Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payslip_October_2024.pdf.exe

Overview

General Information

Sample name:Payslip_October_2024.pdf.exe
Analysis ID:1546724
MD5:098efb8818e822cb79893620a8db1cd0
SHA1:3d8adf42847ecaddf9865c4460f61e210a6a267f
SHA256:a674d532150b92874dc954bb8349b6e66a006f1f7dd9381f751237cc98d38dc2
Tags:AgentTeslaexeuser-threatcat_ch
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Connects to many ports of the same IP (likely port scanning)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Payslip_October_2024.pdf.exe (PID: 6352 cmdline: "C:\Users\user\Desktop\Payslip_October_2024.pdf.exe" MD5: 098EFB8818E822CB79893620A8DB1CD0)
    • RegSvcs.exe (PID: 7548 cmdline: "C:\Users\user\Desktop\Payslip_October_2024.pdf.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • sgxIb.exe (PID: 7748 cmdline: "C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 7760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • sgxIb.exe (PID: 7932 cmdline: "C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 7940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.haliza.com.my", "Username": "origin@haliza.com.my", "Password": "JesusChrist007$"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.2497169089.0000000003091000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000000B.00000002.2497169089.0000000003091000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000B.00000002.2497169089.00000000030BC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000B.00000002.2494522964.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000B.00000002.2494522964.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            11.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              11.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                11.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x34f7c:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x34fee:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x35078:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x3510a:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x35174:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x351e6:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x3527c:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x3530c:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                11.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x32170:$s2: GetPrivateProfileString
                • 0x317fa:$s3: get_OSFullName
                • 0x32f6b:$s5: remove_Key
                • 0x33157:$s5: remove_Key
                • 0x34075:$s6: FtpWebRequest
                • 0x34f5e:$s7: logins
                • 0x354d0:$s7: logins
                • 0x38227:$s7: logins
                • 0x38293:$s7: logins
                • 0x39d12:$s7: logins
                • 0x38e2d:$s9: 1.85 (Hash, version 2, native byte-order)

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Payslip_October_2024.pdf.exe", CommandLine: "C:\Users\user\Desktop\Payslip_October_2024.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\Payslip_October_2024.pdf.exe, NewProcessName: C:\Users\user\Desktop\Payslip_October_2024.pdf.exe, OriginalFileName: C:\Users\user\Desktop\Payslip_October_2024.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Users\user\Desktop\Payslip_October_2024.pdf.exe", ProcessId: 6352, ProcessName: Payslip_October_2024.pdf.exe
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 7548, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sgxIb
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-01T14:35:24.051829+010020229301A Network Trojan was detected20.12.23.50443192.168.2.749741TCP
                2024-11-01T14:35:45.466037+010020229301A Network Trojan was detected172.202.163.200443192.168.2.752659TCP
                2024-11-01T14:35:46.941600+010020229301A Network Trojan was detected172.202.163.200443192.168.2.752669TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Payslip_October_2024.pdf.exeAvira: detected
                Source: 11.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.haliza.com.my", "Username": "origin@haliza.com.my", "Password": "JesusChrist007$"}
                Source: Payslip_October_2024.pdf.exeReversingLabs: Detection: 57%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: Payslip_October_2024.pdf.exeJoe Sandbox ML: detected
                Source: Payslip_October_2024.pdf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.7:52711 version: TLS 1.2
                Source: Binary string: RegSvcs.pdb, source: sgxIb.exe, 0000000C.00000000.1829557659.0000000000212000.00000002.00000001.01000000.00000006.sdmp, sgxIb.exe.11.dr
                Source: Binary string: RegSvcs.pdb source: sgxIb.exe, 0000000C.00000000.1829557659.0000000000212000.00000002.00000001.01000000.00000006.sdmp, sgxIb.exe.11.dr

                Networking

                barindex
                Source: global trafficTCP traffic: 110.4.45.197 ports 1,2,56562,53313,56795,21
                Source: global trafficTCP traffic: 192.168.2.7:52739 -> 110.4.45.197:56795
                Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                Source: Joe Sandbox ViewIP Address: 110.4.45.197 110.4.45.197
                Source: Joe Sandbox ViewASN Name: EXABYTES-AS-APExaBytesNetworkSdnBhdMY EXABYTES-AS-APExaBytesNetworkSdnBhdMY
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.7:49741
                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.7:52659
                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.7:52669
                Source: unknownFTP traffic detected: 110.4.45.197:21 -> 192.168.2.7:52722 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 50 allowed.220-Local time is now 21:35. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 50 allowed.220-Local time is now 21:35. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 50 allowed.220-Local time is now 21:35. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 50 allowed.220-Local time is now 21:35. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: 241.42.69.40.in-addr.arpa
                Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                Source: global trafficDNS traffic detected: DNS query: ftp.haliza.com.my
                Source: RegSvcs.exe, 0000000B.00000002.2497169089.000000000312E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2497169089.00000000030BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.haliza.com.my
                Source: RegSvcs.exe, 0000000B.00000002.2497169089.0000000003041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegSvcs.exe, 0000000B.00000002.2494522964.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                Source: RegSvcs.exe, 0000000B.00000002.2497169089.0000000003041000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2494522964.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: RegSvcs.exe, 0000000B.00000002.2497169089.0000000003041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: RegSvcs.exe, 0000000B.00000002.2497169089.0000000003041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                Source: unknownNetwork traffic detected: HTTP traffic on port 52711 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52711
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.7:52711 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                System Summary

                barindex
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: Payslip_October_2024.pdf.exe, 00000000.00000000.1247280441.0000000000882000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_3b54aa9a-7
                Source: Payslip_October_2024.pdf.exe, 00000000.00000000.1247280441.0000000000882000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_b14c2a57-0
                Source: Payslip_October_2024.pdf.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b722361e-8
                Source: Payslip_October_2024.pdf.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_fc01259f-0
                Source: initial sampleStatic PE information: Filename: Payslip_October_2024.pdf.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02ED4A6811_2_02ED4A68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02EDE91511_2_02EDE915
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02ED3E5011_2_02ED3E50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02EDAD9011_2_02EDAD90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02ED419811_2_02ED4198
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0696C4AC11_2_0696C4AC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0696392411_2_06963924
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0696603711_2_06966037
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0696534311_2_06965343
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0696534811_2_06965348
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06961C6811_2_06961C68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0696391811_2_06963918
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_069856B011_2_069856B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0698670811_2_06986708
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0698358011_2_06983580
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06987E9811_2_06987E98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_069877B811_2_069877B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0698E4D011_2_0698E4D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0698004011_2_06980040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06985DFF11_2_06985DFF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0698003F11_2_0698003F
                Source: Payslip_October_2024.pdf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/5@3/2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\sgxIbJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7760:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7940:120:WilError_03
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeFile created: C:\Users\user~1\AppData\Local\Temp\buncalJump to behavior
                Source: Payslip_October_2024.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Payslip_October_2024.pdf.exeReversingLabs: Detection: 57%
                Source: unknownProcess created: C:\Users\user\Desktop\Payslip_October_2024.pdf.exe "C:\Users\user\Desktop\Payslip_October_2024.pdf.exe"
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Payslip_October_2024.pdf.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe "C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe"
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe "C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe"
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: Payslip_October_2024.pdf.exeStatic file information: File size 1409024 > 1048576
                Source: Payslip_October_2024.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: Payslip_October_2024.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: Payslip_October_2024.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: Payslip_October_2024.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Payslip_October_2024.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: Payslip_October_2024.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: Payslip_October_2024.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: RegSvcs.pdb, source: sgxIb.exe, 0000000C.00000000.1829557659.0000000000212000.00000002.00000001.01000000.00000006.sdmp, sgxIb.exe.11.dr
                Source: Binary string: RegSvcs.pdb source: sgxIb.exe, 0000000C.00000000.1829557659.0000000000212000.00000002.00000001.01000000.00000006.sdmp, sgxIb.exe.11.dr
                Source: Payslip_October_2024.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Payslip_October_2024.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Payslip_October_2024.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Payslip_October_2024.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Payslip_October_2024.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02ED0C6D push edi; retf 11_2_02ED0C7A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02ED0C45 push ebx; retf 11_2_02ED0C52
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sgxIbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sgxIbJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: Possible double extension: pdf.exeStatic PE information: Payslip_October_2024.pdf.exe
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\Payslip_October_2024.pdf.exeAPI/Special instruction interceptor: Address: 132B38C
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMemory allocated: 2330000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMemory allocated: 2510000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMemory allocated: 2330000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMemory allocated: BB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMemory allocated: 2A20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMemory allocated: DC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598998Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598779Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598451Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597282Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597151Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597047Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596927Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595343Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595001Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594691Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594570Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594452Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593984Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593875Jump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2809Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7032Jump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe TID: 7808Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe TID: 7988Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598998Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598779Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598451Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597282Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597151Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597047Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596927Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595343Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595001Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594691Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594570Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594452Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593984Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593875Jump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegSvcs.exe, 0000000B.00000002.2500067814.000000000639A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlle
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior
                Source: Payslip_October_2024.pdf.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: RegSvcs.exe, 0000000B.00000002.2497169089.0000000003148000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR
                Source: RegSvcs.exe, 0000000B.00000002.2497169089.0000000003148000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: RegSvcs.exe, 0000000B.00000002.2497169089.0000000003148000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q9<b>[ Program Manager]</b> (01/11/2024 23:20:03)<br>{Win}rTH
                Source: RegSvcs.exe, 0000000B.00000002.2497169089.0000000003148000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q3<b>[ Program Manager]</b> (01/11/2024 23:20:03)<br>
                Source: RegSvcs.exe, 0000000B.00000002.2497169089.0000000003148000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q8<b>[ Program Manager]</b> (01/11/2024 23:20:03)<br>{Win}TH
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.2497169089.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2497169089.00000000030BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2494522964.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7548, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: Yara matchFile source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.2497169089.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2494522964.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7548, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.2497169089.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2497169089.00000000030BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2494522964.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7548, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                1
                Exfiltration Over Alternative Protocol
                Abuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Registry Run Keys / Startup Folder
                2
                Process Injection
                11
                Obfuscated Files or Information
                11
                Input Capture
                124
                System Information Discovery
                Remote Desktop Protocol2
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                Registry Run Keys / Startup Folder
                1
                DLL Side-Loading
                1
                Credentials in Registry
                211
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                Masquerading
                NTDS1
                Process Discovery
                Distributed Component Object Model11
                Input Capture
                2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script141
                Virtualization/Sandbox Evasion
                LSA Secrets141
                Virtualization/Sandbox Evasion
                SSH1
                Clipboard Data
                23
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Process Injection
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Hidden Files and Directories
                DCSync1
                System Network Configuration Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1546724 Sample: Payslip_October_2024.pdf.exe Startdate: 01/11/2024 Architecture: WINDOWS Score: 100 25 ftp.haliza.com.my 2->25 27 api.ipify.org 2->27 29 241.42.69.40.in-addr.arpa 2->29 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Antivirus / Scanner detection for submitted sample 2->47 49 9 other signatures 2->49 7 Payslip_October_2024.pdf.exe 1 2->7         started        10 sgxIb.exe 2 2->10         started        12 sgxIb.exe 1 2->12         started        signatures3 process4 signatures5 51 Binary is likely a compiled AutoIt script file 7->51 53 Switches to a custom stack to bypass stack traces 7->53 14 RegSvcs.exe 16 4 7->14         started        19 conhost.exe 10->19         started        21 conhost.exe 12->21         started        process6 dnsIp7 31 ftp.haliza.com.my 110.4.45.197, 21, 52721, 52722 EXABYTES-AS-APExaBytesNetworkSdnBhdMY Malaysia 14->31 33 api.ipify.org 104.26.12.205, 443, 52711 CLOUDFLARENETUS United States 14->33 23 C:\Users\user\AppData\Roaming\...\sgxIb.exe, PE32 14->23 dropped 35 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->35 37 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->37 39 Tries to steal Mail credentials (via file / registry access) 14->39 41 4 other signatures 14->41 file8 signatures9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Payslip_October_2024.pdf.exe58%ReversingLabsWin32.Trojan.AutoitInject
                Payslip_October_2024.pdf.exe100%AviraDR/AutoIt.Gen8
                Payslip_October_2024.pdf.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe0%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://api.ipify.org/0%URL Reputationsafe
                https://api.ipify.org0%URL Reputationsafe
                https://account.dyn.com/0%URL Reputationsafe
                https://api.ipify.org/t0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                api.ipify.org
                104.26.12.205
                truefalse
                  unknown
                  ftp.haliza.com.my
                  110.4.45.197
                  truetrue
                    unknown
                    241.42.69.40.in-addr.arpa
                    unknown
                    unknownfalse
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.orgRegSvcs.exe, 0000000B.00000002.2497169089.0000000003041000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2494522964.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://account.dyn.com/RegSvcs.exe, 0000000B.00000002.2494522964.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ftp.haliza.com.myRegSvcs.exe, 0000000B.00000002.2497169089.000000000312E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2497169089.00000000030BC000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        https://api.ipify.org/tRegSvcs.exe, 0000000B.00000002.2497169089.0000000003041000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 0000000B.00000002.2497169089.0000000003041000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        104.26.12.205
                        api.ipify.orgUnited States
                        13335CLOUDFLARENETUSfalse
                        110.4.45.197
                        ftp.haliza.com.myMalaysia
                        46015EXABYTES-AS-APExaBytesNetworkSdnBhdMYtrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1546724
                        Start date and time:2024-11-01 14:34:10 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 31s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:19
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Payslip_October_2024.pdf.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@6/5@3/2
                        EGA Information:
                        • Successful, ratio: 33.3%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 101
                        • Number of non-executed functions: 14
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target sgxIb.exe, PID 7748 because it is empty
                        • Execution Graph export aborted for target sgxIb.exe, PID 7932 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • VT rate limit hit for: Payslip_October_2024.pdf.exe
                        TimeTypeDescription
                        10:45:34API Interceptor192927x Sleep call for process: RegSvcs.exe modified
                        15:45:35AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run sgxIb C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
                        15:45:43AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run sgxIb C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        104.26.12.205Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                        • api.ipify.org/
                        perfcc.elfGet hashmaliciousXmrigBrowse
                        • api.ipify.org/
                        SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                        • api.ipify.org/
                        SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                        • api.ipify.org/
                        hloRQZmlfg.exeGet hashmaliciousRDPWrap ToolBrowse
                        • api.ipify.org/
                        file.exeGet hashmaliciousRDPWrap ToolBrowse
                        • api.ipify.org/
                        file.exeGet hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        file.exeGet hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        file.exeGet hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        110.4.45.197rMT103_126021720924.exeGet hashmaliciousAgentTeslaBrowse
                          z1Transaction_ID_REF2418_cmd.batGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                            z20SWIFT_MT103_Payment_552016_pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              Order Specifications for Materials.docx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                z14Employee_Contract_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                  Order Specifications for Materials.docx.exeGet hashmaliciousAgentTeslaBrowse
                                    DHL_Shipment_Details_8th_October.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                      z92BankPayment38_735.exeGet hashmaliciousAgentTeslaBrowse
                                        Bank Payment $38,735.exeGet hashmaliciousAgentTeslaBrowse
                                          rQuotation3200025006.exeGet hashmaliciousAgentTeslaBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            api.ipify.orgae713827-e32c-f66b-fbdb-5405db450711.emlGet hashmaliciousUnknownBrowse
                                            • 104.26.13.205
                                            kill.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.13.205
                                            rMT103_126021720924.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.12.205
                                            u9aPQQIwhj.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 172.67.74.152
                                            Shipping documents 000293994900.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 172.67.74.152
                                            file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                            • 104.26.13.205
                                            Proforma Invoice.scr.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.13.205
                                            file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                            • 104.26.12.205
                                            #Uad6c#Ub9e4 #Uc8fc#Ubb38 658749 #Ubc0f 658752..exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 172.67.74.152
                                            ftp.haliza.com.myrMT103_126021720924.exeGet hashmaliciousAgentTeslaBrowse
                                            • 110.4.45.197
                                            z1Transaction_ID_REF2418_cmd.batGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                            • 110.4.45.197
                                            z20SWIFT_MT103_Payment_552016_pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 110.4.45.197
                                            Order Specifications for Materials.docx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 110.4.45.197
                                            z14Employee_Contract_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 110.4.45.197
                                            Order Specifications for Materials.docx.exeGet hashmaliciousAgentTeslaBrowse
                                            • 110.4.45.197
                                            DHL_Shipment_Details_8th_October.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 110.4.45.197
                                            z92BankPayment38_735.exeGet hashmaliciousAgentTeslaBrowse
                                            • 110.4.45.197
                                            Bank Payment $38,735.exeGet hashmaliciousAgentTeslaBrowse
                                            • 110.4.45.197
                                            rQuotation3200025006.exeGet hashmaliciousAgentTeslaBrowse
                                            • 110.4.45.197
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CLOUDFLARENETUShttps://u7990385.ct.sendgrid.net/ls/click?upn=u001.oZ6GXC16Ztdw1ob-2F3C5yow-2FsK2YC4S8s269h9OLgp-2FGcQesCtXDXKgCEAF90Sa3OUL2ncGoAKstQjRhddelr-2Bx3frrehyL8aaBbhAx-2Fm3uQTToUZwzw9vU-2BHl4N8-2FbXNrXNM8F2aafYGXvb9twEoQeHC7ZwjccAi1SjLazzmL714x6k-2BjB-2FYwt496nNWzarkpA5xghtVvgqYssmknAftbQJOVkiDX5sql0puMOlG6Ca2eid008YPu-2FJJAayp-2BNXls84A_lhEpvcamcm95WhC017PRgRonrgi5omZ3brQwNa5yLk0xxDl3uLY9zV0ZhBwsp9AfIBgWj8srFe156S5Zns8ZjIc0B22GBm-2FhZ3msRvLKzUyGIuCFlA1E-2FK-2F4jc3IgU8qM5k5KxMmIwIRDSCQDvTZvmwB5zeTeqWWEJR7CvWSpeaqIj3hj5IgcRcoPBdptLYrUK3YLUsGuU0Nn50M3ArOROvseGYqZul0QkeqtDR41-2FsPFt-2Bw0YWW2P5gsCDH4XINxncIhICPIqlacC1ih-2B-2BRAhsouCrf5nolEyzWx0VnR2OrLuGwvR4-2BmBTgXGq5SQJ3CbNvM-2FaB5BLerpFqmqjPC-2FBlK6th1iVrhfmtBEFKLash-2FnkPpQ9qFxGwWTexJMh100AS4PilK2-2BJDfvjssuxk2jP-2BTagNOazV2F1Jk9Mugr3y7E9SivEGWyUbzdMThmnpVydb1qOFwMiocztErv1WWaB8B20Oa2SLt-2BLBsMdusfLwd3NNzPre6el-2F-2BIwBxDAqBb9JLV6vOLzfaD2L4-2BEuPbgzcrscVtaCNyARGoPUKi03imhTbJEcig8L4weEiABND5vwKtA-2FhKo5AjxecXMO22Vq7Og2y7v-2BJNgFB9rr-2Bm4W45XZxFP39Dqi18SUPOKX4pHFrdACciPinuj2QtBtIGNjV46-2Bve9hu0g1-2FpG1tOVv9Ebn32k-2Bl6CF6b6jzS3aTQvZkWKNIwLx5CoGs9uomn9yZPi6QaiSTeQkZ1uHupSYpVxbBCb-2FUyo6kMlbB0P27ShEzUFVY-2FpfPcfFofTKD4p7rklaM-2FIuG8-2F3ytR7SJ7I8GmSP8NTWs4vu3NTpV5MkgHfjeFoK-2BDQh6M7S2ys2qIf8m3qiLtFMHY6p7m4ep8JZqbC0axloFSX-2Fzbz51ZW-2BsyQEEbRqwx0S1i4lo9NhRXrfXOvn0A83bBDk31g9QfoWTGhHCjSEfuca9KJwe0GCABYAuqYeYHMc5qXhPv86r0l0ldRpwe39V9LJ5m6Go-3DGet hashmaliciousUnknownBrowse
                                            • 1.1.1.1
                                            https://hotmail.cdisaomiguel.com.brGet hashmaliciousUnknownBrowse
                                            • 104.17.25.14
                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                            • 188.114.97.3
                                            https://tas-pe.com/ahowe@europait.net#ahowe@europait.netGet hashmaliciousHTMLPhisherBrowse
                                            • 172.67.72.186
                                            https://cbb8e45a.9a6a27135394413fbc39df5b.workers.devGet hashmaliciousHTMLPhisherBrowse
                                            • 188.114.96.3
                                            https://www.google.co.th/url?q=jODz3y3HOSozuuQiApLh&rct=5CHARyytTPSJ3J3wDcT&sa=t&esrc=sf_rand_string_mixed(5)FgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Fir.nbaikp3.sa.com%2Fdelaw%2Flawn%2Fkoo%2Fsf_rand_string_mixed(24)/bill.wafford@qurateretail.comGet hashmaliciousHTMLPhisherBrowse
                                            • 104.21.8.81
                                            ae713827-e32c-f66b-fbdb-5405db450711.emlGet hashmaliciousUnknownBrowse
                                            • 104.16.103.112
                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                            • 188.114.96.3
                                            http://mailsystem.clubreadymail.com/ls/click?upn=u001.dtlwkBC06DNvwxOIDozee7JfaEFoikK29eANg7C1JNJcXhZ5gVX-2FXngetD1DVBofJAdCxJYPz79KkHjQ4a88CWk3uwk0LHTd-2BQuqz7QlX5FT8W9oRLmLCtzSTX4k0IZqtxXd_tqQENWc9xFqnCCp3iHBun6Ny8Hr4S4LXflP5eWCRCPqMvoWfGV9u-2FwKqzOzsMAx2mMZTD10t6F-2Fa-2BzGZBzV05lc-2BTr9aqg9-2BqytIbVadpFenaHQ0v-2BIdTTiMe-2F-2BfHHsBDK3wAuPgwhtkcw4b5gAaeO6jGph7EzccXK6qZ9q3RXZcEXV8nVUtJyrcSCDmB-2Bn3qJnRr0-2BMlZvtkB3QnuJkj-2BigNgcTK7oh9PPlXl-2FakX6q-2BsTqF4DIEpeEYAXLd3sTGet hashmaliciousUnknownBrowse
                                            • 104.16.123.96
                                            file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                            • 162.159.134.233
                                            EXABYTES-AS-APExaBytesNetworkSdnBhdMYrMT103_126021720924.exeGet hashmaliciousAgentTeslaBrowse
                                            • 110.4.45.197
                                            z1Transaction_ID_REF2418_cmd.batGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                            • 110.4.45.197
                                            z20SWIFT_MT103_Payment_552016_pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 110.4.45.197
                                            Order Specifications for Materials.docx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 110.4.45.197
                                            z14Employee_Contract_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 110.4.45.197
                                            Order Specifications for Materials.docx.exeGet hashmaliciousAgentTeslaBrowse
                                            • 110.4.45.197
                                            na.elfGet hashmaliciousMiraiBrowse
                                            • 203.142.6.25
                                            05NN8zSK04.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 103.6.198.178
                                            file.exeGet hashmaliciousClipboard Hijacker, Stealc, VidarBrowse
                                            • 103.6.198.219
                                            DHL_Shipment_Details_8th_October.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 110.4.45.197
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            3b5074b1b5d032e5620f69f9f700ff0eGu#U00eda de carga de DHL_pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 104.26.12.205
                                            SecuriteInfo.com.Win32.MalwareX-gen.12338.1741.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            file.exeGet hashmaliciousWhiteSnake StealerBrowse
                                            • 104.26.12.205
                                            Savyi.jsGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            ciuNW.jsGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            https://send-space.s3.eu-north-1.amazonaws.com/de.htmlGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exeGet hashmaliciousXmrigBrowse
                                            • 104.26.12.205
                                            2Lzx7LMDWV.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 104.26.12.205
                                            Quotation Document.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 104.26.12.205
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMassive.exeGet hashmaliciousAgentTeslaBrowse
                                              z20SWIFT_MT103_Payment_552016_pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                Order Specifications for Materials.docx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  9348000 EDT8 EDQ-905.pdf.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                    New_Order_568330_Material_Specifications.exeGet hashmaliciousAgentTesla, MassLogger RAT, Phoenix Stealer, RedLine, SugarDump, XWormBrowse
                                                      Dokument_2024-10-24_135211.exeGet hashmaliciousXWormBrowse
                                                        z14Employee_Contract_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                          purchase order.exeGet hashmaliciousXWormBrowse
                                                            M.BL CSLEBKK2311030B.exeGet hashmaliciousAgentTeslaBrowse
                                                              PO #89230.exeGet hashmaliciousAgentTeslaBrowse
                                                                Process:C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):142
                                                                Entropy (8bit):5.090621108356562
                                                                Encrypted:false
                                                                SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                MD5:8C0458BB9EA02D50565175E38D577E35
                                                                SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                Process:C:\Users\user\Desktop\Payslip_October_2024.pdf.exe
                                                                File Type:data
                                                                Category:modified
                                                                Size (bytes):247808
                                                                Entropy (8bit):6.688645964532768
                                                                Encrypted:false
                                                                SSDEEP:6144:Fxr6iPujRodi/PYsRZrbDbhPU6IrMcQsJEr:r6iPOIHsRdbDb2Brdm
                                                                MD5:C7C18DC0F391B34ECE4987A63A031A08
                                                                SHA1:CD76B007375F6EBA456A2E73961DB94EACD5FE8B
                                                                SHA-256:BA4278FDEEE89C2F5D094040F81B6EFB5369442CD493ED7ADC4C4F490FFA6895
                                                                SHA-512:898565AFA3EDCAB3E139A91AE8EC40E931615FBA96132746AE8656A9A8B223E9FD3E2650489493BF121EA6436D1E3BF96B00ED8E0C2B86C557A2BC5281465BDF
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:.c.O3NQQ^9VG.ZE.M6U98O0.QQZ9VG6IZEHM6U98O0NQQZ9VG6IZEHM6U98.0NQ_E.XG.@.d.Lz..l'Y=q!(V15W$z&)#X:M.-Un#$4.?)....h Y1\.B=DuQZ9VG6I..HMzT:8p:&7QZ9VG6IZ.HO7^83O0.RQZ1VG6IZEv.5U9.O0N.RZ9V.6IzEHM4U9<O0NQQZ9RG6IZEHM6u=8O2NQQZ9VE6..EH]6U)8O0NAQZ)VG6IZEXM6U98O0NQQZ.D6.ZEHM.V9~J0NQQZ9VG6IZEHM6U98O0JQ]Z9VG6IZEHM6U98O0NQQZ9VG6IZEHM6U98O0NQQZ9VG6IZEHM6U98o0NYQZ9VG6IZEHM>u98.0NQQZ9VG6IZk<(N!98Ot.RQZ.VG6.YEHO6U98O0NQQZ9VG6iZE(cD&K[O0N.TZ9V.5IZCHM6.:8O0NQQZ9VG6IZ.HMv{K]#_-QQV9VG6I^EHO6U9.L0NQQZ9VG6IZEH.6U{8O0NQQZ9VG6IZEHM..:8O0NQ.Z9VE6LZ..O6a.9O3NQQ[9VA6IZEHM6U98O0NQQZ9VG6IZEHM6U98O0NQQZ9VG6IZEHM6U98R...qh.KwP'O...^.L..B..@..9.O.3Y..r~B......#A..Z.G}...1....$.1S>7.....52IAX.&~UX.Z....ulB.r.I^.+..(u.'\a.d....l...UM........Y8.Y?@"4..X0&D .G.L6U98........N..hKB(a+@....n+.....6M6U]8O0<QQZXVG6.ZEH"6U9VO0N/QZ9(G6I.EHMvU98x0NQtZ9V*6IZaHM6+98O.3^^...E.EHM6U.....<........~<.+bZw.5.r..3..J .A.u...@.1u.Pd"\f..1T?<J2IURV.X...dJI2P;?K3Bl_.....|.t...I..+.EVG6IZE.M6.98O..Q.Z9V.6.Z..M6U..O.N.Q..G
                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:modified
                                                                Size (bytes):45984
                                                                Entropy (8bit):6.16795797263964
                                                                Encrypted:false
                                                                SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                                                MD5:9D352BC46709F0CB5EC974633A0C3C94
                                                                SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                                                SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                                                SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: Massive.exe, Detection: malicious, Browse
                                                                • Filename: z20SWIFT_MT103_Payment_552016_pdf.exe, Detection: malicious, Browse
                                                                • Filename: Order Specifications for Materials.docx.exe, Detection: malicious, Browse
                                                                • Filename: 9348000 EDT8 EDQ-905.pdf.exe, Detection: malicious, Browse
                                                                • Filename: New_Order_568330_Material_Specifications.exe, Detection: malicious, Browse
                                                                • Filename: Dokument_2024-10-24_135211.exe, Detection: malicious, Browse
                                                                • Filename: z14Employee_Contract_pdf.exe, Detection: malicious, Browse
                                                                • Filename: purchase order.exe, Detection: malicious, Browse
                                                                • Filename: M.BL CSLEBKK2311030B.exe, Detection: malicious, Browse
                                                                • Filename: PO #89230.exe, Detection: malicious, Browse
                                                                Reputation:moderate, very likely benign file
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                Process:C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1141
                                                                Entropy (8bit):4.442398121585593
                                                                Encrypted:false
                                                                SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                                                MD5:6FB4D27A716A8851BC0505666E7C7A10
                                                                SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                                                SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                                                SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                                                Malicious:false
                                                                Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):7.284926599808178
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:Payslip_October_2024.pdf.exe
                                                                File size:1'409'024 bytes
                                                                MD5:098efb8818e822cb79893620a8db1cd0
                                                                SHA1:3d8adf42847ecaddf9865c4460f61e210a6a267f
                                                                SHA256:a674d532150b92874dc954bb8349b6e66a006f1f7dd9381f751237cc98d38dc2
                                                                SHA512:122f9c2951c10d2c7edbca02db71dd5b1095c9f064018d2252657e2235614134d01bfba69a130971cde922d3b39f9a693173f8b0e5e02d45d4057c92c352d969
                                                                SSDEEP:24576:LqDEvCTbMWu7rQYlBQcBiT6rprG8aaNE8GbvRgE8Js8RBAVcqDp:LTvC/MTQYxsWR7aaNyRghi8sV
                                                                TLSH:2F65D0027391C062FF9B92334F5AF6514ABC7A660123B61F13A81D79BE701B1563E7A3
                                                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                Icon Hash:aaf3e3e3938382a0
                                                                Entrypoint:0x420577
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x6723676F [Thu Oct 31 11:18:07 2024 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:5
                                                                OS Version Minor:1
                                                                File Version Major:5
                                                                File Version Minor:1
                                                                Subsystem Version Major:5
                                                                Subsystem Version Minor:1
                                                                Import Hash:948cc502fe9226992dce9417f952fce3
                                                                Instruction
                                                                call 00007FCF3D331083h
                                                                jmp 00007FCF3D33098Fh
                                                                push ebp
                                                                mov ebp, esp
                                                                push esi
                                                                push dword ptr [ebp+08h]
                                                                mov esi, ecx
                                                                call 00007FCF3D330B6Dh
                                                                mov dword ptr [esi], 0049FDF0h
                                                                mov eax, esi
                                                                pop esi
                                                                pop ebp
                                                                retn 0004h
                                                                and dword ptr [ecx+04h], 00000000h
                                                                mov eax, ecx
                                                                and dword ptr [ecx+08h], 00000000h
                                                                mov dword ptr [ecx+04h], 0049FDF8h
                                                                mov dword ptr [ecx], 0049FDF0h
                                                                ret
                                                                push ebp
                                                                mov ebp, esp
                                                                push esi
                                                                push dword ptr [ebp+08h]
                                                                mov esi, ecx
                                                                call 00007FCF3D330B3Ah
                                                                mov dword ptr [esi], 0049FE0Ch
                                                                mov eax, esi
                                                                pop esi
                                                                pop ebp
                                                                retn 0004h
                                                                and dword ptr [ecx+04h], 00000000h
                                                                mov eax, ecx
                                                                and dword ptr [ecx+08h], 00000000h
                                                                mov dword ptr [ecx+04h], 0049FE14h
                                                                mov dword ptr [ecx], 0049FE0Ch
                                                                ret
                                                                push ebp
                                                                mov ebp, esp
                                                                push esi
                                                                mov esi, ecx
                                                                lea eax, dword ptr [esi+04h]
                                                                mov dword ptr [esi], 0049FDD0h
                                                                and dword ptr [eax], 00000000h
                                                                and dword ptr [eax+04h], 00000000h
                                                                push eax
                                                                mov eax, dword ptr [ebp+08h]
                                                                add eax, 04h
                                                                push eax
                                                                call 00007FCF3D33372Dh
                                                                pop ecx
                                                                pop ecx
                                                                mov eax, esi
                                                                pop esi
                                                                pop ebp
                                                                retn 0004h
                                                                lea eax, dword ptr [ecx+04h]
                                                                mov dword ptr [ecx], 0049FDD0h
                                                                push eax
                                                                call 00007FCF3D333778h
                                                                pop ecx
                                                                ret
                                                                push ebp
                                                                mov ebp, esp
                                                                push esi
                                                                mov esi, ecx
                                                                lea eax, dword ptr [esi+04h]
                                                                mov dword ptr [esi], 0049FDD0h
                                                                push eax
                                                                call 00007FCF3D333761h
                                                                test byte ptr [ebp+08h], 00000001h
                                                                pop ecx
                                                                Programming Language:
                                                                • [ C ] VS2008 SP1 build 30729
                                                                • [IMP] VS2008 SP1 build 30729
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x81470.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1560000x7594.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0xd40000x814700x81600ad75d7d6313a81b7012261eeb35da91aFalse0.9503868508454106data7.941236105394739IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x1560000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0xd44a00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                RT_ICON0xd45c80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                RT_ICON0xd48b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                RT_ICON0xd49d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                RT_ICON0xd58800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                RT_ICON0xd61280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                RT_ICON0xd66900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                RT_ICON0xd8c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                RT_ICON0xd9ce00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                RT_STRING0xda1480x594dataEnglishGreat Britain0.3333333333333333
                                                                RT_STRING0xda6dc0x68adataEnglishGreat Britain0.2735961768219833
                                                                RT_STRING0xdad680x490dataEnglishGreat Britain0.3715753424657534
                                                                RT_STRING0xdb1f80x5fcdataEnglishGreat Britain0.3087467362924282
                                                                RT_STRING0xdb7f40x65cdataEnglishGreat Britain0.34336609336609336
                                                                RT_STRING0xdbe500x466dataEnglishGreat Britain0.3605683836589698
                                                                RT_STRING0xdc2b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                RT_RCDATA0xdc4100x78b08data1.00032568413898
                                                                RT_GROUP_ICON0x154f180x76dataEnglishGreat Britain0.6610169491525424
                                                                RT_GROUP_ICON0x154f900x14dataEnglishGreat Britain1.15
                                                                RT_VERSION0x154fa40xdcdataEnglishGreat Britain0.6181818181818182
                                                                RT_MANIFEST0x1550800x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                DLLImport
                                                                WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                PSAPI.DLLGetProcessMemoryInfo
                                                                IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                UxTheme.dllIsThemeActive
                                                                KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishGreat Britain
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-11-01T14:35:24.051829+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.749741TCP
                                                                2024-11-01T14:35:45.466037+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.752659TCP
                                                                2024-11-01T14:35:46.941600+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.752669TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 1, 2024 14:35:53.138907909 CET52711443192.168.2.7104.26.12.205
                                                                Nov 1, 2024 14:35:53.138953924 CET44352711104.26.12.205192.168.2.7
                                                                Nov 1, 2024 14:35:53.139102936 CET52711443192.168.2.7104.26.12.205
                                                                Nov 1, 2024 14:35:53.150716066 CET52711443192.168.2.7104.26.12.205
                                                                Nov 1, 2024 14:35:53.150754929 CET44352711104.26.12.205192.168.2.7
                                                                Nov 1, 2024 14:35:53.771029949 CET44352711104.26.12.205192.168.2.7
                                                                Nov 1, 2024 14:35:53.771126032 CET52711443192.168.2.7104.26.12.205
                                                                Nov 1, 2024 14:35:53.773005009 CET52711443192.168.2.7104.26.12.205
                                                                Nov 1, 2024 14:35:53.773015022 CET44352711104.26.12.205192.168.2.7
                                                                Nov 1, 2024 14:35:53.773268938 CET44352711104.26.12.205192.168.2.7
                                                                Nov 1, 2024 14:35:53.815798998 CET52711443192.168.2.7104.26.12.205
                                                                Nov 1, 2024 14:35:53.826056004 CET52711443192.168.2.7104.26.12.205
                                                                Nov 1, 2024 14:35:53.871324062 CET44352711104.26.12.205192.168.2.7
                                                                Nov 1, 2024 14:35:53.996181011 CET44352711104.26.12.205192.168.2.7
                                                                Nov 1, 2024 14:35:53.996267080 CET44352711104.26.12.205192.168.2.7
                                                                Nov 1, 2024 14:35:53.996357918 CET52711443192.168.2.7104.26.12.205
                                                                Nov 1, 2024 14:35:54.002499104 CET52711443192.168.2.7104.26.12.205
                                                                Nov 1, 2024 14:35:54.808423996 CET5272121192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:54.816014051 CET2152721110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:54.816085100 CET5272121192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:54.822882891 CET5272121192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:54.828915119 CET2152721110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:54.831105947 CET5272121192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:54.849984884 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:54.855227947 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:54.855551958 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:55.795501947 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:55.799395084 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:55.809097052 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:56.164942980 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:56.165081024 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:56.170015097 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:56.540608883 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:56.540750027 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:56.545821905 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:56.885194063 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:56.887203932 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:56.893676996 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:57.235086918 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:57.239813089 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:57.246642113 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:57.592338085 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:57.593094110 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:57.605645895 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:57.946265936 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:57.946836948 CET5273956795192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:57.951738119 CET5679552739110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:57.951822996 CET5273956795192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:57.951869011 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:57.956975937 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:58.892055988 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:58.892273903 CET5273956795192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:58.892349958 CET5273956795192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:58.897216082 CET5679552739110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:58.898149014 CET5679552739110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:58.898205042 CET5273956795192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:58.940849066 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:59.253014088 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:59.253554106 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:59.259005070 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:59.597810030 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:59.598344088 CET5275056562192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:59.603415966 CET5656252750110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:35:59.603494883 CET5275056562192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:59.603569031 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:35:59.608730078 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:36:00.541033983 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:36:00.541256905 CET5275056562192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:36:00.546787024 CET5656252750110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:36:00.546855927 CET5275056562192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:36:00.581496954 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:36:00.901818991 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:36:00.902148962 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:36:00.907463074 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:36:01.248248100 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:36:01.248698950 CET5276153313192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:36:01.253807068 CET5331352761110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:36:01.253882885 CET5276153313192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:36:01.253945112 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:36:01.259016037 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:36:02.184326887 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:36:02.184568882 CET5276153313192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:36:02.189631939 CET5331352761110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:36:02.190325022 CET5331352761110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:36:02.190375090 CET5276153313192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:36:02.237860918 CET5272221192.168.2.7110.4.45.197
                                                                Nov 1, 2024 14:36:02.531008005 CET2152722110.4.45.197192.168.2.7
                                                                Nov 1, 2024 14:36:02.581593037 CET5272221192.168.2.7110.4.45.197
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 1, 2024 14:35:26.354660988 CET53596501.1.1.1192.168.2.7
                                                                Nov 1, 2024 14:35:40.041595936 CET5350231162.159.36.2192.168.2.7
                                                                Nov 1, 2024 14:35:40.865683079 CET6415653192.168.2.71.1.1.1
                                                                Nov 1, 2024 14:35:40.873207092 CET53641561.1.1.1192.168.2.7
                                                                Nov 1, 2024 14:35:53.119293928 CET6478153192.168.2.71.1.1.1
                                                                Nov 1, 2024 14:35:53.126646996 CET53647811.1.1.1192.168.2.7
                                                                Nov 1, 2024 14:35:54.550822020 CET5402953192.168.2.71.1.1.1
                                                                Nov 1, 2024 14:35:54.807604074 CET53540291.1.1.1192.168.2.7
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Nov 1, 2024 14:35:40.865683079 CET192.168.2.71.1.1.10x2a61Standard query (0)241.42.69.40.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                Nov 1, 2024 14:35:53.119293928 CET192.168.2.71.1.1.10xd5acStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                Nov 1, 2024 14:35:54.550822020 CET192.168.2.71.1.1.10xafe1Standard query (0)ftp.haliza.com.myA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Nov 1, 2024 14:35:40.873207092 CET1.1.1.1192.168.2.70x2a61Name error (3)241.42.69.40.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                Nov 1, 2024 14:35:53.126646996 CET1.1.1.1192.168.2.70xd5acNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                Nov 1, 2024 14:35:53.126646996 CET1.1.1.1192.168.2.70xd5acNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                Nov 1, 2024 14:35:53.126646996 CET1.1.1.1192.168.2.70xd5acNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                Nov 1, 2024 14:35:54.807604074 CET1.1.1.1192.168.2.70xafe1No error (0)ftp.haliza.com.my110.4.45.197A (IP address)IN (0x0001)false
                                                                • api.ipify.org
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.752711104.26.12.2054437548C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-01 13:35:53 UTC155OUTGET / HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                Host: api.ipify.org
                                                                Connection: Keep-Alive
                                                                2024-11-01 13:35:53 UTC211INHTTP/1.1 200 OK
                                                                Date: Fri, 01 Nov 2024 13:35:53 GMT
                                                                Content-Type: text/plain
                                                                Content-Length: 14
                                                                Connection: close
                                                                Vary: Origin
                                                                cf-cache-status: DYNAMIC
                                                                Server: cloudflare
                                                                CF-RAY: 8dbc4549dc22cb75-DFW
                                                                2024-11-01 13:35:53 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32
                                                                Data Ascii: 173.254.250.82


                                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                                Nov 1, 2024 14:35:55.795501947 CET2152722110.4.45.197192.168.2.7220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 50 allowed.
                                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 50 allowed.220-Local time is now 21:35. Server port: 21.
                                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 50 allowed.220-Local time is now 21:35. Server port: 21.220-This is a private system - No anonymous login
                                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 50 allowed.220-Local time is now 21:35. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 50 allowed.220-Local time is now 21:35. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                                Nov 1, 2024 14:35:55.799395084 CET5272221192.168.2.7110.4.45.197USER origin@haliza.com.my
                                                                Nov 1, 2024 14:35:56.164942980 CET2152722110.4.45.197192.168.2.7331 User origin@haliza.com.my OK. Password required
                                                                Nov 1, 2024 14:35:56.165081024 CET5272221192.168.2.7110.4.45.197PASS JesusChrist007$
                                                                Nov 1, 2024 14:35:56.540608883 CET2152722110.4.45.197192.168.2.7230 OK. Current restricted directory is /
                                                                Nov 1, 2024 14:35:56.885194063 CET2152722110.4.45.197192.168.2.7504 Unknown command
                                                                Nov 1, 2024 14:35:56.887203932 CET5272221192.168.2.7110.4.45.197PWD
                                                                Nov 1, 2024 14:35:57.235086918 CET2152722110.4.45.197192.168.2.7257 "/" is your current location
                                                                Nov 1, 2024 14:35:57.239813089 CET5272221192.168.2.7110.4.45.197TYPE I
                                                                Nov 1, 2024 14:35:57.592338085 CET2152722110.4.45.197192.168.2.7200 TYPE is now 8-bit binary
                                                                Nov 1, 2024 14:35:57.593094110 CET5272221192.168.2.7110.4.45.197PASV
                                                                Nov 1, 2024 14:35:57.946265936 CET2152722110.4.45.197192.168.2.7227 Entering Passive Mode (110,4,45,197,221,219)
                                                                Nov 1, 2024 14:35:57.951869011 CET5272221192.168.2.7110.4.45.197STOR CO_Chrome_Default.txt_user-818225_2024_11_01_11_05_34.txt
                                                                Nov 1, 2024 14:35:58.892055988 CET2152722110.4.45.197192.168.2.7150 Accepted data connection
                                                                Nov 1, 2024 14:35:59.253014088 CET2152722110.4.45.197192.168.2.7226-File successfully transferred
                                                                226-File successfully transferred226 0.361 seconds (measured here), 0.78 Kbytes per second
                                                                Nov 1, 2024 14:35:59.253554106 CET5272221192.168.2.7110.4.45.197PASV
                                                                Nov 1, 2024 14:35:59.597810030 CET2152722110.4.45.197192.168.2.7227 Entering Passive Mode (110,4,45,197,220,242)
                                                                Nov 1, 2024 14:35:59.603569031 CET5272221192.168.2.7110.4.45.197STOR CO_Edge Chromium_Default.txt_user-818225_2024_11_01_17_24_05.txt
                                                                Nov 1, 2024 14:36:00.541033983 CET2152722110.4.45.197192.168.2.7150 Accepted data connection
                                                                Nov 1, 2024 14:36:00.901818991 CET2152722110.4.45.197192.168.2.7226 File successfully transferred
                                                                Nov 1, 2024 14:36:00.902148962 CET5272221192.168.2.7110.4.45.197PASV
                                                                Nov 1, 2024 14:36:01.248248100 CET2152722110.4.45.197192.168.2.7227 Entering Passive Mode (110,4,45,197,208,65)
                                                                Nov 1, 2024 14:36:01.253945112 CET5272221192.168.2.7110.4.45.197STOR CO_Firefox_fu7wner3.default-release.txt_user-818225_2024_11_01_19_42_48.txt
                                                                Nov 1, 2024 14:36:02.184326887 CET2152722110.4.45.197192.168.2.7150 Accepted data connection
                                                                Nov 1, 2024 14:36:02.531008005 CET2152722110.4.45.197192.168.2.7226 File successfully transferred

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:09:35:04
                                                                Start date:01/11/2024
                                                                Path:C:\Users\user\Desktop\Payslip_October_2024.pdf.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\Payslip_October_2024.pdf.exe"
                                                                Imagebase:0x7c0000
                                                                File size:1'409'024 bytes
                                                                MD5 hash:098EFB8818E822CB79893620A8DB1CD0
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:11
                                                                Start time:10:45:32
                                                                Start date:01/11/2024
                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\Payslip_October_2024.pdf.exe"
                                                                Imagebase:0xc10000
                                                                File size:45'984 bytes
                                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2497169089.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.2497169089.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.2497169089.00000000030BC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2494522964.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.2494522964.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:12
                                                                Start time:10:45:43
                                                                Start date:01/11/2024
                                                                Path:C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe"
                                                                Imagebase:0x210000
                                                                File size:45'984 bytes
                                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 0%, ReversingLabs
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:13
                                                                Start time:10:45:43
                                                                Start date:01/11/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff75da10000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:16
                                                                Start time:10:45:51
                                                                Start date:01/11/2024
                                                                Path:C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe"
                                                                Imagebase:0x550000
                                                                File size:45'984 bytes
                                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:17
                                                                Start time:10:45:51
                                                                Start date:01/11/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff75da10000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:12.7%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:2.6%
                                                                  Total number of Nodes:154
                                                                  Total number of Limit Nodes:18
                                                                  execution_graph 40665 696b812 40666 696b86a OleGetClipboard 40665->40666 40667 696b8aa 40666->40667 40668 2ed0848 40670 2ed084e 40668->40670 40669 2ed091b 40670->40669 40672 2ed1340 40670->40672 40673 2ed1334 40672->40673 40675 2ed1343 40672->40675 40673->40670 40674 2ed1454 40674->40670 40675->40674 40679 2ed8219 40675->40679 40684 69630b0 40675->40684 40690 69630a2 40675->40690 40681 2ed8223 40679->40681 40680 2ed82d9 40680->40675 40681->40680 40696 698fa88 40681->40696 40700 698fa78 40681->40700 40685 69630c2 40684->40685 40688 6963173 40685->40688 40704 6962dbc 40685->40704 40687 6963139 40709 6962ddc 40687->40709 40688->40675 40691 69630c2 40690->40691 40692 6962dbc GetModuleHandleW 40691->40692 40694 6963173 40691->40694 40693 6963139 40692->40693 40695 6962ddc KiUserCallbackDispatcher 40693->40695 40694->40675 40695->40694 40697 698fa9d 40696->40697 40698 698fcae 40697->40698 40699 698fcc9 GlobalMemoryStatusEx GlobalMemoryStatusEx 40697->40699 40698->40680 40699->40697 40701 698fa9d 40700->40701 40702 698fcae 40701->40702 40703 698fcc9 GlobalMemoryStatusEx GlobalMemoryStatusEx 40701->40703 40702->40680 40703->40701 40705 6962dc7 40704->40705 40713 6964270 40705->40713 40719 696425b 40705->40719 40706 6963312 40706->40687 40710 6962de7 40709->40710 40712 696adeb 40710->40712 40750 6969854 40710->40750 40712->40688 40714 696429b 40713->40714 40725 69647d1 40714->40725 40715 696431e 40716 69637c8 GetModuleHandleW 40715->40716 40717 696434a 40715->40717 40716->40717 40720 6964270 40719->40720 40724 69647d1 GetModuleHandleW 40720->40724 40721 696431e 40722 69637c8 GetModuleHandleW 40721->40722 40723 696434a 40721->40723 40722->40723 40724->40721 40726 696480d 40725->40726 40727 696488e 40726->40727 40730 6964a3e 40726->40730 40738 69649af 40726->40738 40731 6964a8e 40730->40731 40746 69637c8 40731->40746 40733 6964ada 40734 69637c8 GetModuleHandleW 40733->40734 40735 6964b54 40733->40735 40736 6964b28 40734->40736 40735->40727 40736->40735 40737 69637c8 GetModuleHandleW 40736->40737 40737->40735 40739 69649ba 40738->40739 40740 69637c8 GetModuleHandleW 40739->40740 40741 6964ada 40740->40741 40742 69637c8 GetModuleHandleW 40741->40742 40745 6964b54 40741->40745 40743 6964b28 40742->40743 40744 69637c8 GetModuleHandleW 40743->40744 40743->40745 40744->40745 40745->40727 40747 6964c90 GetModuleHandleW 40746->40747 40749 6964d05 40747->40749 40749->40733 40751 696ae00 KiUserCallbackDispatcher 40750->40751 40753 696ae6e 40751->40753 40753->40710 40754 155d030 40755 155d048 40754->40755 40756 155d0a2 40755->40756 40763 6965ee3 40755->40763 40769 69638fc 40755->40769 40777 69638ec 40755->40777 40781 696a811 40755->40781 40790 6966010 40755->40790 40794 6965ef0 40755->40794 40768 6965ef0 40763->40768 40764 69638ec GetModuleHandleW 40765 6965f22 40764->40765 40766 69638fc CallWindowProcW 40765->40766 40767 6965f37 40766->40767 40767->40756 40768->40764 40770 6963907 40769->40770 40771 696a8a1 40770->40771 40773 696a891 40770->40773 40774 696a89f 40771->40774 40808 69697fc 40771->40808 40800 696a9b8 40773->40800 40804 696a9c8 40773->40804 40778 69638f7 40777->40778 40812 6963924 40778->40812 40780 6966027 40780->40756 40782 696a82a 40781->40782 40783 696a81a 40781->40783 40784 696a8a1 40782->40784 40786 696a891 40782->40786 40783->40756 40785 69697fc CallWindowProcW 40784->40785 40787 696a89f 40784->40787 40785->40787 40788 696a9b8 CallWindowProcW 40786->40788 40789 696a9c8 CallWindowProcW 40786->40789 40787->40787 40788->40787 40789->40787 40791 6966020 40790->40791 40792 6963924 GetModuleHandleW 40791->40792 40793 6966027 40792->40793 40793->40756 40799 6965f16 40794->40799 40795 69638ec GetModuleHandleW 40796 6965f22 40795->40796 40797 69638fc CallWindowProcW 40796->40797 40798 6965f37 40797->40798 40798->40756 40799->40795 40801 696a9c8 40800->40801 40802 69697fc CallWindowProcW 40801->40802 40803 696aaae 40801->40803 40802->40801 40803->40774 40806 696a9d6 40804->40806 40805 69697fc CallWindowProcW 40805->40806 40806->40805 40807 696aaae 40806->40807 40807->40774 40809 6969807 40808->40809 40810 696ab62 CallWindowProcW 40809->40810 40811 696ab11 40809->40811 40810->40811 40811->40774 40813 696392f 40812->40813 40814 69637c8 GetModuleHandleW 40813->40814 40815 69660f7 40813->40815 40814->40815 40815->40815 40816 69699f0 40817 69699f1 GetCurrentProcess 40816->40817 40819 6969a88 GetCurrentThread 40817->40819 40822 6969a81 40817->40822 40820 6969ac5 GetCurrentProcess 40819->40820 40821 6969abe 40819->40821 40823 6969afb 40820->40823 40821->40820 40822->40819 40824 6969b23 GetCurrentThreadId 40823->40824 40825 6969b54 40824->40825 40826 696d350 40827 696d394 SetWindowsHookExA 40826->40827 40829 696d3da 40827->40829 40830 2ed8040 40831 2ed8086 DeleteFileW 40830->40831 40833 2ed80bf 40831->40833 40847 6964c8b 40848 6964cd2 40847->40848 40849 6964cd8 GetModuleHandleW 40847->40849 40848->40849 40850 6964d05 40849->40850 40834 6969c38 DuplicateHandle 40835 6969cce 40834->40835 40836 696b678 40837 696b683 40836->40837 40838 696b693 40837->40838 40840 696b0f8 40837->40840 40841 696b6c8 OleInitialize 40840->40841 40842 696b72c 40841->40842 40842->40838 40843 6965d38 40844 6965d70 CreateWindowExW 40843->40844 40846 6965e5c 40844->40846

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 124 6983580-69835a1 125 69835a3-69835a6 124->125 126 69835ac-69835cb 125->126 127 6983d47-6983d4a 125->127 136 69835cd-69835d0 126->136 137 69835e4-69835ee 126->137 128 6983d4c-6983d6b 127->128 129 6983d70-6983d72 127->129 128->129 130 6983d79-6983d7c 129->130 131 6983d74 129->131 130->125 133 6983d82-6983d8b 130->133 131->130 136->137 139 69835d2-69835e2 136->139 141 69835f4-6983605 call 698316c 137->141 139->141 144 698360a-698360f 141->144 145 698361c-69838f9 144->145 146 6983611-6983617 144->146 167 6983d39-6983d46 145->167 168 69838ff-69839ae 145->168 146->133 177 69839b0-69839d5 168->177 178 69839d7 168->178 180 69839e0-69839f3 call 6983178 177->180 178->180 183 69839f9-6983a1b call 6983184 180->183 184 6983d20-6983d2c 180->184 183->184 188 6983a21-6983a2b 183->188 184->168 185 6983d32 184->185 185->167 188->184 189 6983a31-6983a3c 188->189 189->184 190 6983a42-6983b18 189->190 202 6983b1a-6983b1c 190->202 203 6983b26-6983b56 190->203 202->203 207 6983b58-6983b5a 203->207 208 6983b64-6983b70 203->208 207->208 209 6983bd0-6983bd4 208->209 210 6983b72-6983b76 208->210 212 6983bda-6983c16 209->212 213 6983d11-6983d1a 209->213 210->209 211 6983b78-6983ba2 210->211 220 6983bb0-6983bcd call 6983190 211->220 221 6983ba4-6983ba6 211->221 224 6983c18-6983c1a 212->224 225 6983c24-6983c32 212->225 213->184 213->190 220->209 221->220 224->225 228 6983c49-6983c54 225->228 229 6983c34-6983c3f 225->229 233 6983c6c-6983c7d 228->233 234 6983c56-6983c5c 228->234 229->228 232 6983c41 229->232 232->228 238 6983c7f-6983c85 233->238 239 6983c95-6983ca1 233->239 235 6983c5e 234->235 236 6983c60-6983c62 234->236 235->233 236->233 240 6983c89-6983c8b 238->240 241 6983c87 238->241 243 6983cb9-6983d0a 239->243 244 6983ca3-6983ca9 239->244 240->239 241->239 243->213 245 6983cab 244->245 246 6983cad-6983caf 244->246 245->243 246->243
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $q$$q$$q$$q$$q$$q
                                                                  • API String ID: 0-2069967915
                                                                  • Opcode ID: ade2de8f767094662413a74dab5409e0e18dd10d26b7878562d015dbae210e8e
                                                                  • Instruction ID: dffbc4a7e4832a6953eedd08524db1132b014db12886107208ffb654c7c7f28d
                                                                  • Opcode Fuzzy Hash: ade2de8f767094662413a74dab5409e0e18dd10d26b7878562d015dbae210e8e
                                                                  • Instruction Fuzzy Hash: 48320E31E107198FDB14EFB5D85069DF7B6FF89300F2196AAD409AB214EB34AD85CB90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 675 6987e98-6987eb6 676 6987eb8-6987ebb 675->676 677 6987edc-6987edf 676->677 678 6987ebd-6987ed7 676->678 679 6987ee1-6987eef 677->679 680 6987ef6-6987ef9 677->680 678->677 690 6987f3e-6987f54 679->690 691 6987ef1 679->691 682 6987efb-6987f17 680->682 683 6987f1c-6987f1f 680->683 682->683 684 6987f2c-6987f2e 683->684 685 6987f21-6987f2b 683->685 687 6987f30 684->687 688 6987f35-6987f38 684->688 687->688 688->676 688->690 695 6987f5a-6987f63 690->695 696 698816f-6988179 690->696 691->680 697 6987f69-6987f86 695->697 698 698817a-69881af 695->698 707 698815c-6988169 697->707 708 6987f8c-6987fb4 697->708 701 69881b1-69881b4 698->701 702 69883e9-69883ec 701->702 703 69881ba-69881c9 701->703 705 69883ee-698840a 702->705 706 698840f-6988412 702->706 713 69881e8-698822c 703->713 714 69881cb-69881e6 703->714 705->706 710 6988418-6988424 706->710 711 69884bd-69884bf 706->711 707->695 707->696 708->707 730 6987fba-6987fc3 708->730 719 698842f-6988431 710->719 716 69884c1 711->716 717 69884c6-69884c9 711->717 731 69883bd-69883d3 713->731 732 6988232-6988243 713->732 714->713 716->717 717->701 718 69884cf-69884d8 717->718 724 6988449-698844d 719->724 725 6988433-6988439 719->725 728 698845b 724->728 729 698844f-6988459 724->729 726 698843b 725->726 727 698843d-698843f 725->727 726->724 727->724 733 6988460-6988462 728->733 729->733 730->698 734 6987fc9-6987fe5 730->734 731->702 742 69883a8-69883b7 732->742 743 6988249-6988266 732->743 737 6988473-69884ac 733->737 738 6988464-6988467 733->738 745 698814a-6988156 734->745 746 6987feb-6988015 734->746 737->703 758 69884b2-69884bc 737->758 738->718 742->731 742->732 743->742 752 698826c-6988362 call 69866b8 743->752 745->707 745->730 759 698801b-6988043 746->759 760 6988140-6988145 746->760 808 6988370 752->808 809 6988364-698836e 752->809 759->760 766 6988049-6988077 759->766 760->745 766->760 772 698807d-6988086 766->772 772->760 774 698808c-69880be 772->774 781 69880c9-69880e5 774->781 782 69880c0-69880c4 774->782 781->745 784 69880e7-698813e call 69866b8 781->784 782->760 783 69880c6 782->783 783->781 784->745 810 6988375-6988377 808->810 809->810 810->742 811 6988379-698837e 810->811 812 698838c 811->812 813 6988380-698838a 811->813 814 6988391-6988393 812->814 813->814 814->742 815 6988395-69883a1 814->815 815->742
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $q$$q
                                                                  • API String ID: 0-3126353813
                                                                  • Opcode ID: 12ef6c3b182d7852c9e24869fe88e81841b62b42b57dde4c22661a4dce10aa06
                                                                  • Instruction ID: 67267c1095114923da5b18b9d64c5cf3ba0fef37b582e8841241cc68aeab2e06
                                                                  • Opcode Fuzzy Hash: 12ef6c3b182d7852c9e24869fe88e81841b62b42b57dde4c22661a4dce10aa06
                                                                  • Instruction Fuzzy Hash: 4302AD30B002159FDB64EF78D990AAEBBE6FF84310F648529D415AB794DB35EC42CB90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 817 2ede915-2ede91c 818 2ede97c 817->818 819 2ede91e-2ede924 817->819 822 2ede9dc 818->822 823 2ede97e-2ede983 818->823 820 2ede984 819->820 821 2ede926-2ede934 819->821 828 2ede9e4-2ede9ec 820->828 829 2ede986-2ede98e 820->829 826 2ede994 821->826 827 2ede936-2ede93c 821->827 824 2edea3c-2edea52 822->824 825 2ede9de-2ede9e0 822->825 823->820 853 2edea59-2edea5b 824->853 825->828 832 2ede995-2ede99b 826->832 833 2ede9f4-2edea00 826->833 830 2ede99c-2ede9ec 827->830 831 2ede93e-2ede964 827->831 840 2ede9ed-2ede9f2 828->840 841 2edea4c-2edea5b 828->841 829->832 830->841 860 2ede9ee-2ede9f2 830->860 842 2ede9c4 831->842 843 2ede966-2ede969 831->843 832->830 837 2ede9c0 833->837 838 2edea02-2edea1a 833->838 837->842 849 2edea1c-2edea32 838->849 850 2edea7e-2edea85 838->850 840->833 857 2edea5d-2edea68 841->857 858 2edea86-2edeaed 841->858 846 2ede9c5-2ede9c9 842->846 847 2edea24-2edea32 842->847 847->824 849->824 853->857 853->858 865 2edea6f-2edea76 857->865 871 2edeaef-2edeaf1 858->871 872 2edeaf6-2edeb06 858->872 860->833 865->850 873 2eded95-2eded9c 871->873 874 2edeb0d-2edeb1d 872->874 875 2edeb08 872->875 877 2eded7c-2eded8a 874->877 878 2edeb23-2edeb31 874->878 875->873 881 2eded9d-2edee16 877->881 883 2eded8c-2eded90 call 2ed7b58 877->883 878->881 882 2edeb37 878->882 882->881 884 2eded4c-2eded6e 882->884 885 2eded2f-2eded4a call 2ed0350 882->885 886 2edebee-2edec0f 882->886 887 2edebc8-2edebe9 882->887 888 2edec67-2edec8f 882->888 889 2eded01-2eded2d 882->889 890 2edeba2-2edebc3 882->890 891 2edeb3e-2edeb50 882->891 892 2edeb7b-2edeb9d 882->892 893 2edec3a-2edec62 882->893 894 2edeb55-2edeb76 882->894 895 2edec14-2edec35 882->895 896 2edec94-2edecd1 882->896 897 2edecd6-2edecfc 882->897 898 2eded70-2eded7a 882->898 883->873 884->873 885->873 886->873 887->873 888->873 889->873 890->873 891->873 892->873 893->873 894->873 895->873 896->873 897->873 898->873
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2496921504.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_2ed0000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Xq$$q
                                                                  • API String ID: 0-855381642
                                                                  • Opcode ID: aaa281ef34242d4d4f2dbf5d921f4ee09dd44190cd30b30a0785d21b6410161e
                                                                  • Instruction ID: 4ece33de79abd473bfc7aa0438640d64032f4897d43db128f503d7b01adde2e8
                                                                  • Opcode Fuzzy Hash: aaa281ef34242d4d4f2dbf5d921f4ee09dd44190cd30b30a0785d21b6410161e
                                                                  • Instruction Fuzzy Hash: 24D1E430B452149FDB58AB789C5866E7BA3BFC9200B09956EE446DF398DE348C07C7A1
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2496921504.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_2ed0000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 022f875297b67ca68c53a0747137df6f8aaad040886b83deb3594d560591dd6c
                                                                  • Instruction ID: a9bd058d680ae352ac2c0cc5a12f16046c90ec66e5694e0a3b5232742e4cdfd9
                                                                  • Opcode Fuzzy Hash: 022f875297b67ca68c53a0747137df6f8aaad040886b83deb3594d560591dd6c
                                                                  • Instruction Fuzzy Hash: 6953F931C10B1A8ADB51EF68C880699F7B1FF99300F15D79AE4587B121FB70AAD5CB81
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $
                                                                  • API String ID: 0-3993045852
                                                                  • Opcode ID: 1be32f6b8cffdff91fc8fbcd5bbb3c17c4ec6a5e7493ce412618198696f5baed
                                                                  • Instruction ID: eb838a8c5d5b7b5894b9f12f1c9f7afb48da452e62bff2a2969b398fdb2e0115
                                                                  • Opcode Fuzzy Hash: 1be32f6b8cffdff91fc8fbcd5bbb3c17c4ec6a5e7493ce412618198696f5baed
                                                                  • Instruction Fuzzy Hash: 6022C471F002158FDFA4EB64C4807AEBBB6FF84320F26846AD856AB754DA35DC45CB90
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c7d17df87fedbb21d4938af5a7ddfcd58c85744793f666e49e8a2ae0bd05ed5d
                                                                  • Instruction ID: f8c158eb3aa9f0f39c8a2b9942145432465fc900341b23088ae19608badbc675
                                                                  • Opcode Fuzzy Hash: c7d17df87fedbb21d4938af5a7ddfcd58c85744793f666e49e8a2ae0bd05ed5d
                                                                  • Instruction Fuzzy Hash: CB628C34A002049FDB64EBA8D994BADBBB6FB85310F248569D406EF754DB35ED42CB80
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8654dec563e9e4e9f362e3e6434501214d3d86b583c57ba5e26bce4ada7dc6dc
                                                                  • Instruction ID: 19a8bf4de1f433c8407ead6f19d37a7fbd0eb9e12f80cff3c34b1d4b317bd273
                                                                  • Opcode Fuzzy Hash: 8654dec563e9e4e9f362e3e6434501214d3d86b583c57ba5e26bce4ada7dc6dc
                                                                  • Instruction Fuzzy Hash: 3942B238E04309CFDB94DFA9D584A9DB7B2FF88314F248528E405AB760DB35AC46CB91
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2496921504.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_2ed0000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 277fcb33f09ddb2f7891beef59c1afe5c6f5798544d2b18facb9423434fd3021
                                                                  • Instruction ID: c84e644917294cab65a4bdd9723fc5aab9266c21723aae778d9b6469d0d6be46
                                                                  • Opcode Fuzzy Hash: 277fcb33f09ddb2f7891beef59c1afe5c6f5798544d2b18facb9423434fd3021
                                                                  • Instruction Fuzzy Hash: 89B18E70E407098FDB24CFA8C8957EDBBF2AF98318F14D529D415AB294EB749842CF81
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7a10a945a1b3d43bd400afd56126ab621eda262b5c8833624efdac7df50cbfcc
                                                                  • Instruction ID: b9273094fb470c2c5391c2de227a0328246e4c69f3b1a3d4166e657ae852fd24
                                                                  • Opcode Fuzzy Hash: 7a10a945a1b3d43bd400afd56126ab621eda262b5c8833624efdac7df50cbfcc
                                                                  • Instruction Fuzzy Hash: A1A17E74E003198FCB44DFA5D884ADDFBBAFF89300F648615E416AF2A4DB30A845CB91
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2496921504.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_2ed0000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c662978b83caa164b6964a42a7d9a0b109ab092b5fd02b40809943cc65d494ce
                                                                  • Instruction ID: 9e3f22606fc9239be6e41537f1be108bf5234076c10815101cc21c474604aa85
                                                                  • Opcode Fuzzy Hash: c662978b83caa164b6964a42a7d9a0b109ab092b5fd02b40809943cc65d494ce
                                                                  • Instruction Fuzzy Hash: 8A913C70E403099FDB24CFA9C9857DEBBF2AF88318F14D129E405A7294DB749846CF92
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b06270ee054282fed84777bbf16a473e7555fd7a51e56d1302e4aeaee25cb512
                                                                  • Instruction ID: f321bfe1acab6b7192c71878f114d5710fbf132b6e1729309339558dbe2cc91c
                                                                  • Opcode Fuzzy Hash: b06270ee054282fed84777bbf16a473e7555fd7a51e56d1302e4aeaee25cb512
                                                                  • Instruction Fuzzy Hash: 47918C75E003199FCB05DFA5D8809DDFBBAFF89310B648615E416AF2A4DB30A845CB91
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 00f76c69fd956db0487d3c112ffb79f09fca05c2f90788f98d1461da7f36da9f
                                                                  • Instruction ID: 3778157fc7d55eb99fb583c6463a61a561ad6edef3f3bc641c2a032adb1e3298
                                                                  • Opcode Fuzzy Hash: 00f76c69fd956db0487d3c112ffb79f09fca05c2f90788f98d1461da7f36da9f
                                                                  • Instruction Fuzzy Hash: 9B917C75E003198FCB05DFA5D8809DDFBBAFF89300B648615F516AF2A4DB30A981CB51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 698ade8-698ae06 1 698ae08-698ae0b 0->1 2 698ae0d-698ae29 1->2 3 698ae2e-698ae31 1->3 2->3 4 698b005-698b00e 3->4 5 698ae37-698ae3a 3->5 6 698ae91-698ae9a 4->6 7 698b014-698b01e 4->7 9 698ae3c-698ae49 5->9 10 698ae4e-698ae51 5->10 13 698b01f-698b056 6->13 14 698aea0-698aea4 6->14 9->10 11 698ae62-698ae65 10->11 12 698ae53-698ae57 10->12 17 698ae6f-698ae72 11->17 18 698ae67-698ae6c 11->18 12->7 16 698ae5d 12->16 28 698b058-698b05b 13->28 20 698aea9-698aeac 14->20 16->11 22 698ae8c-698ae8f 17->22 23 698ae74-698ae87 17->23 18->17 24 698aebc-698aebe 20->24 25 698aeae-698aeb7 20->25 22->6 22->20 23->22 26 698aec0 24->26 27 698aec5-698aec8 24->27 25->24 26->27 27->1 29 698aece-698aef2 27->29 30 698b05d-698b079 28->30 31 698b07e-698b081 28->31 48 698aef8-698af07 29->48 49 698b002 29->49 30->31 33 698b090-698b093 31->33 34 698b083 call 698b3e7 31->34 35 698b0a0-698b0a3 33->35 36 698b095-698b099 33->36 42 698b089-698b08b 34->42 39 698b0a9-698b0e4 35->39 41 698b30c-698b30f 35->41 36->39 40 698b09b 36->40 53 698b0ea-698b0f6 39->53 54 698b2d7-698b2ea 39->54 40->35 45 698b31c-698b31e 41->45 46 698b311-698b31b 41->46 42->33 50 698b320 45->50 51 698b325-698b328 45->51 58 698af09-698af0f 48->58 59 698af1f-698af5a call 69866b8 48->59 49->4 50->51 51->28 52 698b32e-698b338 51->52 60 698b0f8-698b111 53->60 61 698b116-698b15a 53->61 55 698b2ec 54->55 55->41 62 698af11 58->62 63 698af13-698af15 58->63 75 698af5c-698af62 59->75 76 698af72-698af89 59->76 60->55 77 698b15c-698b16e 61->77 78 698b176-698b1b5 61->78 62->59 63->59 79 698af64 75->79 80 698af66-698af68 75->80 89 698af8b-698af91 76->89 90 698afa1-698afb2 76->90 77->78 85 698b1bb-698b296 call 69866b8 78->85 86 698b29c-698b2b1 78->86 79->76 80->76 85->86 86->54 91 698af93 89->91 92 698af95-698af97 89->92 97 698afca-698affb 90->97 98 698afb4-698afba 90->98 91->90 92->90 97->49 99 698afbc 98->99 100 698afbe-698afc0 98->100 99->97 100->97
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $q$$q$$q$$q$$q$$q$$q$$q
                                                                  • API String ID: 0-3886557441
                                                                  • Opcode ID: 3c5409ff9f2cb16b3366d61b9d646d426cae24bc58add37a75ece625b19b8eba
                                                                  • Instruction ID: 3b2926feaac3513e361cfc6e1f97c9490d0f83c6b750f7d511b19e60f00dc5bc
                                                                  • Opcode Fuzzy Hash: 3c5409ff9f2cb16b3366d61b9d646d426cae24bc58add37a75ece625b19b8eba
                                                                  • Instruction Fuzzy Hash: E2E17130E002198FDB64EF64D8806AEB7F6FF84300F24892AD415AB759DB35EC46CB91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 254 69699e1-69699e8 255 69699f1-6969a7f GetCurrentProcess 254->255 256 69699ea-69699f0 254->256 261 6969a81-6969a87 255->261 262 6969a88-6969abc GetCurrentThread 255->262 256->255 261->262 263 6969ac5-6969af9 GetCurrentProcess 262->263 264 6969abe-6969ac4 262->264 266 6969b02-6969b1d call 6969bc0 263->266 267 6969afb-6969b01 263->267 264->263 270 6969b23-6969b52 GetCurrentThreadId 266->270 267->266 271 6969b54-6969b5a 270->271 272 6969b5b-6969bbd 270->272 271->272
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 06969A6E
                                                                  • GetCurrentThread.KERNEL32 ref: 06969AAB
                                                                  • GetCurrentProcess.KERNEL32 ref: 06969AE8
                                                                  • GetCurrentThreadId.KERNEL32 ref: 06969B41
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: 18a4f7d26a369e3251d21c1ab541872ed85dd1bbc20e4b804d41cefbbfe6011f
                                                                  • Instruction ID: 75945fbf2e543b164a6cf3d901fb227880a08c8625b37d310a9b76ab295957d6
                                                                  • Opcode Fuzzy Hash: 18a4f7d26a369e3251d21c1ab541872ed85dd1bbc20e4b804d41cefbbfe6011f
                                                                  • Instruction Fuzzy Hash: 255186B0D0034ACFDB54DFAAD948B9EBBF1EF88314F248019E409AB2A0DB345945CF65

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 279 69699f0-6969a7f GetCurrentProcess 284 6969a81-6969a87 279->284 285 6969a88-6969abc GetCurrentThread 279->285 284->285 286 6969ac5-6969af9 GetCurrentProcess 285->286 287 6969abe-6969ac4 285->287 289 6969b02-6969b1d call 6969bc0 286->289 290 6969afb-6969b01 286->290 287->286 293 6969b23-6969b52 GetCurrentThreadId 289->293 290->289 294 6969b54-6969b5a 293->294 295 6969b5b-6969bbd 293->295 294->295
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 06969A6E
                                                                  • GetCurrentThread.KERNEL32 ref: 06969AAB
                                                                  • GetCurrentProcess.KERNEL32 ref: 06969AE8
                                                                  • GetCurrentThreadId.KERNEL32 ref: 06969B41
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: f4ab496a0eb1f20321899b61bd987c553aa155a34e29f6be62b77ade72ae1bfc
                                                                  • Instruction ID: 66fd27d44514d39e34ccdc86e8808f44772e2cf385bd361b71557b60cec1130a
                                                                  • Opcode Fuzzy Hash: f4ab496a0eb1f20321899b61bd987c553aa155a34e29f6be62b77ade72ae1bfc
                                                                  • Instruction Fuzzy Hash: 7B5156B0D0030A8FDB54DFAAD948BAEBBF1EF88314F248419E419A7760D7345945CF65

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 302 6989268-698928d 303 698928f-6989292 302->303 304 69892b8-69892bb 303->304 305 6989294-69892b3 303->305 306 6989b7b-6989b7d 304->306 307 69892c1-69892d6 304->307 305->304 308 6989b7f 306->308 309 6989b84-6989b87 306->309 313 69892d8-69892de 307->313 314 69892ee-6989304 307->314 308->309 309->303 312 6989b8d-6989b97 309->312 316 69892e0 313->316 317 69892e2-69892e4 313->317 319 698930f-6989311 314->319 316->314 317->314 320 6989329-698939a 319->320 321 6989313-6989319 319->321 332 698939c-69893bf 320->332 333 69893c6-69893e2 320->333 322 698931b 321->322 323 698931d-698931f 321->323 322->320 323->320 332->333 338 698940e-6989429 333->338 339 69893e4-6989407 333->339 344 698942b-698944d 338->344 345 6989454-698946f 338->345 339->338 344->345 350 698949a-69894a4 345->350 351 6989471-6989493 345->351 352 69894b4-698952e 350->352 353 69894a6-69894af 350->353 351->350 359 698957b-6989590 352->359 360 6989530-698954e 352->360 353->312 359->306 364 698956a-6989579 360->364 365 6989550-698955f 360->365 364->359 364->360 365->364
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $q$$q$$q$$q
                                                                  • API String ID: 0-4102054182
                                                                  • Opcode ID: 9f101b1d721534621d3c1bf014f9fdccd4140c812d7f8879579eeb2d7fa74c17
                                                                  • Instruction ID: 0062baf2f53d7d732d087ae1c623298a79918a18dfabea2222766d2008801602
                                                                  • Opcode Fuzzy Hash: 9f101b1d721534621d3c1bf014f9fdccd4140c812d7f8879579eeb2d7fa74c17
                                                                  • Instruction Fuzzy Hash: 62915B70F006199FDB64DB69D850BAEBBA6FFC8300F108569D819AB744EA74DD42CB90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 368 698d070-698d08b 369 698d08d-698d090 368->369 370 698d0d9-698d0dc 369->370 371 698d092-698d0a1 369->371 374 698d0de-698d120 370->374 375 698d125-698d128 370->375 372 698d0b0-698d0bc 371->372 373 698d0a3-698d0a8 371->373 376 698da8d-698dac6 372->376 377 698d0c2-698d0d4 372->377 373->372 374->375 378 698d12a-698d12c 375->378 379 698d137-698d13a 375->379 393 698dac8-698dacb 376->393 377->370 380 698d559 378->380 381 698d132 378->381 382 698d13c-698d141 379->382 383 698d144-698d147 379->383 388 698d55c-698d568 380->388 381->379 382->383 386 698d149-698d18b 383->386 387 698d190-698d193 383->387 386->387 390 698d1dc-698d1df 387->390 391 698d195-698d1d7 387->391 388->371 392 698d56e-698d85b 388->392 395 698d228-698d22b 390->395 396 698d1e1-698d223 390->396 391->390 581 698d861-698d867 392->581 582 698da82-698da8c 392->582 398 698dacd-698dae9 393->398 399 698daee-698daf1 393->399 405 698d22d-698d26f 395->405 406 698d274-698d277 395->406 396->395 398->399 402 698daf3-698db1f 399->402 403 698db24-698db27 399->403 402->403 409 698db29 call 698dbe5 403->409 410 698db36-698db38 403->410 405->406 411 698d279-698d288 406->411 412 698d2c0-698d2c3 406->412 431 698db2f-698db31 409->431 419 698db3a 410->419 420 698db3f-698db42 410->420 422 698d28a-698d28f 411->422 423 698d297-698d2a3 411->423 417 698d2d2-698d2d5 412->417 418 698d2c5-698d2c7 412->418 426 698d2f2-698d2f5 417->426 427 698d2d7-698d2ed 417->427 424 698d2cd 418->424 425 698d417-698d420 418->425 419->420 420->393 432 698db44-698db53 420->432 422->423 423->376 433 698d2a9-698d2bb 423->433 424->417 439 698d42f-698d43b 425->439 440 698d422-698d427 425->440 435 698d33e-698d341 426->435 436 698d2f7-698d339 426->436 427->426 431->410 451 698dbba-698dbcf 432->451 452 698db55-698dbb8 call 69866b8 432->452 433->412 446 698d343-698d35f 435->446 447 698d364-698d367 435->447 436->435 448 698d54c-698d551 439->448 449 698d441-698d455 439->449 440->439 446->447 447->388 456 698d36d-698d370 447->456 448->380 449->380 467 698d45b-698d46d 449->467 478 698dbd0 451->478 452->451 464 698d3b9-698d3bc 456->464 465 698d372-698d3b4 456->465 470 698d3be-698d400 464->470 471 698d405-698d407 464->471 465->464 489 698d46f-698d475 467->489 490 698d491-698d493 467->490 470->471 479 698d409 471->479 480 698d40e-698d411 471->480 478->478 479->480 480->369 480->425 491 698d479-698d485 489->491 492 698d477 489->492 499 698d49d-698d4a9 490->499 498 698d487-698d48f 491->498 492->498 498->499 510 698d4ab-698d4b5 499->510 511 698d4b7 499->511 514 698d4bc-698d4be 510->514 511->514 514->380 517 698d4c4-698d4e0 call 69866b8 514->517 526 698d4ef-698d4fb 517->526 527 698d4e2-698d4e7 517->527 526->448 529 698d4fd-698d54a 526->529 527->526 529->380 583 698d869-698d86e 581->583 584 698d876-698d87f 581->584 583->584 584->376 585 698d885-698d898 584->585 587 698d89e-698d8a4 585->587 588 698da72-698da7c 585->588 589 698d8b3-698d8bc 587->589 590 698d8a6-698d8ab 587->590 588->581 588->582 589->376 591 698d8c2-698d8e3 589->591 590->589 594 698d8f2-698d8fb 591->594 595 698d8e5-698d8ea 591->595 594->376 596 698d901-698d91e 594->596 595->594 596->588 599 698d924-698d92a 596->599 599->376 600 698d930-698d949 599->600 602 698d94f-698d976 600->602 603 698da65-698da6c 600->603 602->376 606 698d97c-698d986 602->606 603->588 603->599 606->376 607 698d98c-698d9a3 606->607 609 698d9b2-698d9cd 607->609 610 698d9a5-698d9b0 607->610 609->603 615 698d9d3-698d9ec call 69866b8 609->615 610->609 619 698d9fb-698da04 615->619 620 698d9ee-698d9f3 615->620 619->376 621 698da0a-698da5e 619->621 620->619 621->603
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $q$$q$$q
                                                                  • API String ID: 0-3067366958
                                                                  • Opcode ID: 7ac8e6c29bb2563637a8fcbb7dc38f2bdbafc8f16b9f8abfe530101101ee120b
                                                                  • Instruction ID: 30deac60c169c7e70ea517bcded6b1f1ec324bcd0a84bbde6e75402c0aca5ca6
                                                                  • Opcode Fuzzy Hash: 7ac8e6c29bb2563637a8fcbb7dc38f2bdbafc8f16b9f8abfe530101101ee120b
                                                                  • Instruction Fuzzy Hash: 46625D74A003168FDB65EF68D580A5EBBB2FF84314B248A68D0059F758DB35ED4ACB81

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 629 6984c80-6984ca4 630 6984ca6-6984ca9 629->630 631 6984cca-6984ccd 630->631 632 6984cab-6984cc5 630->632 633 69853ac-69853ae 631->633 634 6984cd3-6984dcb 631->634 632->631 635 69853b0 633->635 636 69853b5-69853b8 633->636 652 6984e4e-6984e55 634->652 653 6984dd1-6984e1e call 698552b 634->653 635->636 636->630 638 69853be-69853cb 636->638 654 6984ed9-6984ee2 652->654 655 6984e5b-6984ecb 652->655 666 6984e24-6984e40 653->666 654->638 672 6984ecd 655->672 673 6984ed6 655->673 669 6984e4b 666->669 670 6984e42 666->670 669->652 670->669 672->673 673->654
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fq$XPq$\Oq
                                                                  • API String ID: 0-132346853
                                                                  • Opcode ID: ed6151183cb7336cf37e372bce96ba60d852cc6b848d338b162c8bc58ac3858a
                                                                  • Instruction ID: d0b26b2de1ae80e850f6af4e3c7db29a461e64218241bfdcb9685bc7c9efcb64
                                                                  • Opcode Fuzzy Hash: ed6151183cb7336cf37e372bce96ba60d852cc6b848d338b162c8bc58ac3858a
                                                                  • Instruction Fuzzy Hash: 90617270F002199FEB549FA8C854BAEBBF6FF88700F248529D106AB395DB754C45CB90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1481 698a4c3-698a4c5 1482 698a457-698a458 1481->1482 1483 698a4c7-698a4f0 1481->1483 1484 698a45d-698a460 1482->1484 1485 698a4f2-698a4f5 1483->1485 1486 698a482-698a485 1484->1486 1487 698a462 1484->1487 1488 698a50c-698a50f 1485->1488 1489 698a4f7-698a505 1485->1489 1490 698a4a7-698a4a9 1486->1490 1491 698a487-698a4a2 1486->1491 1499 698a46e-698a47d 1487->1499 1492 698a51c-698a51f 1488->1492 1493 698a511-698a51b 1488->1493 1496 698a525-698a5be call 6982060 1489->1496 1500 698a507 1489->1500 1497 698a4ab 1490->1497 1498 698a4b0-698a4b3 1490->1498 1491->1490 1495 698a5cb-698a5ce 1492->1495 1492->1496 1502 698a5d0-698a5ec 1495->1502 1503 698a5f1-698a5f4 1495->1503 1509 698a5fa-698a627 call 6982060 1496->1509 1538 698a5c0-698a5ca 1496->1538 1497->1498 1504 698a438-698a43b 1498->1504 1505 698a4b5-698a4b9 1498->1505 1499->1486 1500->1488 1502->1503 1503->1509 1510 698a725-698a728 1503->1510 1504->1484 1507 698a43d-698a458 1504->1507 1507->1484 1533 698a71a-698a724 1509->1533 1534 698a62d-698a652 1509->1534 1513 698a748-698a74a 1510->1513 1514 698a72a-698a743 1510->1514 1518 698a74c 1513->1518 1519 698a751-698a754 1513->1519 1514->1513 1518->1519 1519->1485 1520 698a75a-698a763 1519->1520 1540 698a65c 1534->1540 1541 698a654-698a65a 1534->1541 1542 698a662-698a714 call 69866b8 call 6982060 1540->1542 1541->1542 1542->1533 1542->1534
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: X!@$x!@
                                                                  • API String ID: 0-2527372166
                                                                  • Opcode ID: 425958bb6d6661c5b9a40d9df33332a5952837ae4bbec0100bf6aad33f3527b4
                                                                  • Instruction ID: 2ee5c05e7e217078ba5f71f7c0c81f1be91ad1872b203092e4133507a4b7c89d
                                                                  • Opcode Fuzzy Hash: 425958bb6d6661c5b9a40d9df33332a5952837ae4bbec0100bf6aad33f3527b4
                                                                  • Instruction Fuzzy Hash: 37819E31F002159FDB54EFA8E850AADB7B6FB88310F20856AE506EB754DB35DC46CB80

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1612 698925b-6989262 1613 6989263-6989264 1612->1613 1613->1613 1614 6989266-698928d 1613->1614 1615 698928f-6989292 1614->1615 1616 69892b8-69892bb 1615->1616 1617 6989294-69892b3 1615->1617 1618 6989b7b-6989b7d 1616->1618 1619 69892c1-69892d6 1616->1619 1617->1616 1620 6989b7f 1618->1620 1621 6989b84-6989b87 1618->1621 1625 69892d8-69892de 1619->1625 1626 69892ee-6989304 1619->1626 1620->1621 1621->1615 1624 6989b8d-6989b97 1621->1624 1628 69892e0 1625->1628 1629 69892e2-69892e4 1625->1629 1631 698930f-6989311 1626->1631 1628->1626 1629->1626 1632 6989329-698939a 1631->1632 1633 6989313-6989319 1631->1633 1644 698939c-69893bf 1632->1644 1645 69893c6-69893e2 1632->1645 1634 698931b 1633->1634 1635 698931d-698931f 1633->1635 1634->1632 1635->1632 1644->1645 1650 698940e-6989429 1645->1650 1651 69893e4-6989407 1645->1651 1656 698942b-698944d 1650->1656 1657 6989454-698946f 1650->1657 1651->1650 1656->1657 1662 698949a-69894a4 1657->1662 1663 6989471-6989493 1657->1663 1664 69894b4-698952e 1662->1664 1665 69894a6-69894af 1662->1665 1663->1662 1671 698957b-6989590 1664->1671 1672 6989530-698954e 1664->1672 1665->1624 1671->1618 1676 698956a-6989579 1672->1676 1677 6989550-698955f 1672->1677 1676->1671 1676->1672 1677->1676
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $q$$q
                                                                  • API String ID: 0-3126353813
                                                                  • Opcode ID: 039c9a7cc3d90f572b23c49fd966c67b43aa6e7fbbd05b0e857a37fb1894043a
                                                                  • Instruction ID: 844610b5b25059b0c66b798867de69e3dec27e83a1ebb248d9d6607cf0229d77
                                                                  • Opcode Fuzzy Hash: 039c9a7cc3d90f572b23c49fd966c67b43aa6e7fbbd05b0e857a37fb1894043a
                                                                  • Instruction Fuzzy Hash: 98513E70B006159FDB64DB78E8A0B6E7BE6FBC8300F108569D819EB754EA34DC42CB91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1680 6984c71-6984ca4 1682 6984ca6-6984ca9 1680->1682 1683 6984cca-6984ccd 1682->1683 1684 6984cab-6984cc5 1682->1684 1685 69853ac-69853ae 1683->1685 1686 6984cd3-6984dcb 1683->1686 1684->1683 1687 69853b0 1685->1687 1688 69853b5-69853b8 1685->1688 1704 6984e4e-6984e55 1686->1704 1705 6984dd1-6984e1e call 698552b 1686->1705 1687->1688 1688->1682 1690 69853be-69853cb 1688->1690 1706 6984ed9-6984ee2 1704->1706 1707 6984e5b-6984ecb 1704->1707 1718 6984e24-6984e40 1705->1718 1706->1690 1724 6984ecd 1707->1724 1725 6984ed6 1707->1725 1721 6984e4b 1718->1721 1722 6984e42 1718->1722 1721->1704 1722->1721 1724->1725 1725->1706
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fq$XPq
                                                                  • API String ID: 0-3167736908
                                                                  • Opcode ID: d197bd6375f111bfeaa95d20dcd895f33479ae2fdb7081bb07fd6eeaf89b2a67
                                                                  • Instruction ID: 59f3ba72772988464e939221149685d45ea7da71f26557b72c3098a7aca44cdd
                                                                  • Opcode Fuzzy Hash: d197bd6375f111bfeaa95d20dcd895f33479ae2fdb7081bb07fd6eeaf89b2a67
                                                                  • Instruction Fuzzy Hash: 0A516070F002199FEB549BA9C815BAEBBF6FFC8700F248529D105AF3A5DA758C01CB90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1936 2edee90-2edeeab 1937 2edeead-2edeed4 1936->1937 1938 2edeed5-2edeeeb 1936->1938 1959 2edeeed call 2edef78 1938->1959 1960 2edeeed call 2edee90 1938->1960 1941 2edeef2-2edeef4 1942 2edeefa-2edef59 1941->1942 1943 2edeef6-2edeef9 1941->1943 1950 2edef5f-2edefec GlobalMemoryStatusEx 1942->1950 1951 2edef5b-2edef5e 1942->1951 1955 2edefee-2edeff4 1950->1955 1956 2edeff5-2edf01d 1950->1956 1955->1956 1959->1941 1960->1941
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2496921504.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_2ed0000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 65aacf72db221398c1e3b1cd4379522b921773bc5fb0aab4698554dea26f047a
                                                                  • Instruction ID: 68c1a5024cfc1e53ada0a28693171e4cb88a6b293b7b85f91b906110d9495799
                                                                  • Opcode Fuzzy Hash: 65aacf72db221398c1e3b1cd4379522b921773bc5fb0aab4698554dea26f047a
                                                                  • Instruction Fuzzy Hash: EA412671D0035A9FCB14DF6AD80879EBBF1EF89310F14856AE509AB241DB749846CBD0
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06965E4A
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: f766a2e3aae80eeb1cb7525c2527a5cb18ff5ea899e03f7edf7ec660f887d424
                                                                  • Instruction ID: ab46b111d5467c4a678df753b5d2831aa06347f67155308fc09417d17659c2ac
                                                                  • Opcode Fuzzy Hash: f766a2e3aae80eeb1cb7525c2527a5cb18ff5ea899e03f7edf7ec660f887d424
                                                                  • Instruction Fuzzy Hash: C551CFB1D00309AFDF15CF9AC884ADEBBB5FF88310F65812AE419AB250D7719845CF90
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06965E4A
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: 266fdf3b8cec48ea7446c667d3bf187eeafd6d1a25d9c68d39c04ca5f082e12a
                                                                  • Instruction ID: 9dd630fa81a13112c8af55de3895c07ced2674ec616430fbf9ce25b81474074b
                                                                  • Opcode Fuzzy Hash: 266fdf3b8cec48ea7446c667d3bf187eeafd6d1a25d9c68d39c04ca5f082e12a
                                                                  • Instruction Fuzzy Hash: E241CFB1D00309AFDF15CF9AC884ADEBBB5BF48310F25812AE819AB250D7759945CF90
                                                                  APIs
                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 0696AB89
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: CallProcWindow
                                                                  • String ID:
                                                                  • API String ID: 2714655100-0
                                                                  • Opcode ID: 8475af8e8e71acdd363520a251cbf710d53734b81be3a9342cf97ada8358beda
                                                                  • Instruction ID: 10448269db9f4b1aba9aa184c4a185ceff9c0faa82c16cda1b1cab4b7115395e
                                                                  • Opcode Fuzzy Hash: 8475af8e8e71acdd363520a251cbf710d53734b81be3a9342cf97ada8358beda
                                                                  • Instruction Fuzzy Hash: 0C412AB4D003498FDB54DF9AC888AAAFBF5FF88314F248459E519A7361D774A841CFA0
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: Clipboard
                                                                  • String ID:
                                                                  • API String ID: 220874293-0
                                                                  • Opcode ID: 0eeb6fba5a83a8825a57bdf6928ba2546760876e8217f677daa121f160388b61
                                                                  • Instruction ID: b095763ce108d44a8aa30358c3f9e81353e11dec028b1eee194911fadf98f318
                                                                  • Opcode Fuzzy Hash: 0eeb6fba5a83a8825a57bdf6928ba2546760876e8217f677daa121f160388b61
                                                                  • Instruction Fuzzy Hash: 0531F1B0D01309DFDB24DF9AC984B9EBBF5AF48304F248069E504AB294DB74A945CF55
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: Clipboard
                                                                  • String ID:
                                                                  • API String ID: 220874293-0
                                                                  • Opcode ID: df98cfe546f40c2448de5ceb88ca22d1393a98d9c8180ecb31016551e110cd2c
                                                                  • Instruction ID: e92eb0a51ce08b36bc8225c9edc0da75f68574388d82569131f4cee9edc36f34
                                                                  • Opcode Fuzzy Hash: df98cfe546f40c2448de5ceb88ca22d1393a98d9c8180ecb31016551e110cd2c
                                                                  • Instruction Fuzzy Hash: 8231F1B0D01309DFDB24DF9AC984BDEBBF5AF48304F248069E404AB294DB74A945CF55
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06969CBF
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: d3b4ea19b4b44add7bb8a2a38cb90d69e16990d47870b9f86881e3e4bb60bffc
                                                                  • Instruction ID: 385cb4759c1fa3bae52a2ae8eb2e70493cb264b2786924dfa58d2a26f47aed25
                                                                  • Opcode Fuzzy Hash: d3b4ea19b4b44add7bb8a2a38cb90d69e16990d47870b9f86881e3e4bb60bffc
                                                                  • Instruction Fuzzy Hash: 512100B5D00349DFDB10CFAAD984AEEBFF4EB48320F14841AE959A3250C378A955CF61
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06969CBF
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: ea76aa1efc881c605404060fdcdee3a239da534f32af2e1a28d029aa6a15d686
                                                                  • Instruction ID: d3296291d014e3cf783d6512449ffa1ecbfa4f505466b4fe162b1e6853993e37
                                                                  • Opcode Fuzzy Hash: ea76aa1efc881c605404060fdcdee3a239da534f32af2e1a28d029aa6a15d686
                                                                  • Instruction Fuzzy Hash: FB21E4B5D003499FDB10CF9AD984ADEBFF8EB48320F14841AE919A3350D378A945CF65
                                                                  APIs
                                                                  • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0696D3CB
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: HookWindows
                                                                  • String ID:
                                                                  • API String ID: 2559412058-0
                                                                  • Opcode ID: 24ecf2214e95d0df526be12d63ca5cfeffd7b1dbfca1e0b2234f9e8cd68f2fd4
                                                                  • Instruction ID: 358b26264062c6430bd545ab456aa6f065a71a83a339a0c875b03870db5d1ea4
                                                                  • Opcode Fuzzy Hash: 24ecf2214e95d0df526be12d63ca5cfeffd7b1dbfca1e0b2234f9e8cd68f2fd4
                                                                  • Instruction Fuzzy Hash: 06213575D002099FDB14DF9AC844BEEBBF5EF88310F10842AE429A7250C775A944CFA1
                                                                  APIs
                                                                  • DeleteFileW.KERNEL32(00000000), ref: 02ED80B0
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2496921504.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_2ed0000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: DeleteFile
                                                                  • String ID:
                                                                  • API String ID: 4033686569-0
                                                                  • Opcode ID: 257e6ca4ec999b2da9b599702114268728b18188235b693543d1eb3f626dd672
                                                                  • Instruction ID: 74238f17270701b9ff68fb99b02ede00e1e025b94bb7113239812deba863d807
                                                                  • Opcode Fuzzy Hash: 257e6ca4ec999b2da9b599702114268728b18188235b693543d1eb3f626dd672
                                                                  • Instruction Fuzzy Hash: 352149B1C006598BDB20CFAAC445BEEFBB0AB48320F148219D858A7340D775A946CFA1
                                                                  APIs
                                                                  • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,0696ADD5), ref: 0696AE5F
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: CallbackDispatcherUser
                                                                  • String ID:
                                                                  • API String ID: 2492992576-0
                                                                  • Opcode ID: cc5584c597004923d767183a2252c97b0b7298969efaed0e5351537a8981896f
                                                                  • Instruction ID: 369557615abdbb8e11f60c5c6485163a552922da89c64f8b202748870bc91c39
                                                                  • Opcode Fuzzy Hash: cc5584c597004923d767183a2252c97b0b7298969efaed0e5351537a8981896f
                                                                  • Instruction Fuzzy Hash: A1116AB5C003499FCB21DF9AD845BDEFBF8EB49325F20845AE518A3650C374A945CFA1
                                                                  APIs
                                                                  • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0696D3CB
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: HookWindows
                                                                  • String ID:
                                                                  • API String ID: 2559412058-0
                                                                  • Opcode ID: 5bd87f7c2117718948eee03a2a090cdb0b7ce49a0051118f85693db12b98502c
                                                                  • Instruction ID: 3e759c31a62b7b0374cc1396c5c849a13a3f26aeac43bcda1ec5d68e82c1df58
                                                                  • Opcode Fuzzy Hash: 5bd87f7c2117718948eee03a2a090cdb0b7ce49a0051118f85693db12b98502c
                                                                  • Instruction Fuzzy Hash: 00211371D002098FDB14DF9AC844BEEBBF5AF88310F10842AE429A7290C775A945CFA1
                                                                  APIs
                                                                  • DeleteFileW.KERNEL32(00000000), ref: 02ED80B0
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2496921504.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_2ed0000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: DeleteFile
                                                                  • String ID:
                                                                  • API String ID: 4033686569-0
                                                                  • Opcode ID: 3dcac95f2039fadcaef86f8427155670aebab1b9dae3fe6dbf0104bde2e9b2fb
                                                                  • Instruction ID: e2a377c1f823dadb525a57b529f0d944a5051c5c5d9b129426be8b7f1397234b
                                                                  • Opcode Fuzzy Hash: 3dcac95f2039fadcaef86f8427155670aebab1b9dae3fe6dbf0104bde2e9b2fb
                                                                  • Instruction Fuzzy Hash: DB1138B1C0061A9BDB20DF9AC545B9EFBB4BB48320F148229D818A7240D778A945CFA5
                                                                  APIs
                                                                  • GlobalMemoryStatusEx.KERNEL32 ref: 02EDEFDF
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2496921504.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_2ed0000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: GlobalMemoryStatus
                                                                  • String ID:
                                                                  • API String ID: 1890195054-0
                                                                  • Opcode ID: b31308bfc6a961553a474739fe7ca330f369006ec3a8e05a63dbafb7a3e01c17
                                                                  • Instruction ID: ac0937665150fae2614424dea8356fffcf2f904a23bbdc21723ba2fcaf8c63ea
                                                                  • Opcode Fuzzy Hash: b31308bfc6a961553a474739fe7ca330f369006ec3a8e05a63dbafb7a3e01c17
                                                                  • Instruction Fuzzy Hash: 281123B1C0065A9BCB20DF9AC545BDEFBF4AF48320F14812AE818A7240D778A945CFA5
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 06964CF6
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: 1fe1c889c2dff68a3489f3fb35f8471424a07b18860ab346049a0400bc7e47d8
                                                                  • Instruction ID: 1a19ee0ed8d15e4edeaa9c73df75131315042ea697f580d2d3d57f922f536717
                                                                  • Opcode Fuzzy Hash: 1fe1c889c2dff68a3489f3fb35f8471424a07b18860ab346049a0400bc7e47d8
                                                                  • Instruction Fuzzy Hash: DF11EFB5C007498BDB20DF9AD844AEEBBF4EB49610F10842AE929A7610C379A545CFA5
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 06964CF6
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: d6aef0eae78506edd4cffa664ac3a3721349557aafa0b4dc2d97633294ed1a04
                                                                  • Instruction ID: 859c0bf0e0d9fdd97925a350014d5a26b86eda32bc0620f90b46645f28dd9d95
                                                                  • Opcode Fuzzy Hash: d6aef0eae78506edd4cffa664ac3a3721349557aafa0b4dc2d97633294ed1a04
                                                                  • Instruction Fuzzy Hash: 151102B5C003498FCB20DF9AC844ADEFBF4EB49610F10841AD869A7710C379A546CFA1
                                                                  APIs
                                                                  • OleInitialize.OLE32(00000000), ref: 0696B71D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize
                                                                  • String ID:
                                                                  • API String ID: 2538663250-0
                                                                  • Opcode ID: b2c9ae5f174a51aba6fa693ad03121993eb3a4513fc9bd6cf57e23be8e9b5cd4
                                                                  • Instruction ID: e05beb92db97ad3d0be354ddfbef7d5f7ebf1e3b0837229aaa7f75171f24eb43
                                                                  • Opcode Fuzzy Hash: b2c9ae5f174a51aba6fa693ad03121993eb3a4513fc9bd6cf57e23be8e9b5cd4
                                                                  • Instruction Fuzzy Hash: 021145B4C003488FCB20DF9AD849BDEBFF8EB48320F248419E518A7600C735A545CFA5
                                                                  APIs
                                                                  • OleInitialize.OLE32(00000000), ref: 0696B71D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize
                                                                  • String ID:
                                                                  • API String ID: 2538663250-0
                                                                  • Opcode ID: 739060c542ae12c501c93151ba7590c5e2f469def2af3131013d317cce125a2d
                                                                  • Instruction ID: 4671d1ed79250b67d9fd030f6ab384ca2b82be378ad9630d2a4a82212cf276c6
                                                                  • Opcode Fuzzy Hash: 739060c542ae12c501c93151ba7590c5e2f469def2af3131013d317cce125a2d
                                                                  • Instruction Fuzzy Hash: CE1145B5C003488FCB20DF9AC845B9EBBF8EB48320F208419E559A7710D339A945CFA6
                                                                  APIs
                                                                  • OleInitialize.OLE32(00000000), ref: 0696B71D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize
                                                                  • String ID:
                                                                  • API String ID: 2538663250-0
                                                                  • Opcode ID: c223b9e11b96e28ef29334a2c71521f637c9603c0ed49d33756be9ba427761c3
                                                                  • Instruction ID: 3643a397f934909c06f219f47960bd8e007319b4904adf0601f6cc0402fe95dd
                                                                  • Opcode Fuzzy Hash: c223b9e11b96e28ef29334a2c71521f637c9603c0ed49d33756be9ba427761c3
                                                                  • Instruction Fuzzy Hash: 991145B4C003088FCB20DF9AC444B9EBBF4EB48320F208419E519A7650D375A945CFA5
                                                                  APIs
                                                                  • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,0696ADD5), ref: 0696AE5F
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID: CallbackDispatcherUser
                                                                  • String ID:
                                                                  • API String ID: 2492992576-0
                                                                  • Opcode ID: 172e62d2d06081cdb0c1656bf0c122960755e74b8f2cfc8c48c4d3ea2f1510fe
                                                                  • Instruction ID: 83e8f7390e3fbed9b9da361495237f5bc3d3b04f47dcf28dc8fb8fd8ada59da9
                                                                  • Opcode Fuzzy Hash: 172e62d2d06081cdb0c1656bf0c122960755e74b8f2cfc8c48c4d3ea2f1510fe
                                                                  • Instruction Fuzzy Hash: CA1133B0C003498FCB20DF9AC848BAEBBF4EB48320F208419E919B3240C374A944CFA5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: PHq
                                                                  • API String ID: 0-3820536768
                                                                  • Opcode ID: fb5d0ed54e6cae66537376195514c5f4d43232f2f9206dad79051a20438ad394
                                                                  • Instruction ID: 75aef1abb5f54a62dbddfc964c2434964f58516dfd2804274b2a9f189353e1ae
                                                                  • Opcode Fuzzy Hash: fb5d0ed54e6cae66537376195514c5f4d43232f2f9206dad79051a20438ad394
                                                                  • Instruction Fuzzy Hash: 7641C530E0070A9FDF64EF65C8546AEBBB6FF85300F204529E415DB681DB70E84ACB81
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: PHq
                                                                  • API String ID: 0-3820536768
                                                                  • Opcode ID: 61ba4be0ae885b96095a1cb627c5d76fb1b0a752f5f1fb0e468f07ed97afdeab
                                                                  • Instruction ID: 8714b9c2bbec4b351380286a4a0ac43a94ba0f72638f3f40a1046ef0a68588ec
                                                                  • Opcode Fuzzy Hash: 61ba4be0ae885b96095a1cb627c5d76fb1b0a752f5f1fb0e468f07ed97afdeab
                                                                  • Instruction Fuzzy Hash: 96310D30B002028FDB69AF38C56466E3BE2BF89310B684569D402DB7A4DF38DD06C7D0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: PHq
                                                                  • API String ID: 0-3820536768
                                                                  • Opcode ID: 09c262fd081f8d0a7d2ff18115eb2cd718657970a38a2d8adee61b3db2c5b7c1
                                                                  • Instruction ID: 309d21a22b1eceb09e21a429725f7e739eff303f4c0b9e9b48a8f02a4ab5ca39
                                                                  • Opcode Fuzzy Hash: 09c262fd081f8d0a7d2ff18115eb2cd718657970a38a2d8adee61b3db2c5b7c1
                                                                  • Instruction Fuzzy Hash: 7E31EB30B002058FDBA8AB78C86466E3BE7BBC9610B644539D406DB394DE39ED06C7D1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $q
                                                                  • API String ID: 0-1301096350
                                                                  • Opcode ID: f25f06117f644c536015c66ee6060cad40131d4b1a54d5c42f72817a6e5413fe
                                                                  • Instruction ID: 741575e790a8e54cb3dd8babaf9883c2a7173c8dca95b6bfa1b704b64f97541f
                                                                  • Opcode Fuzzy Hash: f25f06117f644c536015c66ee6060cad40131d4b1a54d5c42f72817a6e5413fe
                                                                  • Instruction Fuzzy Hash: 29F0D132F002119FEF64AE64BB40268776DEBC0350FA44575D904EB951C739DD05CBA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: \Oq
                                                                  • API String ID: 0-643489707
                                                                  • Opcode ID: 53d2b41eab5462233b54e16c0502cc0875fcd4c9816407a5c7a645abf1eef6d5
                                                                  • Instruction ID: f4ade535e0835895a81f977d0cdc3ef66d2832d7c803b366184345352a3d035d
                                                                  • Opcode Fuzzy Hash: 53d2b41eab5462233b54e16c0502cc0875fcd4c9816407a5c7a645abf1eef6d5
                                                                  • Instruction Fuzzy Hash: FEF09E30A5422ADFDB54DF95E959BAE7BB2FF84704F200519E402A7694CB745C45CBC0
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9e71ac94241f7a2d12298679d5f0bc813722d9a23026d4ee27b48f8bae4ea23d
                                                                  • Instruction ID: 8a3d4d777f71d3aa1e9d9e9d35244ee94ecbe81c7515241577f071bf356f4e03
                                                                  • Opcode Fuzzy Hash: 9e71ac94241f7a2d12298679d5f0bc813722d9a23026d4ee27b48f8bae4ea23d
                                                                  • Instruction Fuzzy Hash: 72324074E00209DFDB64EF68D990AADB7B6FB88310F208525D405EB755DB39EC42CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bcefa2c880409ff1ff8b1da4d0bab9190bd42087701d509e5cd95381a9a85ac7
                                                                  • Instruction ID: 29a272fc3695c4b7ba7042e70ca5b699fc49acd04612be51b1ac5d7e0fb55eac
                                                                  • Opcode Fuzzy Hash: bcefa2c880409ff1ff8b1da4d0bab9190bd42087701d509e5cd95381a9a85ac7
                                                                  • Instruction Fuzzy Hash: CF224134E102098FEF64EB68D4907ADB7B6FB85310F38842AE415EBB99DA35DC41CB51
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b84ee7dda35fbfb583e55d9cd4add1bc66a92a3190d6ca5ef7f4777b0f860c4a
                                                                  • Instruction ID: eb9245773781e32514cf3bb0caf863373d995b5dfcbbdb60384639d9a8460ccc
                                                                  • Opcode Fuzzy Hash: b84ee7dda35fbfb583e55d9cd4add1bc66a92a3190d6ca5ef7f4777b0f860c4a
                                                                  • Instruction Fuzzy Hash: 2B61B671F001214FDF54AA7DD84065EBADBAFC4210B29443AD80AEB364DEB5ED4287C2
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9eea06f6ba928731eeabdc6637a41ecde20fce3fa449490b4bc60a9004b65c3e
                                                                  • Instruction ID: 25a9324ff5f8f2ba9bf9ffb7b18dc191da8422e5509a45957ac7d032544e6162
                                                                  • Opcode Fuzzy Hash: 9eea06f6ba928731eeabdc6637a41ecde20fce3fa449490b4bc60a9004b65c3e
                                                                  • Instruction Fuzzy Hash: 49813C70B006099FDB54EFB9D4507AEBBE6BF89300F248529D50AEB794DA34DC42CB91
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a88f67472d586c33e1914dce79bab4133179ca248e4b820c4644ed16d7b0da4c
                                                                  • Instruction ID: aae7f950d55443a87cd36c4d4d69de9f6062196d51efd4d1b76ab72214703b7d
                                                                  • Opcode Fuzzy Hash: a88f67472d586c33e1914dce79bab4133179ca248e4b820c4644ed16d7b0da4c
                                                                  • Instruction Fuzzy Hash: 87915E34E0021A8FDF60DF68C880B9DB7B1FF89300F208699D549BB655DB71A986CF91
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e786068035481b97d9684c6c1bfa8788fa59ceb8b0b255b7638a19a3b3395863
                                                                  • Instruction ID: b54c7a333d2258e2cad48770ff06928b8dc306069d6e91be7f44d74d1853ac35
                                                                  • Opcode Fuzzy Hash: e786068035481b97d9684c6c1bfa8788fa59ceb8b0b255b7638a19a3b3395863
                                                                  • Instruction Fuzzy Hash: 18912D34E1021A8FDF60DF68C880B9DB7B1FF89710F208699D549BB254DB71AA85CF90
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 71f4e94e06aceaa7ecc9a090f1a52623bbba62c95d227f55eeff5c5de6fc5f85
                                                                  • Instruction ID: f0966358cba20c40bf3a9bc027a618824b935e41b2cf66e72bd65aa5ed053fa6
                                                                  • Opcode Fuzzy Hash: 71f4e94e06aceaa7ecc9a090f1a52623bbba62c95d227f55eeff5c5de6fc5f85
                                                                  • Instruction Fuzzy Hash: 0B713B74A002099FDB54EFA8D980AAEBBF6FF84340F249529D405EB765DB34EC46CB50
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 62134f98461a2110920baf2b4c1fe9068d2a0fdd1f8cf2bdf0c7d86696a6995c
                                                                  • Instruction ID: d1b5d379c8e07534c98845a4a425222a633d58fd1ef09018066422d73fbc4424
                                                                  • Opcode Fuzzy Hash: 62134f98461a2110920baf2b4c1fe9068d2a0fdd1f8cf2bdf0c7d86696a6995c
                                                                  • Instruction Fuzzy Hash: F3713874E002099FDB54EFA8D980AAEBBF6FF88340F249529D405EB754DA34EC46CB50
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2381f90ebc8b9409699b57b37dd44651d5b3471b909b3a34caf17cdc6e2bd52d
                                                                  • Instruction ID: 35af808236e51cb4bff573c1bdb84c21d89f49d6b96ff501308eaf60790f4389
                                                                  • Opcode Fuzzy Hash: 2381f90ebc8b9409699b57b37dd44651d5b3471b909b3a34caf17cdc6e2bd52d
                                                                  • Instruction Fuzzy Hash: 4851DF31E00105DFDF64EF78E4446ADBBB6FB84365F20887AE11ADB692DB358855CB80
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ece162c71e034efbe4c773867455655f37679bad40b5f73b3e72d83604db1f66
                                                                  • Instruction ID: 26068ea7e5d5a66e824a81a1513e1e86480a5f11f40112773c4d64ce3674f3ea
                                                                  • Opcode Fuzzy Hash: ece162c71e034efbe4c773867455655f37679bad40b5f73b3e72d83604db1f66
                                                                  • Instruction Fuzzy Hash: E751B2B4F202044FEFB0AA78D854B2F2A5AD7C9391F30443AE40AD7795DA3DDC429392
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1792c881b16421d90d746a16c02dc424716f4a3de4a675f0c071ea4061ebe0e0
                                                                  • Instruction ID: 7ac69e570d2bd3fc25d377e10e96c7806c8914001f6e128a99363ba8fb8e5d2d
                                                                  • Opcode Fuzzy Hash: 1792c881b16421d90d746a16c02dc424716f4a3de4a675f0c071ea4061ebe0e0
                                                                  • Instruction Fuzzy Hash: 505182B4F102044FEFA4AA78D954B2F265ED7C9391F20443AE40AD7795DA3CDC429391
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 37f59c7a589160c1d08c26a82cd25eba56da2d633623fd2fc658eda11a2a3f34
                                                                  • Instruction ID: 7ae7e1d6bfe1fbfa66159e970dda97a62dae123bb22cc30be97711342713bd14
                                                                  • Opcode Fuzzy Hash: 37f59c7a589160c1d08c26a82cd25eba56da2d633623fd2fc658eda11a2a3f34
                                                                  • Instruction Fuzzy Hash: 98415E71E003098FDFB0DE99D880AAFF7B6EB85210F21492AE156D7A50D630E949CB91
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e8c6e9ccaa5befa3a3f66e38fdc9b5ffd9e2794ddb2b5a88f10e138e86d352f7
                                                                  • Instruction ID: 25a5719dfcbd92b7c65f32e96bc98a20c4aef04c4613222e1be849ea40c5e90d
                                                                  • Opcode Fuzzy Hash: e8c6e9ccaa5befa3a3f66e38fdc9b5ffd9e2794ddb2b5a88f10e138e86d352f7
                                                                  • Instruction Fuzzy Hash: AA31A430E1071A9FDB25EF68C88069EBBB6FF85310F204529E405EF644DB71E94ACB81
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c02971580b694e263130e8c67926c7c3108eba4bb23df4d7573b894f0cda6572
                                                                  • Instruction ID: b15a7930c841ef8320c42b9ebdfb35defb9678a8aceb5e94372597aa922c5b94
                                                                  • Opcode Fuzzy Hash: c02971580b694e263130e8c67926c7c3108eba4bb23df4d7573b894f0cda6572
                                                                  • Instruction Fuzzy Hash: D1316F30E106059FCB59DFA4D854A9EB7F6FF89310F208529E906E7650DB31ED42CB90
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4b806fe9c0fc2cdd0183ce18eee8824e5054f3591b25772422e763ad0b8a2785
                                                                  • Instruction ID: a02f3a1a37fae3899e236df1a055d947f80fe0abb4376de6e667278d7b7d1634
                                                                  • Opcode Fuzzy Hash: 4b806fe9c0fc2cdd0183ce18eee8824e5054f3591b25772422e763ad0b8a2785
                                                                  • Instruction Fuzzy Hash: F4314B30E106059FCB59DFA4D854A9EB7B6FF89300F208529E906EB750EB71ED42CB90
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 50631875478d0b4041f0afda03a209316e2de9daa4119f8b6c106024af181293
                                                                  • Instruction ID: a32c6b4f3179ba12465f892fadac4500d07a38738cf350473f0134bafed8ec9e
                                                                  • Opcode Fuzzy Hash: 50631875478d0b4041f0afda03a209316e2de9daa4119f8b6c106024af181293
                                                                  • Instruction Fuzzy Hash: 55318BB1C09399AFCB01EFA9C884ADEFFB4FF0A310F14815AD448AB252C3345915CBA5
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 80e1d5b9a01d92305ce9633b8316907a6bec435da336fd764bd81f46cd664a89
                                                                  • Instruction ID: 1f2145ec96fad523dfa5008d1959f056238f987816fb00ff895a6c1dd84cea83
                                                                  • Opcode Fuzzy Hash: 80e1d5b9a01d92305ce9633b8316907a6bec435da336fd764bd81f46cd664a89
                                                                  • Instruction Fuzzy Hash: E2214876E01219AFDB50DFA9D840AAEBBFAFB48710F108025E905E7350E739DC41CB91
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 89947a68d57f85015ff6fc6447dc7aa93f152921e9089ae0d563b703901b458b
                                                                  • Instruction ID: e66d8a23e815eacca10e1e83972fd424c53b5ee8a9d0b9e6e2154be351149b94
                                                                  • Opcode Fuzzy Hash: 89947a68d57f85015ff6fc6447dc7aa93f152921e9089ae0d563b703901b458b
                                                                  • Instruction Fuzzy Hash: 2021D330F001115FDBA4EABCE85076E77E6EBCA310F20457AE20ADBA51DA29DC02C781
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2ee2cc9731d57a136f832a35fcddf05b12e20e1124c98821f9f8f4886f24e193
                                                                  • Instruction ID: dfa6b3365cbaf38002173a1d389cfea202a222ec5e8f6fb4ecfa95075ea15900
                                                                  • Opcode Fuzzy Hash: 2ee2cc9731d57a136f832a35fcddf05b12e20e1124c98821f9f8f4886f24e193
                                                                  • Instruction Fuzzy Hash: 54215A75E002199FDB50DFA9D940BAEBBF5FB48710F108029E905E7350E639DD40CB90
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2496469499.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_155d000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 36689b0f483eefb8306b2ded44a2af620a74df95d4af2c9c287c5502e6f1b15d
                                                                  • Instruction ID: 6c5b00eb1c999107a7fe36512c6781255f0617274af054d513eef42355933752
                                                                  • Opcode Fuzzy Hash: 36689b0f483eefb8306b2ded44a2af620a74df95d4af2c9c287c5502e6f1b15d
                                                                  • Instruction Fuzzy Hash: 13210076604200DFDB55DF54D990B2ABBB1FB84314F20C96EDC0A4E2A2D33AD847CA62
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2496469499.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_155d000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 83b92ebab608ca221b9a6a698915dd1ddbd836a932ad615b50329cc67e87ee28
                                                                  • Instruction ID: b2346a9771e7bd11c828fc245ae2aa319eae237782c100f775f5cf4b63e0ae18
                                                                  • Opcode Fuzzy Hash: 83b92ebab608ca221b9a6a698915dd1ddbd836a932ad615b50329cc67e87ee28
                                                                  • Instruction Fuzzy Hash: 6B21F272604304DFDB45DF54D9D0B2ABBB5FB84214F20C56EDC094F252C336D846CA62
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: da97dcb0e4c8ca3840cd6fc7ce544668245bf0e65d6a2f4abe739c1074ad58f4
                                                                  • Instruction ID: cddef09a5e10b3d29ea0fa26cbf40e9986606b475b6e074c17e9cc4d1d2c44fd
                                                                  • Opcode Fuzzy Hash: da97dcb0e4c8ca3840cd6fc7ce544668245bf0e65d6a2f4abe739c1074ad58f4
                                                                  • Instruction Fuzzy Hash: 9A219D31B101189FDF94EAA9ED506AEBBA7EBC4350F248529E405EB741DA34ED51CB80
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5728a053d2858c46514947a9f77c3c72b3b19e5fc84ff98a7aebd76e0e731669
                                                                  • Instruction ID: d9939f5cd836333a18d9f061778ba7c5023345d8a7dfda39e1a07ac7ca403dc5
                                                                  • Opcode Fuzzy Hash: 5728a053d2858c46514947a9f77c3c72b3b19e5fc84ff98a7aebd76e0e731669
                                                                  • Instruction Fuzzy Hash: 0C112234B002210FCB65967C8840B5FBBEADFCA610F20852EF18ACB795D925CC028791
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 86024f966ca25cbb0c442272ab8fe9795734d4e83dab7a93b3947593b02f9aae
                                                                  • Instruction ID: e6dca9bbacd3297551f86bee72812a38812de0dfcbf7a0177da081d9551be63a
                                                                  • Opcode Fuzzy Hash: 86024f966ca25cbb0c442272ab8fe9795734d4e83dab7a93b3947593b02f9aae
                                                                  • Instruction Fuzzy Hash: 4B118E31B001255FDB94EA68CC20AAE7BEAEBD8710F148439C506E7384EE24DC1287D1
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 549b9dee57f4aaa306497587ada5f39b4d7e7e5703dc81ff68a02f55d608ce5c
                                                                  • Instruction ID: e2a0fa200be09ccc3c71a9d24e95ba94ab99516fedbfd04cb111fe01c44a73ff
                                                                  • Opcode Fuzzy Hash: 549b9dee57f4aaa306497587ada5f39b4d7e7e5703dc81ff68a02f55d608ce5c
                                                                  • Instruction Fuzzy Hash: 7011C671E003185FDB54EBB9C8416DEFBB5EF89710F14456AD509EB600EA31D940CBD0
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f1d31b9599beba9f67e44264c8f8882d4f3c4ac6fac96b8890a02b53cd9b9f9f
                                                                  • Instruction ID: 462a643bd293a9d7a6b5f685a2204751d33f7fb94c01381ce5db3fab570502d8
                                                                  • Opcode Fuzzy Hash: f1d31b9599beba9f67e44264c8f8882d4f3c4ac6fac96b8890a02b53cd9b9f9f
                                                                  • Instruction Fuzzy Hash: 8721F2B1D01319AFCB10DF9AD884ADEFBB8FB48310F50812AE918B7240C374A954CFA5
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 010c8c004011978016727b5a73dac4c5377e4479adb046421e0f70c11a23a8db
                                                                  • Instruction ID: 2a062a998bd9ed73ddc3c5ced05bc8ea90b2c0b93a4b0a38b4563784a7efa357
                                                                  • Opcode Fuzzy Hash: 010c8c004011978016727b5a73dac4c5377e4479adb046421e0f70c11a23a8db
                                                                  • Instruction Fuzzy Hash: 5E01B132B100195FDB949A69DC216EF7BEEEBC8711F144135D505E7284DA249C1187D1
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2496469499.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_155d000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                                  • Instruction ID: b6b0a7c06abee9e990ad8811d85c32f7ea188075103bacbd84a0042141b0ceff
                                                                  • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                                  • Instruction Fuzzy Hash: 8D11AC76504280CFCB16DF54D590B19BB71FB84314F24C6AADC494B666C33AD44ACB61
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 62707224e04b7491bb27de1e1c44aedebf0b3793932666f94b80f96dda9c6201
                                                                  • Instruction ID: 78e2a76223038674acedfdcda7d98e7f389ae89f2545a4224a8b6dccce6e5274
                                                                  • Opcode Fuzzy Hash: 62707224e04b7491bb27de1e1c44aedebf0b3793932666f94b80f96dda9c6201
                                                                  • Instruction Fuzzy Hash: DD01F135B141500FCBB1A67C949076EABD6EBC9354F24886AE00ACBA40D956CC038782
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 906b89fc7753037b7722fd52b691f079fad3aa9dc363ddaa6c9d24f51d1a3b9b
                                                                  • Instruction ID: 94298f283dac4a1594f0a526237a1d113abf4b9bbecfeaa79cadf4943430d828
                                                                  • Opcode Fuzzy Hash: 906b89fc7753037b7722fd52b691f079fad3aa9dc363ddaa6c9d24f51d1a3b9b
                                                                  • Instruction Fuzzy Hash: B82103B1D01219DFCB10DF9AD885ADEFBB4FB48310F10822AE518A7240C374AA54CFA5
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2496469499.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_155d000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2e9cca0ddad5a86085491794687953ae07ced3ba403328ac5bf8e948dc3c1e61
                                                                  • Instruction ID: 697a2861974c9a707ec7ad72dcbfe1f4b5e6b06c0b1d938b8c1c2f21591726c4
                                                                  • Opcode Fuzzy Hash: 2e9cca0ddad5a86085491794687953ae07ced3ba403328ac5bf8e948dc3c1e61
                                                                  • Instruction Fuzzy Hash: 7911AC765042848FDB06CF14C5D0B19BF72FB84214F24C6AAD8494B652C33AD44ACB51
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c434c6f966495754ea666bc19e1c9e19a1cda95ef9ca221fe91573e5486547cf
                                                                  • Instruction ID: e7b0857e9dc99e57ba5c12f2eba147d65c75d41c82bc82bd248a27bd2ea07281
                                                                  • Opcode Fuzzy Hash: c434c6f966495754ea666bc19e1c9e19a1cda95ef9ca221fe91573e5486547cf
                                                                  • Instruction Fuzzy Hash: 9E018131B101210FDBA4A66D9554B2FB2DBEFC9B10F20843EE10EC7B94DD66DC028791
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 743e5111619c46b2ed53976a1dc2661f7f3327d5520c198240922d0008cff7ee
                                                                  • Instruction ID: d26decd38cf60f0ad44338504f328a0239b65277bde84f622e85945420417a70
                                                                  • Opcode Fuzzy Hash: 743e5111619c46b2ed53976a1dc2661f7f3327d5520c198240922d0008cff7ee
                                                                  • Instruction Fuzzy Hash: B7018135F101140FDBA5A57DD45072FB2DAEBC97A4F20893AE10AC7744DE65DC038781
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4441021781f69f8c11714ba0e1bcfa6d865b0a64ae2ea1ccfe9f00c277e34b23
                                                                  • Instruction ID: 58122917a72f9ad7b9350dd97709c79bcaeef0cfe6447c9ae4781b9ba133f0db
                                                                  • Opcode Fuzzy Hash: 4441021781f69f8c11714ba0e1bcfa6d865b0a64ae2ea1ccfe9f00c277e34b23
                                                                  • Instruction Fuzzy Hash: 26018630B101145FDB64EA7DE854B2B73DAEBC9314F608539E10ED7754DE2ADC018780
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ba0b89f9115a46cf8089593e12b5ae77429119bd2b7216bc424d9d1d3a89dc52
                                                                  • Instruction ID: 2214e2d85de2e905c2b21f6aa7af19de0fb987ac004e0dbaf811cbc94f2a2fb6
                                                                  • Opcode Fuzzy Hash: ba0b89f9115a46cf8089593e12b5ae77429119bd2b7216bc424d9d1d3a89dc52
                                                                  • Instruction Fuzzy Hash: 7EE09270D153486FDF60EBB4D90575A7BAD9742208F6044A6D804CF60AF679C941C791
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $q$$q$$q$$q$$q$$q$$q$$q$$q$$q
                                                                  • API String ID: 0-1298971921
                                                                  • Opcode ID: 0b16f26548ee8f6de66faf4dc811f7764edc0e6b88883aef8785bee78dd5fa60
                                                                  • Instruction ID: 82ed2d63803c7119cc74beb8ed735ef2359615ac0d970cc3d1deffe69ade10c1
                                                                  • Opcode Fuzzy Hash: 0b16f26548ee8f6de66faf4dc811f7764edc0e6b88883aef8785bee78dd5fa60
                                                                  • Instruction Fuzzy Hash: 19121930E002198FDB64EFA5D854BAEB7B6FF89300F248569D40AAB755DB349D41CF90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: XPq$\Oq
                                                                  • API String ID: 0-3725437444
                                                                  • Opcode ID: 0c509b252f57e4d0c72f5084ed5556babbc85962c46c1520cc42697cfe438c9e
                                                                  • Instruction ID: c51e4d56ed209fc680f26d8890aa2873daa5f41adc9405899a6f39959d65137c
                                                                  • Opcode Fuzzy Hash: 0c509b252f57e4d0c72f5084ed5556babbc85962c46c1520cc42697cfe438c9e
                                                                  • Instruction Fuzzy Hash: C1E10631B141158FDBA4EB6CD8806AEBBB6FF89310F25846AE406DF761CA31DC05C791
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9f22823555312dcd52b067b106bb76a40e0d828a7538250e82fc293078be2c41
                                                                  • Instruction ID: db68d1f02f3dabe9e2be2cedcb034e4d48deef50a321dc79d787a34ac8f8590e
                                                                  • Opcode Fuzzy Hash: 9f22823555312dcd52b067b106bb76a40e0d828a7538250e82fc293078be2c41
                                                                  • Instruction Fuzzy Hash: 2B23FA31D10A198ECB11EF68C8945ADF7B1FF99300F15D79AE458B7221EB70AAC5CB81
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: PHq
                                                                  • API String ID: 0-3820536768
                                                                  • Opcode ID: 4e4c7e1c448215931961d70b177e7a6115ccbb16cd4661f3ce5c119d88878e1b
                                                                  • Instruction ID: 844dc9e629e9f5f2d0609cdc47db596da3f6de8f1aea2c60570fcccb6071924e
                                                                  • Opcode Fuzzy Hash: 4e4c7e1c448215931961d70b177e7a6115ccbb16cd4661f3ce5c119d88878e1b
                                                                  • Instruction Fuzzy Hash: 2422A134B002058FDBA4EB68C494B6DB7F6FF88310F248569D40ADB7A1DA35EC46CB91
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 21e15f2f2c6d3c5550b77c372bb447822ad7b04a400a912298de2fdec9f9f85b
                                                                  • Instruction ID: 7fedc20375a4e3bb93fae849d9969dd0fec158f583fc1594456dcdee567de350
                                                                  • Opcode Fuzzy Hash: 21e15f2f2c6d3c5550b77c372bb447822ad7b04a400a912298de2fdec9f9f85b
                                                                  • Instruction Fuzzy Hash: C412A8F0C9A7498AE710CF65E9CC189BB61B741394FD08A0AD2622E2D9D7F4156ACF44
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2496921504.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_2ed0000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c218707c0d44e88d3341bec3c89d370ef7213612408c1131e639b5953c43df8d
                                                                  • Instruction ID: 8317ad5360a6dc3f10ff41d00052905b0f9c46e2f09b175758177d2aa152471e
                                                                  • Opcode Fuzzy Hash: c218707c0d44e88d3341bec3c89d370ef7213612408c1131e639b5953c43df8d
                                                                  • Instruction Fuzzy Hash: B5B15F70E402098FDF24CFA9D8857EDBBF2AF58318F14D129D419A7294EB749882CF81
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 791c41dec5886bc9a4a4bf75111c55e9d1f421e8213c98d0aec66c6323b8e693
                                                                  • Instruction ID: f6fd8703189bf8638b31c0cb86589517b25a8a1eb2eee64fa45f6046167d4dac
                                                                  • Opcode Fuzzy Hash: 791c41dec5886bc9a4a4bf75111c55e9d1f421e8213c98d0aec66c6323b8e693
                                                                  • Instruction Fuzzy Hash: E2813875E003099FDF61CF9EC880AAEBBB9FB49310F24852AE415E7651D334D991CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500720324.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6960000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c5196a4623103b8a7a97cf6899a1f6d2fea642d952ea5051a817e12bed4f998a
                                                                  • Instruction ID: b29edba262760fb0c516559cd0ecdfd376fadabf3f6e831d30c05a0c8abfae48
                                                                  • Opcode Fuzzy Hash: c5196a4623103b8a7a97cf6899a1f6d2fea642d952ea5051a817e12bed4f998a
                                                                  • Instruction Fuzzy Hash: 4FC1E8B1C9674D8AD714CF75E88C189BBB1BB85394F908A0AD1622F2D8DBF4146ACF44
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $q$$q$$q$$q$$q$$q$$q$$q
                                                                  • API String ID: 0-3886557441
                                                                  • Opcode ID: 006ddd1d004fa502032721898377266cb897a03102446747d97ca9de1c074709
                                                                  • Instruction ID: 243ca19f02ec444faf7d89dde0b56c1d8c33441a49046cb016a5f11d1184feb0
                                                                  • Opcode Fuzzy Hash: 006ddd1d004fa502032721898377266cb897a03102446747d97ca9de1c074709
                                                                  • Instruction Fuzzy Hash: 42915230E00209DFEB64EF65D95476E77F6FF84301F24852AE801AB651DB789D42CB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $q$$q$$q$$q$$q$$q
                                                                  • API String ID: 0-2069967915
                                                                  • Opcode ID: 2a93ed91d10ba63de46b05971b7bde914bff3f371659c7d072fdea52474ef9c9
                                                                  • Instruction ID: 063f797f319c758c6401a0511bf37589e0e14f48000ab94d155852b9654236d9
                                                                  • Opcode Fuzzy Hash: 2a93ed91d10ba63de46b05971b7bde914bff3f371659c7d072fdea52474ef9c9
                                                                  • Instruction Fuzzy Hash: F6F12934A012099FDB58EFA4D954B6EBBB3FF84341F288568D405AF754CB39AC42CB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $q$$q$$q$$q$$q$$q
                                                                  • API String ID: 0-2069967915
                                                                  • Opcode ID: d6b38f8b7af2e22e8724a4506b3c36772cf94f1811aa5f9b1503a73349c97d04
                                                                  • Instruction ID: d52596adcd225fd9a6e25010aa9607f28893015218288b941f569e70f0629240
                                                                  • Opcode Fuzzy Hash: d6b38f8b7af2e22e8724a4506b3c36772cf94f1811aa5f9b1503a73349c97d04
                                                                  • Instruction Fuzzy Hash: 5871B270E002099FDB68EF68D45066EB7F6FF85300B28852AD406EF659DB70ED46CB81
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $q$$q$$q$$q
                                                                  • API String ID: 0-4102054182
                                                                  • Opcode ID: 6e81f84af8871a3e37687d6349e7ec795a90b32dc957ddce3624a1bf0ae9edb6
                                                                  • Instruction ID: 96a90457709517f20c172075a754d57a9856428e91d2916a01c564e210d9a394
                                                                  • Opcode Fuzzy Hash: 6e81f84af8871a3e37687d6349e7ec795a90b32dc957ddce3624a1bf0ae9edb6
                                                                  • Instruction Fuzzy Hash: 97B13B30E002198FDB64EBA5D984B6EB7B6FF84300F648969D406EB794DB35DC42CB90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $q$$q$$q$$q
                                                                  • API String ID: 0-4102054182
                                                                  • Opcode ID: 57ea182765f4a60a19542162f52eebfc8d9bec6a08db9ac557ded1b7859b7f25
                                                                  • Instruction ID: 3d7b6b743b1dfa6b0cd6ce7ebfa6484aeadc7e6e912c76d0c10c97d1a499edcd
                                                                  • Opcode Fuzzy Hash: 57ea182765f4a60a19542162f52eebfc8d9bec6a08db9ac557ded1b7859b7f25
                                                                  • Instruction Fuzzy Hash: D551C130E112059FDB65EB64E9806ADB7B6FB84310F24892AE815EB655CB34EC42CB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.2500821577.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_6980000_RegSvcs.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LRq$LRq$$q$$q
                                                                  • API String ID: 0-2204215535
                                                                  • Opcode ID: 49aa8f990ce144d43a8ed84cf85d74de2ccc0e2c23faae667e9cb9eaee32057e
                                                                  • Instruction ID: 8074f019766d7cf23cede4218e38a6683ff91c90eff1ddc97a7d84562717af42
                                                                  • Opcode Fuzzy Hash: 49aa8f990ce144d43a8ed84cf85d74de2ccc0e2c23faae667e9cb9eaee32057e
                                                                  • Instruction Fuzzy Hash: E551B334B002059FDB68EF64DA40A6E77F6FF88310F548569E406AF7A5DA35EC01CBA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.1833931634.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_24e0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 8q$xX8snC!
                                                                  • API String ID: 0-3185901540
                                                                  • Opcode ID: 2df75e9acb8314bc2eec69932472a65c74f5f85f05bee1ab3f4763e46423338d
                                                                  • Instruction ID: 7ce10bf13e5fe0aae6cdc59eb006384a89708cb95dcd401e6b1ac62826655e1a
                                                                  • Opcode Fuzzy Hash: 2df75e9acb8314bc2eec69932472a65c74f5f85f05bee1ab3f4763e46423338d
                                                                  • Instruction Fuzzy Hash: 84325F74B40601CFEB54EF74D8A4A6A77A2FBC8345B50892DC51B873A8EB35EC46CB50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.1833931634.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_24e0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: xX8snC!
                                                                  • API String ID: 0-2677660975
                                                                  • Opcode ID: c05944a80f016beb7a12011f777cc2159a014ba47e322f3a5574e6e3f4e39639
                                                                  • Instruction ID: 2742d034df16f7e1e2daf564ac2ed709e7578d07ee0ac82906dde5deeee66468
                                                                  • Opcode Fuzzy Hash: c05944a80f016beb7a12011f777cc2159a014ba47e322f3a5574e6e3f4e39639
                                                                  • Instruction Fuzzy Hash: CB81AF35A00304CFDF25AB74C858B9EBBB2BF88311F15856AD517673A4DB71AC86DB80
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.1833931634.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_24e0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: tPq
                                                                  • API String ID: 0-789928099
                                                                  • Opcode ID: 4dcde9bf45ee217ebccaa95074f8a3dd61cad1fb6ca14bf0ca096688416bb8cd
                                                                  • Instruction ID: e0573075576748435cccbf5b3e8e384d867f55bf0211c7836ee2777c5cf347f4
                                                                  • Opcode Fuzzy Hash: 4dcde9bf45ee217ebccaa95074f8a3dd61cad1fb6ca14bf0ca096688416bb8cd
                                                                  • Instruction Fuzzy Hash: 54312D74B456108FDB59AB38D85892D3BE2AF8A71635104B9E506CF771DE36DC42CB80
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.1833931634.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_24e0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: tPq
                                                                  • API String ID: 0-789928099
                                                                  • Opcode ID: 763772640f5c9b79756024828cdddd185f87662b9ca2d0669de9ef71b5cd5310
                                                                  • Instruction ID: bd86426b7f7372fe46a1734593c12a730dc381d9a2ec17b865f53f099274973d
                                                                  • Opcode Fuzzy Hash: 763772640f5c9b79756024828cdddd185f87662b9ca2d0669de9ef71b5cd5310
                                                                  • Instruction Fuzzy Hash: 1921E675B416108FDB58AB38C458E2D7BE6AF8971636208B8E506CF775DE36DC42CB80
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.1833931634.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_24e0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 505387b0b6069fd6f0594643aabbf5d24f8cdf314f055734dfd51f6044d65123
                                                                  • Instruction ID: a3457d8ec161dd41872ed441108b457b83a918abafe185fb0740ef8853dd842b
                                                                  • Opcode Fuzzy Hash: 505387b0b6069fd6f0594643aabbf5d24f8cdf314f055734dfd51f6044d65123
                                                                  • Instruction Fuzzy Hash: AE118E76E002459FCB01EFB8D8809DBFFB1FF89300B1185AAE51997265E7709916CB90
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.1833931634.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_24e0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 172196233cff2c6df178a7df5f44fe4b08c87e75fefd13c8d52917cf0977eb14
                                                                  • Instruction ID: bb9348696213c137cfbdf37663d9a80438838b1a145a643ae060987de86792ed
                                                                  • Opcode Fuzzy Hash: 172196233cff2c6df178a7df5f44fe4b08c87e75fefd13c8d52917cf0977eb14
                                                                  • Instruction Fuzzy Hash: C3014C76E002059FCB40EFB9D884CABFBB5FF89310711866AE51997224EB30A915DB90
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.1833931634.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_24e0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 61b4e4f664bd37f63965ca442858f555c6dc6e8a6f5db70654825bdda07958c5
                                                                  • Instruction ID: b9e41daf942349c5e42874d362ea0bb6548c0a8e2f8f647f398289d0a35326a1
                                                                  • Opcode Fuzzy Hash: 61b4e4f664bd37f63965ca442858f555c6dc6e8a6f5db70654825bdda07958c5
                                                                  • Instruction Fuzzy Hash: B5F0F0A4D0F3806FCB1297749C120CE7FB0AE07202B0501E7C4C5E7293EA204A03C7A3
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.1833931634.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_24e0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0eaa8ec59258617dcf397bdb5aab33181e9f3454f0fd7a16c1cfd309ee5fe6b2
                                                                  • Instruction ID: 374475c18e32d3678d9c7243e7ab571b211aa6ca7bb33415bd46f562927962dd
                                                                  • Opcode Fuzzy Hash: 0eaa8ec59258617dcf397bdb5aab33181e9f3454f0fd7a16c1cfd309ee5fe6b2
                                                                  • Instruction Fuzzy Hash: B7F01CB5980305CFEF15EB74C458BAEBBB0BB48716F250899D417AB360CBB48C84CB51
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.1833931634.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_24e0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4254518751ce0c0113c51003ae9f41fb2c2b579bb3a746435bf3d8bc7480aaac
                                                                  • Instruction ID: 34fd18da2445fd67b730f9644c8bd032efbcd6b554b6623f8284e0643e2954ba
                                                                  • Opcode Fuzzy Hash: 4254518751ce0c0113c51003ae9f41fb2c2b579bb3a746435bf3d8bc7480aaac
                                                                  • Instruction Fuzzy Hash: 79D012357402149FC710EB69E959A463778AB09611F5140A5E509CB264EB71DC14C7D1
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.1833931634.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_24e0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9284381d4f7d66d1b052eeddbb845a873de7734a417653167560538aa9eca366
                                                                  • Instruction ID: 3b8adb33765cc2735b5d54ae6c792b65f17d3f873af4d79b9a1a8a73c9ce92a9
                                                                  • Opcode Fuzzy Hash: 9284381d4f7d66d1b052eeddbb845a873de7734a417653167560538aa9eca366
                                                                  • Instruction Fuzzy Hash: BFD067B1D01219AF8F80EFB999091DEBBF8FE09251B104566D91AE3200E6705A10CBD1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.1912350089.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_bb0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 8q$xX8snCU
                                                                  • API String ID: 0-3935062721
                                                                  • Opcode ID: 5e5e2882fbe79da18933db7ed2983c2d484e7e2a1b27da8b595ecbf9159d0c22
                                                                  • Instruction ID: 2a1f62e5993197ee75f6c8b3c43b59935c5dd2645856dca6a805526620ab874a
                                                                  • Opcode Fuzzy Hash: 5e5e2882fbe79da18933db7ed2983c2d484e7e2a1b27da8b595ecbf9159d0c22
                                                                  • Instruction Fuzzy Hash: ED11E131A002045FC714EB78A860BAD3BE6EF89300F5044A9D2099B2A5EE749D43CB95
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.1912350089.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_bb0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: xX8snCU
                                                                  • API String ID: 0-3371264010
                                                                  • Opcode ID: 85c168e36568dec47d6f10120485e7b9e7db07557ca4913b0d0d6130a8c2bb0c
                                                                  • Instruction ID: b1b9ac13088d44ab35c00317a7b19558fc589d9516ea12d42e59559280020f14
                                                                  • Opcode Fuzzy Hash: 85c168e36568dec47d6f10120485e7b9e7db07557ca4913b0d0d6130a8c2bb0c
                                                                  • Instruction Fuzzy Hash: FD221B34700601CFDB68EF28D8A0A7A77E2FB98345B608D6DC5568B399DB75EC42CB40
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.1912350089.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_bb0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: xX8snCU
                                                                  • API String ID: 0-3371264010
                                                                  • Opcode ID: f0372f40dfddf5b5dd2aa249ea82e8a364888252894f1399742254df6f29f307
                                                                  • Instruction ID: 4270592be07710785179e42f6d8e221a514c1185150690b9b173611b094549e7
                                                                  • Opcode Fuzzy Hash: f0372f40dfddf5b5dd2aa249ea82e8a364888252894f1399742254df6f29f307
                                                                  • Instruction Fuzzy Hash: DA81A235A00304CFDB25ABB4D4587BEBBF2EF88300F1585A9D4165B6A4DF75AC86CB40
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.1912350089.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_bb0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: tPq
                                                                  • API String ID: 0-789928099
                                                                  • Opcode ID: e4a9c63c8ffd7f46c9355784fc07b00c7c8ef0b0ffed24e182943c045b0ec11f
                                                                  • Instruction ID: f2942296a0936965f7d1daa68f1c69d3d5d6ca5bc09234dd0978ab57a97ea68b
                                                                  • Opcode Fuzzy Hash: e4a9c63c8ffd7f46c9355784fc07b00c7c8ef0b0ffed24e182943c045b0ec11f
                                                                  • Instruction Fuzzy Hash: 9821F834B406108FC759AB38D458A2D3BE6AF8971639508B8E506CF7B5DE36DC42CB80
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.1912350089.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_bb0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: tPq
                                                                  • API String ID: 0-789928099
                                                                  • Opcode ID: 09300745d685a0331bc8e083821aec30ac760897b663f69280eb2f02ff384d02
                                                                  • Instruction ID: b6fc5f39062f33851e9cf3f19cd1ce819ab9d86585060006e81e35f791f92f3e
                                                                  • Opcode Fuzzy Hash: 09300745d685a0331bc8e083821aec30ac760897b663f69280eb2f02ff384d02
                                                                  • Instruction Fuzzy Hash: BE21E635B406108FC758AB38C458E2D7BE6AF8A7163A108B8E506CF775DE36DC42CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.1912350089.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_bb0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 83ff58b4ba0e9051e20dcd57e51298ef7f21ab5e9eb56a1f90b71301f341ea9e
                                                                  • Instruction ID: a8a56ee42d655ca61ee5cf5ec997763a1d579fda5c3ba78e1786fc8169eb0ff8
                                                                  • Opcode Fuzzy Hash: 83ff58b4ba0e9051e20dcd57e51298ef7f21ab5e9eb56a1f90b71301f341ea9e
                                                                  • Instruction Fuzzy Hash: D711E136E002059FCB50EFB8D840EEAFBB1FF883007108566E515A7221EB71A906CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.1912350089.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_bb0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 707874d3a948c93a6a428cdaa974696ecc697b34d850406b8dc9e93919c0ca5a
                                                                  • Instruction ID: d48cdf7dd40fce5187656813703cd68f214555d1500ce2b636430742f1704649
                                                                  • Opcode Fuzzy Hash: 707874d3a948c93a6a428cdaa974696ecc697b34d850406b8dc9e93919c0ca5a
                                                                  • Instruction Fuzzy Hash: 1D019E36E002059FCB50EFB8D840DABFBF5FF89310710866AE51997224EB70A905CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.1912350089.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_bb0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1ad8a7c281b0ab77f2a54aa9d783e0ed551b3a5f9f96259fbc71f5a9d39e2d2a
                                                                  • Instruction ID: 303ebb5bd587aee79cc740bd8163bbde91890fea000558321942b4a1b1c40923
                                                                  • Opcode Fuzzy Hash: 1ad8a7c281b0ab77f2a54aa9d783e0ed551b3a5f9f96259fbc71f5a9d39e2d2a
                                                                  • Instruction Fuzzy Hash: EBF0E260D09284EFDB02BBB45C061DD7FB4AE89300F4540E7C058F3291EA290A00C7E3
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.1912350089.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_bb0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 43b258f6cafcdee7d0ff2a4876df807eb1dea92068581800800b23b5adc347ec
                                                                  • Instruction ID: a3b9998f670fced0f19650e61d3f31cc7f85fbcddd4c09d154dd2ec3d979202e
                                                                  • Opcode Fuzzy Hash: 43b258f6cafcdee7d0ff2a4876df807eb1dea92068581800800b23b5adc347ec
                                                                  • Instruction Fuzzy Hash: 11F01575A00305CFDB24EB78C4687BE7BF0AB48B04F250898D412AB3A0CBB48C84CB61
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.1912350089.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_bb0000_sgxIb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cc97e987b0c567b514cfd4cf96e61f23f41bdc5975112a4ed24ca4d678e7ea5a
                                                                  • Instruction ID: 4f116c1b0ecda558087c546068013d990d83dbe6d838256df3de858baea03fe1
                                                                  • Opcode Fuzzy Hash: cc97e987b0c567b514cfd4cf96e61f23f41bdc5975112a4ed24ca4d678e7ea5a
                                                                  • Instruction Fuzzy Hash: 16D067B1D01219AF8B50EFB999051EEBBF8FE09250B1145A6D919E3200E7705B108BE1