f
                                          • Instruction Fuzzy Hash: 7621E4B59002089FDB10CF9AD584ADEBFF4EB48310F14841AE918A3310D374A940CFA5
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0119D5CF
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008305745.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_1190000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 3ec737378d6f04443dcc1def9e83023db8040f997dc1e9a43e24d9f5a0e4eb7c
                                          • Instruction ID: 5719307556c605819c249c5012dbb7450aac7d295e1847f1e250711417c711df
                                          • Opcode Fuzzy Hash: 3ec737378d6f04443dcc1def9e83023db8040f997dc1e9a43e24d9f5a0e4eb7c
                                          • Instruction Fuzzy Hash: 9E21E2B5900248AFDB10CFAAD584AEEBFF4EB48320F14841AE958A3310C379A945CF60
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0119B341,00000800,00000000,00000000), ref: 0119B552
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008305745.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_1190000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: e9d7bfaa60c7b62508f1e6fd2ccf46e7ed230170c3ac3858affdd74c1ee70077
                                          • Instruction ID: e47282f2d5ff9d582959ad556ccd7b20e316d3699f270daa46370a20f0ac5e1b
                                          • Opcode Fuzzy Hash: e9d7bfaa60c7b62508f1e6fd2ccf46e7ed230170c3ac3858affdd74c1ee70077
                                          • Instruction Fuzzy Hash: 461123B6904348CFDB24DF9AD448ADEFBF4EB88310F10842EE529A7210C375A945CFA5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02BC32BE
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 1d3c5085f831c9c8d6108267b034144440d670f55e619c7238bf624ef660909e
                                          • Instruction ID: ccb2c022c0737b160c3fc02519f418192796891b1ba6a86afc2f3104f579251d
                                          • Opcode Fuzzy Hash: 1d3c5085f831c9c8d6108267b034144440d670f55e619c7238bf624ef660909e
                                          • Instruction Fuzzy Hash: BE1156729002498FCB10DFA9C845ADEFFF5EF88324F20C819E559AB250CB35A944CFA0
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02BC32BE
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 44d7d23a38dbfb453800c94ddcaec91b20ca912f65cd18eae1e4fc5af873c6c4
                                          • Instruction ID: 4105c3d458ef31d4ebfe23373f8ecbd062411af1817e008aa158750adcd32e34
                                          • Opcode Fuzzy Hash: 44d7d23a38dbfb453800c94ddcaec91b20ca912f65cd18eae1e4fc5af873c6c4
                                          • Instruction Fuzzy Hash: CF1156729002488FCB10DFAAC844ADEFFF5EF88324F208819E559A7250C735A544CFA0
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0119B341,00000800,00000000,00000000), ref: 0119B552
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008305745.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_1190000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 74d0ff4f34fa3a087c9a97c7c7fb035b0f29ae07b5d2e48ceea5a346e2f8db5c
                                          • Instruction ID: 36802bacdc8d5e76c804eaf645202fffa02f91ea4342f369ff05003f089dfa72
                                          • Opcode Fuzzy Hash: 74d0ff4f34fa3a087c9a97c7c7fb035b0f29ae07b5d2e48ceea5a346e2f8db5c
                                          • Instruction Fuzzy Hash: 2B11E2B69042498FDB24CFAAD484ADEFBF4EB88310F14842AD569A7210C375A545CFA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 3a366b1c88f4692a432161bd4f55030e1d4954723c89bf0cbc551698437ebfdf
                                          • Instruction ID: 7a51a7dc61dbef6b72e4289ed22ac9db9351c5faced45d408422b8f9b201c872
                                          • Opcode Fuzzy Hash: 3a366b1c88f4692a432161bd4f55030e1d4954723c89bf0cbc551698437ebfdf
                                          • Instruction Fuzzy Hash: 231128B19002488FCB20DFAAC4457DEFFF4EB88324F208459D559A7250CB75A985CF95
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 74a435839f28729605daf35515fcc655e3dce7f59a69c6bed7ce32ee2a106b61
                                          • Instruction ID: 1e6fc38a65e7de53d6c37486735c7050bfe7d7c5e4d3113a25b3fb8a0c6c9cf6
                                          • Opcode Fuzzy Hash: 74a435839f28729605daf35515fcc655e3dce7f59a69c6bed7ce32ee2a106b61
                                          • Instruction Fuzzy Hash: CE113AB19002488FCB10DFAAC4457DEFBF4EF88324F208459D559A7250C775A544CF95
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 02BC7545
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 785849a7bbf20e6b11da909af00b9327c4341fb98b6776934cdfbcec46242dc0
                                          • Instruction ID: 79ce92965dc6034c82158cd550fe3a75d5b318adfc1a9fec2a6cd1fab0795399
                                          • Opcode Fuzzy Hash: 785849a7bbf20e6b11da909af00b9327c4341fb98b6776934cdfbcec46242dc0
                                          • Instruction Fuzzy Hash: D311F2B5800348DFCB10DF9AC449BDEFBF8EB48324F20885AE558A7201C375A944CFA5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0119B2C6
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008305745.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_1190000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: a029f9d27743b5a3d87344cb7169987e7838c0038865ff44efc39fa369004b84
                                          • Instruction ID: 7c65eb7f8c500ef9542428c832e002f53f91df66d0d5c02ac9e31cbf8cea8c33
                                          • Opcode Fuzzy Hash: a029f9d27743b5a3d87344cb7169987e7838c0038865ff44efc39fa369004b84
                                          • Instruction Fuzzy Hash: EF110FB5C002498EDB24CFAAD444ADEFBF4EF88320F10856AD469B7210C379A545CFA5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0119B2C6
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008305745.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_1190000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 6d5cccd2d2bd05616bcde40a92ea2359eb8fc7144534492a79819062aec487b0
                                          • Instruction ID: ab894a9ff0d0a20600678b2fc308130a34b21ecf374537a9bbb02b6cb04805d3
                                          • Opcode Fuzzy Hash: 6d5cccd2d2bd05616bcde40a92ea2359eb8fc7144534492a79819062aec487b0
                                          • Instruction Fuzzy Hash: A1110CB6C002498FDB14CF9AD444ADEFBF4EF88220F10846AD828B7210C379A545CFA5
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 02BC7545
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2009094631.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_2bc0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: ee0b83f205926e5e8d77aed18e27b86bddcef318054b44254bf7c086fdbdf171
                                          • Instruction ID: 17683516cc6e2eca5238f97c27aaaa54f89287c5ac735abbf4e1ae3d11747750
                                          • Opcode Fuzzy Hash: ee0b83f205926e5e8d77aed18e27b86bddcef318054b44254bf7c086fdbdf171
                                          • Instruction Fuzzy Hash: C611C5B59002499FDB10DF99C545BDEFBF8EB48314F208459D554A7210C375A544CFA5
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2007961086.000000000113D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0113D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_113d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0dc990212910fa58e393664d5daf41313b2c0fed3fa984c2e95383564bc33671
                                          • Instruction ID: ce2f710def22bba0408451baa1cfb420ec5db4d2d4fd687d008dc910fb3c24d8
                                          • Opcode Fuzzy Hash: 0dc990212910fa58e393664d5daf41313b2c0fed3fa984c2e95383564bc33671
                                          • Instruction Fuzzy Hash: 55212571600240DFDF09DF58E9C0B26BF75FBC8318F60C569E9094B29AC336D456CAA2
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008046890.000000000114D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0114D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_114d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3a15aa97ddb108024018e5074f7fda87b2391852c29799628768a2f8919f5142
                                          • Instruction ID: 8f0a2aa0c1b6d4f6d174adeebb1255bf08b63631e4514a7475ea73b8136a850b
                                          • Opcode Fuzzy Hash: 3a15aa97ddb108024018e5074f7fda87b2391852c29799628768a2f8919f5142
                                          • Instruction Fuzzy Hash: D1212671604200EFDF09DF98E9C4F26BBA5FB94B24F20C66DE9094B356C336D446CA62
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008046890.000000000114D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0114D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_114d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c3960eb2be26654d5f9e1358f2440c8148cd1ea90cba48a41692507475637813
                                          • Instruction ID: c37788a01cc7751d2f6273b454a60d68bca90301cac5c00b2fbcdbf0823910c4
                                          • Opcode Fuzzy Hash: c3960eb2be26654d5f9e1358f2440c8148cd1ea90cba48a41692507475637813
                                          • Instruction Fuzzy Hash: D7212271604200DFCF19DF98E984B26BFA5EB94B14F20C5ADD80A4B256C33AD447CA62
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008046890.000000000114D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0114D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_114d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 17b4918c435dcbe34b85352626e34210730f554533ff580960d0ffbd01f16abc
                                          • Instruction ID: cddce4609e38f615e84248b48a1170e9eae514333594512efa133c72df558454
                                          • Opcode Fuzzy Hash: 17b4918c435dcbe34b85352626e34210730f554533ff580960d0ffbd01f16abc
                                          • Instruction Fuzzy Hash: 5E219F755083809FCF07CF64D994B11BF71EB56614F28C5EAD8498F2A7C33A980ACB62
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2007961086.000000000113D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0113D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_113d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: e9ebde5489e9518be01e1ba68bd9b87b116bb526ffa5290b9cfad5f3eab0894a
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 9E11B176504280CFDF16CF54E5C4B16BF71FB84328F24C6A9D9490B65AC336D45ACBA2
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.2008046890.000000000114D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0114D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_114d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 3f208e90a7be273a759ef9a79cc79fdeacc0345d95cf9110c26801ea245ad058
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: C911BB75504280DFDF06CF54D5C4B15BFA1FB84624F24C6AAE8494B296C33AD40ACB62

                                          Execution Graph

                                          Execution Coverage:10.4%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:173
                                          Total number of Limit Nodes:16
                                          execution_graph 38719 13d0848 38721 13d084e 38719->38721 38720 13d091b 38721->38720 38725 13d138f 38721->38725 38730 6b620f8 38721->38730 38734 6b62108 38721->38734 38726 13d1308 38725->38726 38727 13d1393 38725->38727 38726->38721 38728 13d14ba 38727->38728 38738 13d8258 38727->38738 38728->38721 38731 6b62108 38730->38731 38751 6b61864 38731->38751 38735 6b62117 38734->38735 38736 6b61864 3 API calls 38735->38736 38737 6b62138 38736->38737 38737->38721 38739 13d8262 38738->38739 38740 13d827c 38739->38740 38743 6b7fa30 38739->38743 38747 6b7fa1f 38739->38747 38740->38727 38745 6b7fa45 38743->38745 38744 6b7fc5a 38744->38740 38745->38744 38746 6b7fc70 GlobalMemoryStatusEx GlobalMemoryStatusEx 38745->38746 38746->38745 38748 6b7fa45 38747->38748 38749 6b7fc5a 38748->38749 38750 6b7fc70 GlobalMemoryStatusEx GlobalMemoryStatusEx 38748->38750 38749->38740 38750->38748 38752 6b6186f 38751->38752 38755 6b62fcc 38752->38755 38754 6b63abe 38756 6b62fd7 38755->38756 38757 6b641e4 38756->38757 38760 6b65e63 38756->38760 38764 6b65e68 38756->38764 38757->38754 38761 6b65e68 38760->38761 38762 6b65ead 38761->38762 38768 6b66018 38761->38768 38762->38757 38765 6b65e89 38764->38765 38766 6b65ead 38765->38766 38767 6b66018 3 API calls 38765->38767 38766->38757 38767->38766 38769 6b66025 38768->38769 38771 6b6605e 38769->38771 38772 6b65230 38769->38772 38771->38762 38773 6b6523b 38772->38773 38775 6b660d0 38773->38775 38776 6b65264 38773->38776 38775->38775 38777 6b6526f 38776->38777 38783 6b65274 38777->38783 38779 6b6613f 38787 6b6b438 38779->38787 38796 6b6b450 38779->38796 38780 6b66179 38780->38775 38786 6b6527f 38783->38786 38784 6b673c8 38784->38779 38785 6b65e68 3 API calls 38785->38784 38786->38784 38786->38785 38789 6b6b481 38787->38789 38791 6b6b581 38787->38791 38788 6b6b48d 38788->38780 38789->38788 38805 6b6b6b8 38789->38805 38810 6b6b6c8 38789->38810 38790 6b6b4cd 38814 6b6c9c8 38790->38814 38824 6b6c9b9 38790->38824 38791->38780 38798 6b6b481 38796->38798 38799 6b6b581 38796->38799 38797 6b6b48d 38797->38780 38798->38797 38803 6b6b6b8 3 API calls 38798->38803 38804 6b6b6c8 3 API calls 38798->38804 38799->38780 38800 6b6b4cd 38801 6b6c9c8 GetModuleHandleW 38800->38801 38802 6b6c9b9 GetModuleHandleW 38800->38802 38801->38799 38802->38799 38803->38800 38804->38800 38806 6b6b6c8 38805->38806 38834 6b6b718 38806->38834 38843 6b6b708 38806->38843 38807 6b6b6d2 38807->38790 38812 6b6b718 2 API calls 38810->38812 38813 6b6b708 2 API calls 38810->38813 38811 6b6b6d2 38811->38790 38812->38811 38813->38811 38815 6b6c9f3 38814->38815 38816 6b6a77c GetModuleHandleW 38815->38816 38817 6b6ca5a 38816->38817 38822 6b6a77c GetModuleHandleW 38817->38822 38852 6b6ce78 38817->38852 38857 6b6cf20 38817->38857 38818 6b6ca76 38819 6b6a6ac GetModuleHandleW 38818->38819 38820 6b6caa2 38818->38820 38819->38820 38822->38818 38825 6b6c9f3 38824->38825 38826 6b6a77c GetModuleHandleW 38825->38826 38827 6b6ca5a 38826->38827 38831 6b6cf20 GetModuleHandleW 38827->38831 38832 6b6a77c GetModuleHandleW 38827->38832 38833 6b6ce78 GetModuleHandleW 38827->38833 38828 6b6ca76 38829 6b6caa2 38828->38829 38830 6b6a6ac GetModuleHandleW 38828->38830 38829->38829 38830->38829 38831->38828 38832->38828 38833->38828 38835 6b6b729 38834->38835 38838 6b6b74c 38834->38838 38836 6b6a6ac GetModuleHandleW 38835->38836 38837 6b6b734 38836->38837 38837->38838 38842 6b6b9a1 GetModuleHandleW 38837->38842 38838->38807 38839 6b6b950 GetModuleHandleW 38841 6b6b97d 38839->38841 38840 6b6b744 38840->38838 38840->38839 38841->38807 38842->38840 38844 6b6b70d 38843->38844 38845 6b6a6ac GetModuleHandleW 38844->38845 38847 6b6b74c 38844->38847 38846 6b6b734 38845->38846 38846->38847 38851 6b6b9a1 GetModuleHandleW 38846->38851 38847->38807 38848 6b6b744 38848->38847 38849 6b6b950 GetModuleHandleW 38848->38849 38850 6b6b97d 38849->38850 38850->38807 38851->38848 38853 6b6ce88 38852->38853 38854 6b6ce93 38853->38854 38855 6b6d090 GetModuleHandleW 38853->38855 38856 6b6d080 GetModuleHandleW 38853->38856 38854->38818 38855->38854 38856->38854 38858 6b6cf4d 38857->38858 38859 6b6cfce 38858->38859 38860 6b6d090 GetModuleHandleW 38858->38860 38861 6b6d080 GetModuleHandleW 38858->38861 38860->38859 38861->38859 38652 6b6d8f0 38653 6b6d958 CreateWindowExW 38652->38653 38655 6b6da14 38653->38655 38656 6b6bb70 38657 6b6bbb2 38656->38657 38658 6b6bbb8 LoadLibraryExW 38656->38658 38657->38658 38659 6b6bbe9 38658->38659 38660 138d030 38661 138d048 38660->38661 38662 138d0a2 38661->38662 38667 6b6da97 38661->38667 38671 6b6daa8 38661->38671 38675 6b6a87c 38661->38675 38679 6b6dbd1 38661->38679 38668 6b6daa5 38667->38668 38669 6b6a87c GetModuleHandleW 38668->38669 38670 6b6dada 38669->38670 38670->38662 38672 6b6dace 38671->38672 38673 6b6a87c GetModuleHandleW 38672->38673 38674 6b6dada 38673->38674 38674->38662 38676 6b6a887 38675->38676 38677 6b6dbe7 38676->38677 38682 6b6a8b4 38676->38682 38677->38662 38680 6b6a8b4 GetModuleHandleW 38679->38680 38681 6b6dbe7 38680->38681 38681->38662 38683 6b6a8bf 38682->38683 38688 6b6a77c 38683->38688 38687 6b6dcb8 38689 6b6a787 38688->38689 38690 6b6ce93 38689->38690 38697 6b6d090 38689->38697 38707 6b6d080 38689->38707 38690->38687 38693 6b6a6ac 38690->38693 38695 6b6b908 GetModuleHandleW 38693->38695 38696 6b6b97d 38695->38696 38696->38687 38698 6b6d0a5 38697->38698 38699 6b6a6ac GetModuleHandleW 38698->38699 38700 6b6d0c9 38698->38700 38699->38700 38701 6b6a6ac GetModuleHandleW 38700->38701 38706 6b6d285 38700->38706 38702 6b6d20b 38701->38702 38703 6b6a6ac GetModuleHandleW 38702->38703 38702->38706 38704 6b6d259 38703->38704 38705 6b6a6ac GetModuleHandleW 38704->38705 38704->38706 38705->38706 38706->38690 38708 6b6d090 38707->38708 38709 6b6a6ac GetModuleHandleW 38708->38709 38710 6b6d0c9 38708->38710 38709->38710 38711 6b6a6ac GetModuleHandleW 38710->38711 38716 6b6d285 38710->38716 38712 6b6d20b 38711->38712 38713 6b6a6ac GetModuleHandleW 38712->38713 38712->38716 38714 6b6d259 38713->38714 38715 6b6a6ac GetModuleHandleW 38714->38715 38714->38716 38715->38716 38716->38690 38717 6b63458 DuplicateHandle 38718 6b634ee 38717->38718

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 651 6b73490-6b734b1 652 6b734b3-6b734b6 651->652 653 6b734dc-6b734df 652->653 654 6b734b8-6b734d7 652->654 655 6b734e5-6b73504 653->655 656 6b73c80-6b73c82 653->656 654->653 664 6b73506-6b73509 655->664 665 6b7351d-6b73527 655->665 657 6b73c84 656->657 658 6b73c89-6b73c8c 656->658 657->658 658->652 660 6b73c92-6b73c9b 658->660 664->665 666 6b7350b-6b7351b 664->666 669 6b7352d-6b7353c 665->669 666->669 779 6b7353e call 6b73cb0 669->779 780 6b7353e call 6b73ca8 669->780 670 6b73543-6b73548 671 6b73555-6b73832 670->671 672 6b7354a-6b73550 670->672 693 6b73c72-6b73c7f 671->693 694 6b73838-6b738e7 671->694 672->660 703 6b73910 694->703 704 6b738e9-6b7390e 694->704 706 6b73919-6b7392c 703->706 704->706 708 6b73932-6b73954 call 6b7307c 706->708 709 6b73c59-6b73c65 706->709 708->709 713 6b7395a-6b73964 708->713 709->694 711 6b73c6b 709->711 711->693 713->709 714 6b7396a-6b73975 713->714 714->709 715 6b7397b-6b73a51 714->715 727 6b73a53-6b73a55 715->727 728 6b73a5f-6b73a8f 715->728 727->728 732 6b73a91-6b73a93 728->732 733 6b73a9d-6b73aa9 728->733 732->733 734 6b73aab-6b73aaf 733->734 735 6b73b09-6b73b0d 733->735 734->735 738 6b73ab1-6b73adb 734->738 736 6b73b13-6b73b4f 735->736 737 6b73c4a-6b73c53 735->737 750 6b73b51-6b73b53 736->750 751 6b73b5d-6b73b6b 736->751 737->709 737->715 745 6b73add-6b73adf 738->745 746 6b73ae9-6b73b06 call 6b73088 738->746 745->746 746->735 750->751 753 6b73b82-6b73b8d 751->753 754 6b73b6d-6b73b78 751->754 758 6b73ba5-6b73bb6 753->758 759 6b73b8f-6b73b95 753->759 754->753 757 6b73b7a 754->757 757->753 763 6b73bce-6b73bda 758->763 764 6b73bb8-6b73bbe 758->764 760 6b73b97 759->760 761 6b73b99-6b73b9b 759->761 760->758 761->758 768 6b73bf2-6b73c43 763->768 769 6b73bdc-6b73be2 763->769 765 6b73bc2-6b73bc4 764->765 766 6b73bc0 764->766 765->763 766->763 768->737 770 6b73be6-6b73be8 769->770 771 6b73be4 769->771 770->768 771->768 779->670 780->670
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: 19865c43742648928b739a31853476930d209e49acb04441d8d40a793e4cbee4
                                          • Instruction ID: 3088da760db33b7e82d6bde0aaea948586f0b1bf2642c61800739706865b5bbb
                                          • Opcode Fuzzy Hash: 19865c43742648928b739a31853476930d209e49acb04441d8d40a793e4cbee4
                                          • Instruction Fuzzy Hash: 4C323F71E1071ACFCB54EF79D85459DB7F2FF89300F1086A9D419AB264EB30AA85CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1322 6b77d70-6b77d8e 1323 6b77d90-6b77d93 1322->1323 1324 6b77d95-6b77daf 1323->1324 1325 6b77db4-6b77db7 1323->1325 1324->1325 1326 6b77dc4-6b77dc7 1325->1326 1327 6b77db9-6b77dc3 1325->1327 1329 6b77dea-6b77ded 1326->1329 1330 6b77dc9-6b77de5 1326->1330 1331 6b77e04-6b77e06 1329->1331 1332 6b77def-6b77dfd 1329->1332 1330->1329 1333 6b77e0d-6b77e10 1331->1333 1334 6b77e08 1331->1334 1338 6b77e16-6b77e2c 1332->1338 1340 6b77dff 1332->1340 1333->1323 1333->1338 1334->1333 1342 6b78047-6b78051 1338->1342 1343 6b77e32-6b77e3b 1338->1343 1340->1331 1344 6b78052-6b78060 1343->1344 1345 6b77e41-6b77e5e 1343->1345 1348 6b780b7-6b780be 1344->1348 1349 6b78062-6b78087 1344->1349 1354 6b78034-6b78041 1345->1354 1355 6b77e64-6b77e8c 1345->1355 1352 6b780a3-6b780b3 1348->1352 1353 6b780c0-6b78104 1348->1353 1351 6b78089-6b7808c 1349->1351 1356 6b78092-6b780a1 1351->1356 1357 6b782c1-6b782c4 1351->1357 1352->1348 1362 6b78295-6b782ab 1353->1362 1363 6b7810a-6b7811b 1353->1363 1354->1342 1354->1343 1355->1354 1381 6b77e92-6b77e9b 1355->1381 1356->1352 1356->1353 1359 6b782e7-6b782ea 1357->1359 1360 6b782c6-6b782e2 1357->1360 1366 6b78395-6b78397 1359->1366 1367 6b782f0-6b782fc 1359->1367 1360->1359 1362->1357 1379 6b78121-6b7813e 1363->1379 1380 6b78280-6b7828f 1363->1380 1369 6b7839e-6b783a1 1366->1369 1370 6b78399 1366->1370 1372 6b78307-6b78309 1367->1372 1369->1351 1374 6b783a7-6b783b0 1369->1374 1370->1369 1376 6b78321-6b78325 1372->1376 1377 6b7830b-6b78311 1372->1377 1385 6b78327-6b78331 1376->1385 1386 6b78333 1376->1386 1383 6b78315-6b78317 1377->1383 1384 6b78313 1377->1384 1379->1380 1397 6b78144-6b7823a call 6b76598 1379->1397 1380->1362 1380->1363 1381->1344 1387 6b77ea1-6b77ebd 1381->1387 1383->1376 1384->1376 1389 6b78338-6b7833a 1385->1389 1386->1389 1395 6b77ec3-6b77eed 1387->1395 1396 6b78022-6b7802e 1387->1396 1391 6b7833c-6b7833f 1389->1391 1392 6b7834b-6b78384 1389->1392 1391->1374 1392->1356 1410 6b7838a-6b78394 1392->1410 1407 6b77ef3-6b77f1b 1395->1407 1408 6b78018-6b7801d 1395->1408 1396->1354 1396->1381 1456 6b7823c-6b78246 1397->1456 1457 6b78248 1397->1457 1407->1408 1416 6b77f21-6b77f4f 1407->1416 1408->1396 1416->1408 1422 6b77f55-6b77f5e 1416->1422 1422->1408 1423 6b77f64-6b77f96 1422->1423 1431 6b77fa1-6b77fbd 1423->1431 1432 6b77f98-6b77f9c 1423->1432 1431->1396 1434 6b77fbf-6b78016 call 6b76598 1431->1434 1432->1408 1433 6b77f9e 1432->1433 1433->1431 1434->1396 1458 6b7824d-6b7824f 1456->1458 1457->1458 1458->1380 1459 6b78251-6b78256 1458->1459 1460 6b78264 1459->1460 1461 6b78258-6b78262 1459->1461 1462 6b78269-6b7826b 1460->1462 1461->1462 1462->1380 1463 6b7826d-6b78279 1462->1463 1463->1380
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: 42037402fc192ae20e40c48042cbdba649f8b163127c453be76671d0904485af
                                          • Instruction ID: 871b08b93cd8ddf339980128cfffba982bac74429b8c3ce4048c9fdb55ac66ad
                                          • Opcode Fuzzy Hash: 42037402fc192ae20e40c48042cbdba649f8b163127c453be76671d0904485af
                                          • Instruction Fuzzy Hash: F8029C70B012168FDB54DB69E884AAEB7E2FF84304F148579D41ADB394DB31ED82CB91
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7ff9f31be4e4a5aacc99fe304df324c489874a304aa306ebb54e4e83ece0b10f
                                          • Instruction ID: f6e4328124090078a8448e16ae0c1fee9ccc708b63e915843df990359b384404
                                          • Opcode Fuzzy Hash: 7ff9f31be4e4a5aacc99fe304df324c489874a304aa306ebb54e4e83ece0b10f
                                          • Instruction Fuzzy Hash: 5E62D074B006058FDB54DB68D584AADB7F2FF88304F1485A9E426EB394EB35ED42CB90
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 93e0dcbd60c3fc5f573da15cefb7afd2d862eec5dd01912e8e6abaec46815e62
                                          • Instruction ID: 8901f0a08703d96a5aed37720ae0b587fd8357c984ff537688614680baf1e1a8
                                          • Opcode Fuzzy Hash: 93e0dcbd60c3fc5f573da15cefb7afd2d862eec5dd01912e8e6abaec46815e62
                                          • Instruction Fuzzy Hash: 9132D374B002159FDF54DB68E880BAEBBB2FB88310F108569E515EB355DB31ED82CB91
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4742697bc3ef6ae31beceb2a2727b5a36950a2ed892173306d08426e296b842a
                                          • Instruction ID: 1d3af3aa9ffc7dfdcd1935beb541fd9ed31e87874c79337f85a38deab249bb46
                                          • Opcode Fuzzy Hash: 4742697bc3ef6ae31beceb2a2727b5a36950a2ed892173306d08426e296b842a
                                          • Instruction Fuzzy Hash: F912E5B6F002059BDB74DB74C8806AEB7B2EB85310F2488A9D469DB385DF34DD46CB91
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bbaf5bbcf1fdebac810d047171b2eeb1cd30633a8a54ccab4ccb0df1a2b4970a
                                          • Instruction ID: b03fe60c7d10a0857169a11778a331fb40359a39239624e42f9d47879b813f86
                                          • Opcode Fuzzy Hash: bbaf5bbcf1fdebac810d047171b2eeb1cd30633a8a54ccab4ccb0df1a2b4970a
                                          • Instruction Fuzzy Hash: 95227EB0E002098FDF64DF6DD490BAEB7A2EB45310F209866E429EB395DA35DD81CF51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 527 6b7acc8-6b7ace6 528 6b7ace8-6b7aceb 527->528 529 6b7ad05-6b7ad08 528->529 530 6b7aced-6b7ad00 528->530 531 6b7ad1c-6b7ad1f 529->531 532 6b7ad0a-6b7ad17 529->532 530->529 534 6b7ad21-6b7ad2a 531->534 535 6b7ad39-6b7ad3c 531->535 532->531 537 6b7ad30-6b7ad34 534->537 538 6b7aeff-6b7af36 534->538 539 6b7ad5f-6b7ad62 535->539 540 6b7ad3e-6b7ad5a 535->540 537->535 550 6b7af38-6b7af3b 538->550 541 6b7ad64-6b7ad6d 539->541 542 6b7ad72-6b7ad75 539->542 540->539 541->542 543 6b7aee5-6b7aeee 542->543 544 6b7ad7b-6b7ad7e 542->544 543->534 549 6b7aef4-6b7aefe 543->549 547 6b7ad80-6b7ad85 544->547 548 6b7ad88-6b7ad8b 544->548 547->548 554 6b7ad8d-6b7ad91 548->554 555 6b7ad9c-6b7ad9e 548->555 552 6b7af3d-6b7af41 550->552 553 6b7af48-6b7af4b 550->553 556 6b7af43 552->556 557 6b7af61-6b7af9c 552->557 558 6b7af4d-6b7af57 553->558 559 6b7af58-6b7af5b 553->559 554->549 560 6b7ad97 554->560 561 6b7ada5-6b7ada8 555->561 562 6b7ada0 555->562 556->553 570 6b7afa2-6b7afae 557->570 571 6b7b18f-6b7b1a2 557->571 559->557 563 6b7b1c4-6b7b1c7 559->563 560->555 561->528 564 6b7adae-6b7add2 561->564 562->561 566 6b7b1ea-6b7b1ed 563->566 567 6b7b1c9-6b7b1e5 563->567 581 6b7aee2 564->581 582 6b7add8-6b7ade7 564->582 568 6b7b1ef call 6b7b220 566->568 569 6b7b1fc-6b7b1fe 566->569 567->566 578 6b7b1f5-6b7b1f7 568->578 573 6b7b205-6b7b208 569->573 574 6b7b200 569->574 583 6b7afb0-6b7afc9 570->583 584 6b7afce-6b7b012 570->584 575 6b7b1a4 571->575 573->550 579 6b7b20e-6b7b218 573->579 574->573 575->563 578->569 581->543 588 6b7adff-6b7ae3a call 6b76598 582->588 589 6b7ade9-6b7adef 582->589 583->575 600 6b7b014-6b7b026 584->600 601 6b7b02e-6b7b06d 584->601 606 6b7ae52-6b7ae69 588->606 607 6b7ae3c-6b7ae42 588->607 590 6b7adf3-6b7adf5 589->590 591 6b7adf1 589->591 590->588 591->588 600->601 608 6b7b154-6b7b169 601->608 609 6b7b073-6b7b14e call 6b76598 601->609 619 6b7ae81-6b7ae92 606->619 620 6b7ae6b-6b7ae71 606->620 610 6b7ae46-6b7ae48 607->610 611 6b7ae44 607->611 608->571 609->608 610->606 611->606 626 6b7ae94-6b7ae9a 619->626 627 6b7aeaa-6b7aedb 619->627 622 6b7ae75-6b7ae77 620->622 623 6b7ae73 620->623 622->619 623->619 628 6b7ae9e-6b7aea0 626->628 629 6b7ae9c 626->629 627->581 628->627 629->627
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: bcf53b9690efbacbdcf3cce6c364097fa3f192462037b4d75f9297cdcb554d9c
                                          • Instruction ID: 5f63023aed39358a2dfead956ce160e3dd21197f29b14b84f19f5d6a706ac1f9
                                          • Opcode Fuzzy Hash: bcf53b9690efbacbdcf3cce6c364097fa3f192462037b4d75f9297cdcb554d9c
                                          • Instruction Fuzzy Hash: 12E17F70E1021A8FDF65DF69D4806AEB7B2FF85304F208569D815EB354DB31E846CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 781 6b7b648-6b7b668 782 6b7b66a-6b7b66d 781->782 783 6b7b684-6b7b687 782->783 784 6b7b66f-6b7b673 782->784 787 6b7b68e-6b7b691 783->787 788 6b7b689-6b7b68b 783->788 785 6b7b9db-6b7ba16 784->785 786 6b7b679-6b7b67f 784->786 798 6b7ba18-6b7ba1b 785->798 786->783 789 6b7b6a3-6b7b6a6 787->789 790 6b7b693 787->790 788->787 791 6b7b6ac-6b7b6af 789->791 792 6b7b81a-6b7b81b 789->792 795 6b7b69b-6b7b69e 790->795 796 6b7b6c6-6b7b6c9 791->796 797 6b7b6b1-6b7b6b5 791->797 794 6b7b820-6b7b823 792->794 794->792 803 6b7b825-6b7b828 794->803 795->789 801 6b7b6f0-6b7b6f3 796->801 802 6b7b6cb-6b7b6cf 796->802 797->785 804 6b7b6bb-6b7b6c1 797->804 799 6b7ba3e-6b7ba41 798->799 800 6b7ba1d-6b7ba39 798->800 808 6b7ba47-6b7ba6f 799->808 809 6b7bcad-6b7bcaf 799->809 800->799 810 6b7b716-6b7b719 801->810 811 6b7b6f5-6b7b711 801->811 802->785 805 6b7b6d5-6b7b6e5 802->805 806 6b7b845-6b7b848 803->806 807 6b7b82a-6b7b833 803->807 804->796 805->792 834 6b7b6eb 805->834 816 6b7b857-6b7b85a 806->816 817 6b7b84a-6b7b850 806->817 807->785 813 6b7b839-6b7b840 807->813 858 6b7ba71-6b7ba74 808->858 859 6b7ba79-6b7babd 808->859 814 6b7bcb6-6b7bcb9 809->814 815 6b7bcb1 809->815 818 6b7b73c-6b7b73f 810->818 819 6b7b71b-6b7b71f 810->819 811->810 813->806 814->798 823 6b7bcbf-6b7bcc8 814->823 815->814 827 6b7b864-6b7b867 816->827 828 6b7b85c-6b7b861 816->828 824 6b7b852 817->824 825 6b7b87c-6b7b882 817->825 820 6b7b741-6b7b744 818->820 821 6b7b749-6b7b74c 818->821 819->785 830 6b7b725-6b7b735 819->830 820->821 832 6b7b74e-6b7b754 821->832 833 6b7b759-6b7b75c 821->833 824->816 825->785 837 6b7b888-6b7b88f 825->837 835 6b7b877-6b7b87a 827->835 836 6b7b869-6b7b872 827->836 828->827 830->802 846 6b7b737 830->846 832->833 839 6b7b773-6b7b776 833->839 840 6b7b75e-6b7b762 833->840 834->801 835->825 843 6b7b894-6b7b897 835->843 836->835 837->843 848 6b7b786-6b7b789 839->848 849 6b7b778-6b7b781 839->849 840->785 847 6b7b768-6b7b76e 840->847 844 6b7b8be-6b7b8c1 843->844 845 6b7b899-6b7b89d 843->845 851 6b7b8c3-6b7b8d8 844->851 852 6b7b8ff-6b7b902 844->852 845->785 850 6b7b8a3-6b7b8b3 845->850 846->818 847->839 853 6b7b78b-6b7b794 848->853 854 6b7b799-6b7b79c 848->854 849->848 850->819 869 6b7b8b9 850->869 851->785 872 6b7b8de-6b7b8fa 851->872 856 6b7b957-6b7b95a 852->856 857 6b7b904-6b7b952 call 6b76598 852->857 853->854 860 6b7b7b2-6b7b7b5 854->860 861 6b7b79e-6b7b7a7 854->861 856->861 866 6b7b960-6b7b963 856->866 857->856 858->823 898 6b7bac3-6b7bacc 859->898 899 6b7bca2-6b7bcac 859->899 862 6b7b7d7-6b7b7da 860->862 863 6b7b7b7-6b7b7d2 860->863 861->807 867 6b7b7ad 861->867 870 6b7b7e7-6b7b7ea 862->870 871 6b7b7dc-6b7b7e2 862->871 863->862 866->817 873 6b7b969-6b7b96c 866->873 867->860 869->844 877 6b7b7ec-6b7b7f5 870->877 878 6b7b7fa-6b7b7fd 870->878 871->870 872->852 879 6b7b9a7-6b7b9aa 873->879 880 6b7b96e-6b7b983 873->880 877->878 878->792 885 6b7b7ff-6b7b802 878->885 883 6b7b9be-6b7b9c0 879->883 884 6b7b9ac-6b7b9b3 879->884 880->785 894 6b7b985-6b7b9a2 880->894 890 6b7b9c7-6b7b9ca 883->890 891 6b7b9c2 883->891 884->877 889 6b7b9b9 884->889 892 6b7b815-6b7b818 885->892 893 6b7b804-6b7b810 885->893 889->883 890->782 897 6b7b9d0-6b7b9da 890->897 891->890 892->792 892->794 893->892 894->879 903 6b7bad2-6b7bb3e call 6b76598 898->903 904 6b7bc98-6b7bc9d 898->904 915 6b7bb44-6b7bb49 903->915 916 6b7bc38-6b7bc4d 903->916 904->899 917 6b7bb65 915->917 918 6b7bb4b-6b7bb51 915->918 916->904 922 6b7bb67-6b7bb6d 917->922 920 6b7bb57-6b7bb59 918->920 921 6b7bb53-6b7bb55 918->921 923 6b7bb63 920->923 921->923 924 6b7bb82-6b7bb8f 922->924 925 6b7bb6f-6b7bb75 922->925 923->922 932 6b7bba7-6b7bbb4 924->932 933 6b7bb91-6b7bb97 924->933 926 6b7bc23-6b7bc32 925->926 927 6b7bb7b 925->927 926->915 926->916 927->924 928 6b7bbb6-6b7bbc3 927->928 929 6b7bbea-6b7bbf7 927->929 941 6b7bbc5-6b7bbcb 928->941 942 6b7bbdb-6b7bbe8 928->942 938 6b7bc0f-6b7bc1c 929->938 939 6b7bbf9-6b7bbff 929->939 932->926 936 6b7bb9b-6b7bb9d 933->936 937 6b7bb99 933->937 936->932 937->932 938->926 943 6b7bc03-6b7bc05 939->943 944 6b7bc01 939->944 945 6b7bbcf-6b7bbd1 941->945 946 6b7bbcd 941->946 942->926 943->938 944->938 945->942 946->942
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: e58561e4b0abe738e506f29c6b17fb1dd4258d13f0b140c48c1856cd36147e74
                                          • Instruction ID: fa314a172e187afc7dfbb4606fd6412282193f491ee498f95116d2b106c3078e
                                          • Opcode Fuzzy Hash: e58561e4b0abe738e506f29c6b17fb1dd4258d13f0b140c48c1856cd36147e74
                                          • Instruction Fuzzy Hash: C8029EB0E002098FDFA4CF69D4806ADB7B2EB45310F1489AAE425DB355DB34ED85CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1015 6b7cf38-6b7cf53 1016 6b7cf55-6b7cf58 1015->1016 1017 6b7cfa1-6b7cfa4 1016->1017 1018 6b7cf5a-6b7cf9c 1016->1018 1019 6b7cfa6-6b7cfb5 1017->1019 1020 6b7cfed-6b7cff0 1017->1020 1018->1017 1024 6b7cfb7-6b7cfbc 1019->1024 1025 6b7cfc4-6b7cfd0 1019->1025 1022 6b7cff2-6b7cff4 1020->1022 1023 6b7cfff-6b7d002 1020->1023 1026 6b7d421 1022->1026 1027 6b7cffa 1022->1027 1028 6b7d004-6b7d01a 1023->1028 1029 6b7d01f-6b7d022 1023->1029 1024->1025 1030 6b7cfd6-6b7cfe8 1025->1030 1031 6b7d955-6b7d98e 1025->1031 1033 6b7d424-6b7d430 1026->1033 1027->1023 1028->1029 1034 6b7d024-6b7d066 1029->1034 1035 6b7d06b-6b7d06e 1029->1035 1030->1020 1048 6b7d990-6b7d993 1031->1048 1041 6b7d436-6b7d723 1033->1041 1042 6b7d17c-6b7d18b 1033->1042 1034->1035 1038 6b7d0b7-6b7d0ba 1035->1038 1039 6b7d070-6b7d0b2 1035->1039 1045 6b7d0bc-6b7d0be 1038->1045 1046 6b7d0c9-6b7d0cc 1038->1046 1039->1038 1228 6b7d94a-6b7d954 1041->1228 1229 6b7d729-6b7d72f 1041->1229 1043 6b7d18d-6b7d192 1042->1043 1044 6b7d19a-6b7d1a6 1042->1044 1043->1044 1044->1031 1052 6b7d1ac-6b7d1be 1044->1052 1050 6b7d0c4 1045->1050 1051 6b7d2df-6b7d2e8 1045->1051 1053 6b7d115-6b7d118 1046->1053 1054 6b7d0ce-6b7d110 1046->1054 1057 6b7d995 call 6b7daad 1048->1057 1058 6b7d9a2-6b7d9a5 1048->1058 1050->1046 1065 6b7d2f7-6b7d303 1051->1065 1066 6b7d2ea-6b7d2ef 1051->1066 1080 6b7d1c3-6b7d1c6 1052->1080 1063 6b7d161-6b7d164 1053->1063 1064 6b7d11a-6b7d15c 1053->1064 1054->1053 1070 6b7d99b-6b7d99d 1057->1070 1060 6b7d9a7-6b7d9c3 1058->1060 1061 6b7d9c8-6b7d9cb 1058->1061 1060->1061 1072 6b7d9fe-6b7da00 1061->1072 1073 6b7d9cd-6b7d9f9 1061->1073 1063->1033 1077 6b7d16a-6b7d16d 1063->1077 1064->1063 1074 6b7d414-6b7d419 1065->1074 1075 6b7d309-6b7d31d 1065->1075 1066->1065 1070->1058 1084 6b7da07-6b7da0a 1072->1084 1085 6b7da02 1072->1085 1073->1072 1074->1026 1075->1026 1100 6b7d323-6b7d335 1075->1100 1078 6b7d177-6b7d17a 1077->1078 1079 6b7d16f-6b7d174 1077->1079 1078->1042 1078->1080 1079->1078 1088 6b7d20f-6b7d212 1080->1088 1089 6b7d1c8-6b7d20a 1080->1089 1084->1048 1092 6b7da0c-6b7da1b 1084->1092 1085->1084 1097 6b7d214-6b7d256 1088->1097 1098 6b7d25b-6b7d25e 1088->1098 1089->1088 1113 6b7da82-6b7da97 1092->1113 1114 6b7da1d-6b7da80 call 6b76598 1092->1114 1097->1098 1102 6b7d2a7-6b7d2aa 1098->1102 1103 6b7d260-6b7d2a2 1098->1103 1116 6b7d337-6b7d33d 1100->1116 1117 6b7d359-6b7d35b 1100->1117 1108 6b7d2cd-6b7d2cf 1102->1108 1109 6b7d2ac-6b7d2c8 1102->1109 1103->1102 1123 6b7d2d6-6b7d2d9 1108->1123 1124 6b7d2d1 1108->1124 1109->1108 1138 6b7da98 1113->1138 1114->1113 1126 6b7d341-6b7d34d 1116->1126 1127 6b7d33f 1116->1127 1135 6b7d365-6b7d371 1117->1135 1123->1016 1123->1051 1124->1123 1133 6b7d34f-6b7d357 1126->1133 1127->1133 1133->1135 1151 6b7d373-6b7d37d 1135->1151 1152 6b7d37f 1135->1152 1138->1138 1155 6b7d384-6b7d386 1151->1155 1152->1155 1155->1026 1160 6b7d38c-6b7d3a8 call 6b76598 1155->1160 1170 6b7d3b7-6b7d3c3 1160->1170 1171 6b7d3aa-6b7d3af 1160->1171 1170->1074 1173 6b7d3c5-6b7d412 1170->1173 1171->1170 1173->1026 1230 6b7d731-6b7d736 1229->1230 1231 6b7d73e-6b7d747 1229->1231 1230->1231 1231->1031 1232 6b7d74d-6b7d760 1231->1232 1234 6b7d766-6b7d76c 1232->1234 1235 6b7d93a-6b7d944 1232->1235 1236 6b7d76e-6b7d773 1234->1236 1237 6b7d77b-6b7d784 1234->1237 1235->1228 1235->1229 1236->1237 1237->1031 1238 6b7d78a-6b7d7ab 1237->1238 1241 6b7d7ad-6b7d7b2 1238->1241 1242 6b7d7ba-6b7d7c3 1238->1242 1241->1242 1242->1031 1243 6b7d7c9-6b7d7e6 1242->1243 1243->1235 1246 6b7d7ec-6b7d7f2 1243->1246 1246->1031 1247 6b7d7f8-6b7d811 1246->1247 1249 6b7d817-6b7d83e 1247->1249 1250 6b7d92d-6b7d934 1247->1250 1249->1031 1253 6b7d844-6b7d84e 1249->1253 1250->1235 1250->1246 1253->1031 1254 6b7d854-6b7d86b 1253->1254 1256 6b7d86d-6b7d878 1254->1256 1257 6b7d87a-6b7d895 1254->1257 1256->1257 1257->1250 1262 6b7d89b-6b7d8b4 call 6b76598 1257->1262 1266 6b7d8b6-6b7d8bb 1262->1266 1267 6b7d8c3-6b7d8cc 1262->1267 1266->1267 1267->1031 1268 6b7d8d2-6b7d926 1267->1268 1268->1250
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q
                                          • API String ID: 0-831282457
                                          • Opcode ID: 8a68d2eed619102a24ebfe1441849b4ce5b616f1d4a56b5efeb5d0c4c37eead9
                                          • Instruction ID: 548ea2ac69db027eccb10f62bdd33853ce88341e09e3d7d1d3797013778354da
                                          • Opcode Fuzzy Hash: 8a68d2eed619102a24ebfe1441849b4ce5b616f1d4a56b5efeb5d0c4c37eead9
                                          • Instruction Fuzzy Hash: 7F628330A0021A8FCB55EF69D590A5DB7F2FF84344F208A68D0199F369DB71ED4ACB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1276 6b74b98-6b74bbc 1277 6b74bbe-6b74bc1 1276->1277 1278 6b74bc7-6b74cbf 1277->1278 1279 6b752a0-6b752a3 1277->1279 1299 6b74cc5-6b74d12 call 6b75440 1278->1299 1300 6b74d42-6b74d49 1278->1300 1280 6b752a5-6b752bf 1279->1280 1281 6b752c4-6b752c6 1279->1281 1280->1281 1283 6b752cd-6b752d0 1281->1283 1284 6b752c8 1281->1284 1283->1277 1285 6b752d6-6b752e3 1283->1285 1284->1283 1313 6b74d18-6b74d34 1299->1313 1301 6b74d4f-6b74dbf 1300->1301 1302 6b74dcd-6b74dd6 1300->1302 1319 6b74dc1 1301->1319 1320 6b74dca 1301->1320 1302->1285 1317 6b74d36 1313->1317 1318 6b74d3f 1313->1318 1317->1318 1318->1300 1319->1320 1320->1302
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fcq$XPcq$\Ocq
                                          • API String ID: 0-3575482020
                                          • Opcode ID: 371f666741ac30a61d01f0f2527881be03ff1cba967ba1f55fa89c00569c73f1
                                          • Instruction ID: e5121e9eeab3497fabf1ba88640b319d9c775997404dc2e8d77765776fa98b30
                                          • Opcode Fuzzy Hash: 371f666741ac30a61d01f0f2527881be03ff1cba967ba1f55fa89c00569c73f1
                                          • Instruction Fuzzy Hash: 31619170F002199FEB659FA9C8547AEBBF6FF88700F20846AD106AB394DF754C418B95

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1697 6b7a39a-6b7a3a0 1698 6b7a3a3-6b7a3c8 1697->1698 1699 6b7a352-6b7a355 1697->1699 1700 6b7a3ca-6b7a3cd 1698->1700 1701 6b7a35a-6b7a35d 1699->1701 1704 6b7a3cf-6b7a3e8 1700->1704 1705 6b7a3ed-6b7a3f0 1700->1705 1702 6b7a37f-6b7a381 1701->1702 1703 6b7a35f 1701->1703 1706 6b7a383 1702->1706 1707 6b7a388-6b7a38b 1702->1707 1710 6b7a36b-6b7a37a 1703->1710 1704->1705 1708 6b7a3f6-6b7a423 call 6b72088 1705->1708 1709 6b7a523-6b7a526 1705->1709 1706->1707 1711 6b7a310-6b7a313 1707->1711 1712 6b7a38d-6b7a391 1707->1712 1746 6b7a429-6b7a44d 1708->1746 1747 6b7a518-6b7a522 1708->1747 1714 6b7a533-6b7a536 1709->1714 1715 6b7a528-6b7a532 1709->1715 1710->1702 1719 6b7a335-6b7a338 1711->1719 1720 6b7a315-6b7a330 1711->1720 1716 6b7a5e6-6b7a5e9 1714->1716 1717 6b7a53c-6b7a5d5 call 6b72088 1714->1717 1721 6b7a604-6b7a607 1716->1721 1722 6b7a5eb-6b7a5f9 1716->1722 1717->1708 1758 6b7a5db-6b7a5e5 1717->1758 1719->1701 1724 6b7a33a-6b7a355 1719->1724 1720->1719 1728 6b7a62a-6b7a62c 1721->1728 1729 6b7a609-6b7a625 1721->1729 1722->1717 1735 6b7a5ff 1722->1735 1724->1701 1732 6b7a633-6b7a636 1728->1732 1733 6b7a62e 1728->1733 1729->1728 1732->1700 1740 6b7a63c-6b7a645 1732->1740 1733->1732 1735->1721 1754 6b7a457 1746->1754 1755 6b7a44f-6b7a455 1746->1755 1757 6b7a45d-6b7a512 call 6b76598 call 6b72088 1754->1757 1755->1757 1757->1746 1757->1747
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: X!@$x!@
                                          • API String ID: 0-2527372166
                                          • Opcode ID: 30651117241f79e15c865a192d1329142def1c69414ffa44a3586d12216978b3
                                          • Instruction ID: b0d8fac0207d7f51cdf5d6d56d11917feee154edadc418ee18aabf5e397a3516
                                          • Opcode Fuzzy Hash: 30651117241f79e15c865a192d1329142def1c69414ffa44a3586d12216978b3
                                          • Instruction Fuzzy Hash: 5081AF31F002098FCB95EBA9E8506ADB7B2FB88314F108979E51AE7754DB31ED45CB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1776 6b79139-6b7916d 1778 6b7916f-6b79172 1776->1778 1779 6b79a30-6b79a33 1778->1779 1780 6b79178-6b7918d 1778->1780 1781 6b79a35-6b79a54 1779->1781 1782 6b79a59-6b79a5b 1779->1782 1787 6b791a5-6b791bb 1780->1787 1788 6b7918f-6b79195 1780->1788 1781->1782 1784 6b79a62-6b79a65 1782->1784 1785 6b79a5d 1782->1785 1784->1778 1789 6b79a6b-6b79a75 1784->1789 1785->1784 1794 6b791c6-6b791c8 1787->1794 1790 6b79197 1788->1790 1791 6b79199-6b7919b 1788->1791 1790->1787 1791->1787 1795 6b791e0-6b79251 1794->1795 1796 6b791ca-6b791d0 1794->1796 1807 6b79253-6b79276 1795->1807 1808 6b7927d-6b79299 1795->1808 1797 6b791d4-6b791d6 1796->1797 1798 6b791d2 1796->1798 1797->1795 1798->1795 1807->1808 1813 6b792c5-6b792e0 1808->1813 1814 6b7929b-6b792be 1808->1814 1819 6b792e2-6b79304 1813->1819 1820 6b7930b-6b79326 1813->1820 1814->1813 1819->1820 1825 6b7934b-6b79359 1820->1825 1826 6b79328-6b79344 1820->1826 1827 6b7935b-6b79364 1825->1827 1828 6b79369-6b793e3 1825->1828 1826->1825 1827->1789 1834 6b793e5-6b79403 1828->1834 1835 6b79430-6b79445 1828->1835 1839 6b79405-6b79414 1834->1839 1840 6b7941f-6b7942e 1834->1840 1835->1779 1839->1840 1840->1834 1840->1835
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: 40487cbfe3d1bc23d4aa1aee226e586b4fd5eabe4f1be2bcbefe811a53565b71
                                          • Instruction ID: 0e9b26e7c62821fbdee1d7b75411b48ee109142121d2ba5721222ef5872b72b5
                                          • Opcode Fuzzy Hash: 40487cbfe3d1bc23d4aa1aee226e586b4fd5eabe4f1be2bcbefe811a53565b71
                                          • Instruction Fuzzy Hash: 77517230B011169FDB54EB76D890BAFB3FAEBC8640F108579C419DB388EA31DD528B95
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 013DF0BF
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.2978109325.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_13d0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: ad8182c6f783d11464294068f1e9a3d3bc3cdd663b8632e8d5d392b23c7cd99a
                                          • Instruction ID: 9f28b37a49d03e6b8873f212206bb07fef532393b0635e203d3a85e32024c7b4
                                          • Opcode Fuzzy Hash: ad8182c6f783d11464294068f1e9a3d3bc3cdd663b8632e8d5d392b23c7cd99a
                                          • Instruction Fuzzy Hash: 0F21A6B1C0025A9FCB14CFAAD84479EBBF4AF08320F10806AE855B7211D778A881CFA1
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 013DF0BF
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.2978109325.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_13d0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: e49bc0ab143fa525ff5cf45d80711fc9b72cd2ccc958a31051f8d69281aeeda9
                                          • Instruction ID: 0467482ecfb64d9cc8979d299a64cd7c3b85d03b579a972dad85e062e8205096
                                          • Opcode Fuzzy Hash: e49bc0ab143fa525ff5cf45d80711fc9b72cd2ccc958a31051f8d69281aeeda9
                                          • Instruction Fuzzy Hash: AD11E2B2C006599BCB10DF9AD544BDEFBF4AF48324F14816AD818B7251D378A944CFA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPcq
                                          • API String ID: 0-714321711
                                          • Opcode ID: 29a513c1b7c0a0cf1c4e92e9f5b9eb36e5dcc18952e7ed01065ac6b084456a39
                                          • Instruction ID: 6d41d4b2bf2e616e36205b217404af7041c63bd1ad730df12b8f1d7f4a5fd274
                                          • Opcode Fuzzy Hash: 29a513c1b7c0a0cf1c4e92e9f5b9eb36e5dcc18952e7ed01065ac6b084456a39
                                          • Instruction Fuzzy Hash: 82416070B002099FDB559FA9C854BAEBBF7FF88700F20852AD146AB394DB759C01CB95
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: db0ea61dfd707e71f0fcee4db8ddc38275151fd7fb251749de3add893d9ffefb
                                          • Instruction ID: d0a2775c7079f43e41758e72d3340231a547a2624fd694ecfdfa520fd0fda902
                                          • Opcode Fuzzy Hash: db0ea61dfd707e71f0fcee4db8ddc38275151fd7fb251749de3add893d9ffefb
                                          • Instruction Fuzzy Hash: 1041F2B0E0030A9FDB64DF64C44469EBBB6FF85340F104469E412EB340DB71E846CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: c0d186c2e58d19664e41274ac1d413e1f83b15ac42317587d6109c7fd6eef770
                                          • Instruction ID: 2e398874ededf9c26ca10957cd19b3fccf1f0455bcff079d58d8e1dbc98a6d9b
                                          • Opcode Fuzzy Hash: c0d186c2e58d19664e41274ac1d413e1f83b15ac42317587d6109c7fd6eef770
                                          • Instruction Fuzzy Hash: 3E31EE70B002018FDB69AB74D51466F7AE6EF89200F2085B9D406DB394EE36DE46CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q
                                          • API String ID: 0-388095546
                                          • Opcode ID: d0633b980d18f8b12f45a224c480aa9baeb10abded6fdfbe9acaee0e509a862f
                                          • Instruction ID: 8ba2db823caf418e1cd9916c593f07961ede70b91896b5235c88cda720d49b3e
                                          • Opcode Fuzzy Hash: d0633b980d18f8b12f45a224c480aa9baeb10abded6fdfbe9acaee0e509a862f
                                          • Instruction Fuzzy Hash: 08F022B0F00211DFDF749A9EF9886BC73A1EB40315F1641BAE92ACB204C631EA02C791
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f3b1414b5ab1e34edc552eed381ffd4e840343a92d8d70d925a956b00a0f86d6
                                          • Instruction ID: 83f8decb113f1959d3ed022c560bfd20fce3b244291ae13521f6bec027d8bcc6
                                          • Opcode Fuzzy Hash: f3b1414b5ab1e34edc552eed381ffd4e840343a92d8d70d925a956b00a0f86d6
                                          • Instruction Fuzzy Hash: B7817D70B0021A9FDF54DFA9D4506AEB7F6EF89304F108569D51AEB384EB30EC428B91
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 859814c284ec3760988b384dd190e4087972c452df0870ee207758f4fb5abe7e
                                          • Instruction ID: 04ac81b75c14d50cb277c3a2814fcddd3168f2bfb1c95fc809bca249b5c2deec
                                          • Opcode Fuzzy Hash: 859814c284ec3760988b384dd190e4087972c452df0870ee207758f4fb5abe7e
                                          • Instruction Fuzzy Hash: 7661D1B1F004214FCF549A7EC88466FAAD7EFC4624B154479D80EDB324EEA6DD0287C6
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 476a9a8b89baac9cad1ea86ad7a0e39082636d3f7836696bdec54b19e8040314
                                          • Instruction ID: 7ea969a47416bbb30b1c590e161cd4d6d696fbd97be3a097b8a14347e2cb508f
                                          • Opcode Fuzzy Hash: 476a9a8b89baac9cad1ea86ad7a0e39082636d3f7836696bdec54b19e8040314
                                          • Instruction Fuzzy Hash: 0C916F70E102198FDF60DF68C880B9DB7B1FF89304F208699D559BB295DB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 25170cceffb3f234c1570e5b888febb685192a488d8a09b7495d135150f80252
                                          • Instruction ID: a9f3d8781ed96ced411c2219a43be908521618f21ff1f564c34d7b0f26c5ced3
                                          • Opcode Fuzzy Hash: 25170cceffb3f234c1570e5b888febb685192a488d8a09b7495d135150f80252
                                          • Instruction Fuzzy Hash: 96913D70E102198FDF60DF68C880B9DB7B1FF89304F208699D559BB255EB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 94940f528b98987df5c144ad91344363e37e4ac71da5bba83d21e38290b3c381
                                          • Instruction ID: 835a05da91e7e7e05ab8f303a178db3dac8f5b0b7053564fd84142bcb394b5bd
                                          • Opcode Fuzzy Hash: 94940f528b98987df5c144ad91344363e37e4ac71da5bba83d21e38290b3c381
                                          • Instruction Fuzzy Hash: 4A713C70A002199FDB54DFA9D980AADBBF6FF84304F248569E019EB354DB30ED46CB51
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a29c192eb638e563d6d1a89f9d5182e1d971c0bc17979cd26ed20259145b402f
                                          • Instruction ID: 8da519d9227a1b6ebdd6ee65bb3aac5058d589d445c27198c75933947db8c4d3
                                          • Opcode Fuzzy Hash: a29c192eb638e563d6d1a89f9d5182e1d971c0bc17979cd26ed20259145b402f
                                          • Instruction Fuzzy Hash: 18712970A002099FDB54DFA9D980AADBBF6FF84304F2485A9E019EB354DB30ED46CB51
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ef6f929a8849db6ae5e4d41ce1395aec7e8e762d377fc2d3df7b4e13fe1e1fe4
                                          • Instruction ID: 033fb977c0acc4a86342d6089e7396412019c8a444fe27fc0a780292df2dce92
                                          • Opcode Fuzzy Hash: ef6f929a8849db6ae5e4d41ce1395aec7e8e762d377fc2d3df7b4e13fe1e1fe4
                                          • Instruction Fuzzy Hash: 2451F3B1E10109CFDF64EBB8E4446BDBBB6EF84315F1088AAE126D7354DB358845CB89
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b073dfce455ad7de64abf84de20bc9992adadf6ec4c2c3386418edcf71f5a10b
                                          • Instruction ID: c065bc432fb75c59df48a0c6c2c8635b3794f614eda6ab5ba724c30ebed99afc
                                          • Opcode Fuzzy Hash: b073dfce455ad7de64abf84de20bc9992adadf6ec4c2c3386418edcf71f5a10b
                                          • Instruction Fuzzy Hash: D6513D70B102149FEF7496BCD95477F2A6FDB89310F20096AF01AD33D9CA29CC458392
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5d90bb559f14b494db2ea7baeba399902c27cc68b64445e175108d87a450ca5c
                                          • Instruction ID: cbe2f5aca1d4a17880ecf2a84656ee288f4b26138cbece2e6c3356ea4b44ccb3
                                          • Opcode Fuzzy Hash: 5d90bb559f14b494db2ea7baeba399902c27cc68b64445e175108d87a450ca5c
                                          • Instruction Fuzzy Hash: 1251E9B0B102149FEF74A6BCD95473F266ED789310F20496AE41AD33D9CA79CC8543A6
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3141fb61b1fc3b0f990d98e904fc2bc31c0ae48f5b85e8a59b9b4175e04701c5
                                          • Instruction ID: 42ad4446fdc91b871d4d54d174457a1758912ab1003263c51e8d5476963f00e4
                                          • Opcode Fuzzy Hash: 3141fb61b1fc3b0f990d98e904fc2bc31c0ae48f5b85e8a59b9b4175e04701c5
                                          • Instruction Fuzzy Hash: C34181B2E006099FCB70CFA9D880AAFFBF6EB44310F10496AD266D7654D730E8558B91
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8ec602fa08d5dda724c2d6aa4d67fd623c275bc050c084f6676fa0d27765c7c4
                                          • Instruction ID: 4ebaf4acc7535932329bea6ba64a1d30d63ca1990db460c31a27f0f12e9a9f01
                                          • Opcode Fuzzy Hash: 8ec602fa08d5dda724c2d6aa4d67fd623c275bc050c084f6676fa0d27765c7c4
                                          • Instruction Fuzzy Hash: E231A5B2E002058BDF70CE69C88077FF7B2FB45320F24996AD469DB281CA35DA51DB91
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eeb68466d00f95a8ddbf803dbe775135dc75aef62523ad06b70e30a0b2e2ad7a
                                          • Instruction ID: 25bfb5037ba2457e276bafcf2253cca7c220c5cc39eeda5c06e427b5fc7a55e5
                                          • Opcode Fuzzy Hash: eeb68466d00f95a8ddbf803dbe775135dc75aef62523ad06b70e30a0b2e2ad7a
                                          • Instruction Fuzzy Hash: C4319C70E1021A9BDB58CF68C89469EB7B2FF89304F108529E826E7B50DB31AC46CB50
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 186bb34513ce1c3adcdd960c66b6f79e0e18cb9c5b0abd9677496897062fa299
                                          • Instruction ID: fde2b86f583764297160ddd67b5f48eadfda08d0a63b4ccd85b9d1d4e091a193
                                          • Opcode Fuzzy Hash: 186bb34513ce1c3adcdd960c66b6f79e0e18cb9c5b0abd9677496897062fa299
                                          • Instruction Fuzzy Hash: 0E319C70E1021A9BDB59CF69C85469EB7B2FF89300F108529E916E7B54DB31AD42CB90
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b9445aeee77a5de759000f7dbcaea2d76bca1b4661b001204d28e091832553fb
                                          • Instruction ID: c0288c3c1a686f826484f5f89d958bd815b4b4de286c189aa72aeec689f2e7a6
                                          • Opcode Fuzzy Hash: b9445aeee77a5de759000f7dbcaea2d76bca1b4661b001204d28e091832553fb
                                          • Instruction Fuzzy Hash: 1621AEB5F01216AFDB00DF79E850AAEBBF5EB48210F108165E905EB340E734DD118B95
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 050e97d08ed69334e1ca64ab5b6131ce3925ae92e6c5b54fb38f31e034731a40
                                          • Instruction ID: eebd5dbd9bf08eedbc75f9ded42ecd5bdb1df4ffd276b2c66b137a5aaa4cfa66
                                          • Opcode Fuzzy Hash: 050e97d08ed69334e1ca64ab5b6131ce3925ae92e6c5b54fb38f31e034731a40
                                          • Instruction Fuzzy Hash: 1721BDB1F012259FDB40DF7AE890AAEBBF1EB48700F108165E915EB340E730DD018B90
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bf953407b0b817c7291570a47d0ef9d04f94a596cabd650ed8fce5ad05aadf37
                                          • Instruction ID: 111035ea613536c4ee917c4a2ea21b264e1d29dead2d856437145cf90d102865
                                          • Opcode Fuzzy Hash: bf953407b0b817c7291570a47d0ef9d04f94a596cabd650ed8fce5ad05aadf37
                                          • Instruction Fuzzy Hash: 2F2193B1E012195ECB54DB79E8505EEF7E6EB89300F1085A9E11AE7204DA31D941DBE1
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3ab7005731949d3338a98c8730a0f3ba16245723de035982343a7330156d1d2d
                                          • Instruction ID: 9d222f3284bd1a8bcf9fe6b6607005bfec2a6e05e4c22b7d8964d9a7d3e9c160
                                          • Opcode Fuzzy Hash: 3ab7005731949d3338a98c8730a0f3ba16245723de035982343a7330156d1d2d
                                          • Instruction Fuzzy Hash: B2112570B041154FCBA1EB7DE850AAEB7E6EB8A314F1084A9E52AD7741DA22DD02C790
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 32154b1034415980c4fc69f233ccc49ec79c960058212ff08631fb8d7af81e4b
                                          • Instruction ID: bb6d54d32b7c973e648710347c7b3351bfe4cd315283b5f4dfa3c4c511b0cffe
                                          • Opcode Fuzzy Hash: 32154b1034415980c4fc69f233ccc49ec79c960058212ff08631fb8d7af81e4b
                                          • Instruction Fuzzy Hash: CE21DF70B101199FCF44DB69E8547AEB7B6EB84310F208479D419E7344EB31AC418B84
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9f6bc84d7d518bef6012df32b3f07530a34eae987108f96b33c655b92a641fa2
                                          • Instruction ID: 61c279acea3d8c3b66835f7ee8dbee2388a478f95a73fa235a28a750ea59f6ec
                                          • Opcode Fuzzy Hash: 9f6bc84d7d518bef6012df32b3f07530a34eae987108f96b33c655b92a641fa2
                                          • Instruction Fuzzy Hash: BC014130B145102BCB6081AE9800BAFB7DBDBCA310F20847EE10EC7755EE21CC0243E2
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 01ed81d1d89065c11d0b40ef3d5ac317e2baba6421282fc222853b8637d99405
                                          • Instruction ID: d070e29fab5204e037f1784c3b1449e029b1c7586ecc7bab70de97776d803a2c
                                          • Opcode Fuzzy Hash: 01ed81d1d89065c11d0b40ef3d5ac317e2baba6421282fc222853b8637d99405
                                          • Instruction Fuzzy Hash: 6211A135B141255FDB589679D814AAF73FAEBC9311F004579C50AEB340EE25DC028B91
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aab407eaaf35d8f5b7f6c99133f5ea0947e16e116bcd1d7ff552cb63ab7bf883
                                          • Instruction ID: cff777c95ce883af81101f24cebaa9823382c62c411356cf6c249a187d249111
                                          • Opcode Fuzzy Hash: aab407eaaf35d8f5b7f6c99133f5ea0947e16e116bcd1d7ff552cb63ab7bf883
                                          • Instruction Fuzzy Hash: 1D0124BAB002101FCB628B3DA85077E77DADB8A310F04546AE11EC7340D910DC0387AA
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3526253d55311028e9306c1b318fcbc2ca851396c757e6b8889e5abcab2228c7
                                          • Instruction ID: 1172c4a835f29c34a0ea8d70226540b4092349a44d35f9726e08f105935f625c
                                          • Opcode Fuzzy Hash: 3526253d55311028e9306c1b318fcbc2ca851396c757e6b8889e5abcab2228c7
                                          • Instruction Fuzzy Hash: D3012F36B000256BDB54A57C9C10AEFB3EFEBC9600F000176D50AE7280EF219C024BE2
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cead1daaad9fee04900f04be7ae14274ae5bedd70caa2f521b011bfff438e732
                                          • Instruction ID: ebf47a99bb935a1095e91f8d857cb597c11428cfddeca30eb0451c9601badf28
                                          • Opcode Fuzzy Hash: cead1daaad9fee04900f04be7ae14274ae5bedd70caa2f521b011bfff438e732
                                          • Instruction Fuzzy Hash: B321BFB5901259ABCB00DF9AD984ADEFFB8FB49310F10816AE518A7201C374A954CFA5
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eab5fccdafb89ab6a2b1af0e3dca6e0f39cddd41cf54fc74c6964e543e4d3386
                                          • Instruction ID: c3cbd83400c3a05ec8196e561affac821118e90c38247a9e716a8288b1c02813
                                          • Opcode Fuzzy Hash: eab5fccdafb89ab6a2b1af0e3dca6e0f39cddd41cf54fc74c6964e543e4d3386
                                          • Instruction Fuzzy Hash: F711CFB1D01259AFCB00DF9AD984ACEFBB4FB48320F10816AE918B7200C374A944CFA5
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1da83f4701d41f99592e65070ce57280e554201082eff336283f64739cd006c8
                                          • Instruction ID: 8208d9013b7826c05b431fc6fea9b03d294e1615cd7febf1d52e94171231bfd6
                                          • Opcode Fuzzy Hash: 1da83f4701d41f99592e65070ce57280e554201082eff336283f64739cd006c8
                                          • Instruction Fuzzy Hash: 8C01D130B104101BDBA495AE945472BB2DBDBC9711F20843EE51EC7348ED65DC0243E5
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2b1bab11233a1ec73d69534e0c98a9b8adc6b3682ea0c5605af06021454c336e
                                          • Instruction ID: a6e712bde7876611a0d6a7902c8e1282717fa80e7bbad9acff45e309a2e7706e
                                          • Opcode Fuzzy Hash: 2b1bab11233a1ec73d69534e0c98a9b8adc6b3682ea0c5605af06021454c336e
                                          • Instruction Fuzzy Hash: DF01DCB1B005201BCB60DA6EE850B3EA3CAEBC9720F148839E51BC7344DE21DC024799
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fceb1cb6dd159339746816f722848674d3ecfffa89cdb9a686c460da876d8e82
                                          • Instruction ID: 4d2346d1d1d894c04154004a3e7e47f3f84e5a7462f70a67c09c35bfd617f0a9
                                          • Opcode Fuzzy Hash: fceb1cb6dd159339746816f722848674d3ecfffa89cdb9a686c460da876d8e82
                                          • Instruction Fuzzy Hash: AD01AF70B105210FCBA4EA7EE450B2EB3D6EB8A750F148838E51EC7344EA21EC028795
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8ab04c70a6ab1427150d69fda8d0e5d2dc1d2fa941836fbe27514f7280a51d1d
                                          • Instruction ID: 0d351bc1baf01d31ba17182530a7e6c7bb4047c0f804a84da31f4f1d49bfde4d
                                          • Opcode Fuzzy Hash: 8ab04c70a6ab1427150d69fda8d0e5d2dc1d2fa941836fbe27514f7280a51d1d
                                          • Instruction Fuzzy Hash: E401C871F102249FCF559A6EE840AAEBBB6FB85354F00457DE915E7345DB31AC0487D0
                                          Memory Dump Source
                                          • Source File: 00000018.00000002.3033288147.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_24_2_6b70000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: db71c8a7103b8fd67b7ebe0b7c8b4cfc024a4e1af511a715b0a78401abfc6fec
                                          • Instruction ID: 475134a92c5c5327b7bc517f372a540f54d474af0c4d2efa02a92f3a3f718010
                                          • Opcode Fuzzy Hash: db71c8a7103b8fd67b7ebe0b7c8b4cfc024a4e1af511a715b0a78401abfc6fec
                                          • Instruction Fuzzy Hash: AAE0D8B0E05A08ABDF50DFB0C95579E77A9EB01304F2088D6D418C7102F272DA109BC1